scispace - formally typeset
Search or ask a question
Topic

Hill cipher

About: Hill cipher is a research topic. Over the lifetime, 303 publications have been published within this topic receiving 2320 citations.


Papers
More filters
01 Jan 2009
TL;DR: A novel advanced Hill (AdvHill) encryption technique has been proposed which uses an involutory key matrix and is a fast encryption scheme which overcomes problems of encrypting the images with homogeneous background.
Abstract: The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to find the inverse of the key matrix. The objective of this paper is to encrypt an image using a technique different from the conventional Hill Cipher. In this paper a novel advanced Hill (AdvHill) encryption technique has been proposed which uses an involutory key matrix. The scheme is a fast encryption scheme which overcomes problems of encrypting the images with homogeneous background. A comparative study of the proposed encryption scheme and the existing scheme is made. The output encrypted images reveal that the proposed technique is quite reliable and robust.

108 citations

Journal ArticleDOI
TL;DR: Working from known results over finite fields, a formula is assembled and proved for the number of matrices of a given dimension that are invertible over .
Abstract: In its most general form, the Hill cipher's keyspace consists of all matrices of a given dimension that are invertible over ${{\open Z}_m} . Working from known results over finite fields, we assemble and prove a formula for the number of such matrices. We also compare this result with the total number of matrices and the number of involutory matrices for a given dimension and modulus, identifying the effects of change in dimension and modulus on the order of the keyspace.

97 citations

Journal ArticleDOI
10 Sep 2020-Sensors
TL;DR: The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption, and ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption.
Abstract: The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.

84 citations

Journal ArticleDOI
TL;DR: A symmetric cipher that is actually a variation of the Hill cipher is presented, which makes use of “random” permutations of columns and rows of a matrix to form a “different” key for each data encryption.
Abstract: This paper presents a symmetric cipher that is actually a variation of the Hill cipher. The new scheme makes use of “random” permutations of columns and rows of a matrix to form a “different” key for each data encryption. The cipher has matrix products and permutations as the only operations which may be performed “efficiently” by primitive operators, when the system parameters are carefully chosen.

80 citations

01 Jan 2007
TL;DR: Methods of generating self-invertible matrix for Hill Cipher algorithm have been proposed, which eliminates the computational complexity involved in finding inverse of the matrix while decryption.
Abstract: In this paper, methods of generating self-invertible matrix for Hill Cipher algorithm have been proposed. The inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption.

77 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
72% related
Cryptography
37.3K papers, 854.5K citations
72% related
Authentication
74.7K papers, 867.1K citations
72% related
Routing protocol
46.5K papers, 901.8K citations
67% related
Particle swarm optimization
56K papers, 952.6K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202033
201928
201819
201719