1. A Novel Approach to Hill Cipher
- Author
-
Neha Sharma and Sachin Chirgaiya
- Subjects
Block cipher mode of operation ,Theoretical computer science ,CBC-MAC ,Computer science ,Stream cipher attack ,ROT13 ,Caesar cipher ,Two-square cipher ,Data_CODINGANDINFORMATIONTHEORY ,Polyalphabetic cipher ,Ciphertext stealing ,Running key cipher ,Hill cipher ,Ciphertext ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Arithmetic ,Stream cipher ,3-Way ,Block cipher ,Transposition cipher ,Rail fence cipher ,Substitution cipher ,Affine cipher ,Rip van Winkle cipher ,Cipher ,Data_GENERAL ,Weak key ,Polygraphic substitution ,Substitution-permutation network - Abstract
Cipher is a first polygraphic substitution cipher that works on digraphs, trigraphs (3 letter squares) or hypothetically blocks of any magnitude. The Hill Cipher utilizes a region of science called Linear Algebra, and specifically requires the client to have a rudimentary knowledge of matrices. It additionally makes utilization of Modulo Arithmetic (like the Affine Cipher). To perform decryption, the hill cipher requires the inverse of the key matrix. This is the major shortcoming of Hill cipher since every key matrix is not invertible. We will propose a new variant of hill cipher, which will find the decryption of the cipher text even when the key matrix is non invertible.
- Published
- 2014
- Full Text
- View/download PDF