scholarly journals Mixed Hill Cipher methods with triple pass protocol methods

Author(s):  
Liqaa Saadi Mezher ◽  
Ayam Mohsen Abbass

Hill Cipher is a reimbursement coding system that converts specific textual content codes into numbers and does no longer exchange the location of fixed symbols. The symbol modifications simplest in step with the English letter table inclusive of (26) characters handiest. An encoded Hill Cipher algorithm was used that multiplication the square matrix of the apparent text with a non-public key and then combined it with the Triple Pass Protocol method used to repeat the encryption three times without relying on a personal key. Also, you could decode the code and go back it to the express textual content. The cause of mixing algorithms is to cozy the message without any key change among the sender and the recipient.

2018 ◽  
Vol 10 (2) ◽  
Author(s):  
Yuza Reswan ◽  
Dedy Agung Prabowo

ABSTRACTIt is now commonplace that secrecy must be truly enhanced and tightened as it weighs the emergence of the latest technology that is growing rapidly. Of course an agency, group, or individual have data that is confidential and do not want to be known by other parties hence the need for a system capable of securing the data. For this reason this research aims to create Cryptography application by applying a combination of Hill Cipher and RSA algorithm, Cryptography is also called coding language and I apply Hill Cipher because it is a classical method that uses multiplication for each encoded character while RSA is a modern method that has 2 keys ie key public and secret key where the public key is used for encryption and secret key to retranslate the original form. By applying a combination of classical and modern methods it can be more secure so it is more difficult to be solved by unwanted parties.Keyword : Data Security, Cryptography, Hill Cipher, RSAABSTRAKDi masa sekarang sudah menjadi hal yang biasa bahwa kerahasiaan harus benar – benar ditingkatkan dan diperketat karena menimbang kemunculan teknologi terbaru yang semakin pesat berkembang. Tentu sebuah Instansi, kelompok, ataupun individu memiliki data yang bersifat rahasia dan tidak ingin diketahui oleh pihak lain maka dari itu diperlukannya system yang mampu mengamankan data tersebut. Untuk itulah penelitian ini bertujuan membuat aplikasi Kriptografi dengan menerapkan kombinasi Algoritma Hill Cipher dan RSA, Kriptografi juga disebut bahasa persandian dan saya menerapkan Hill Cipher karena merupakan metode klasik yang menggunakan perkalian untuk tiap karakter yang disandikan sedangkan RSA adalah metode modern yang memiliki 2 kunci yaitu kunci publik dan kunci rahasia dimana kunci publik digunakan untuk penyandian dan kunci rahasia untuk menterjemahkan kembali k bentuk asli. Dengan menerapkan kombinasi metode klasik dan modern ini dapat lebih mengamankan sehingga lebih sulit untuk dapat di pecahkan oleh pihak – pihak yang tidak diinginkan.Kata Kunci : Pengamanan Data, Kriptografi, Hill Cipher, RSA.


Author(s):  
Mechal Fheed Alslman, Nassr Aldin Ide, Ahmad Zakzak Mechal Fheed Alslman, Nassr Aldin Ide, Ahmad Zakzak

In this paper, we introduce a method for building matrices that verify the commutative property of multiplication on the basis of circular matrices, as each of these matrices can be divided into four circular matrices, and we can also build matrices that verify the commutative property of multiplication from higher order and are not necessarily divided into circular matrices. Using these matrixes, we provide a way to securely exchange a secret encryption key, which is a square matrix, over open communication channels, and then use this key to exchange encrypted messages between two sides or two parties. Moreover, using these matrixes we also offer a public-key encryption method, whereby the two parties exchange encrypted messages without previously agreeing on a common secret key between them.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.


Author(s):  
Wannarisuk Nongbsap ◽  
◽  
Dr. Madan Mohan Singh ◽  

In this paper, we present a public key scheme using Discrete Logarithm problem, proposed by Diffie and Hellman (DLP)[1], particularly known as the Computational Diffie-Hellman Problem (CDH)[12]. This paper uses the Elgamal encryption scheme [6] and extends it so that more than one message can be sent. The combination of Hill Cipher[14 ] and the property of the matrix ring 𝑴𝒏(𝒁𝒑), of being left m-injective over itself, where 𝒑 is a very large prime, are major contributions towards the proposal of this scheme.


2018 ◽  
Vol 30 (4) ◽  
pp. 196-206 ◽  
Author(s):  
Byungho Park ◽  
Rachel L. Bailey

Abstract. In an effort to quantify message complexity in such a way that predictions regarding the moment-to-moment cognitive and emotional processing of viewers would be made, Lang and her colleagues devised the coding system information introduced (or ii). This coding system quantifies the number of structural features that are known to consume cognitive resources and considers it in combination with the number of camera changes (cc) in the video, which supply additional cognitive resources owing to their elicitation of an orienting response. This study further validates ii using psychophysiological responses that index cognitive resource allocation and recognition memory. We also pose two novel hypotheses regarding the confluence of controlled and automatic processing and the effect of cognitive overload on enjoyment of messages. Thirty television advertisements were selected from a pool of 172 (all 20 s in length) based on their ii/cc ratio and ratings for their arousing content. Heart rate change over time showed significant deceleration (indicative of increased cognitive resource allocation) for messages with greater ii/cc ratios. Further, recognition memory worsened as ii/cc increased. It was also found that message complexity increases both automatic and controlled allocations to processing, and that the most complex messages may have created a state of cognitive overload, which was received as enjoyable by the participants in this television context.


Sign in / Sign up

Export Citation Format

Share Document