scholarly journals Aplikasi Operasi Matriks pada Perancangan Simulasi Metode Hill Cipher Menggunakan Microsoft Excel

2021 ◽  
Vol 6 (1) ◽  
pp. 41
Author(s):  
Endaryono Endaryono ◽  
Nurfidah Dwitiyanti ◽  
Heri Satria Setiawan

<p><em>One of several algorithms in cryptography is the Hill Cpher method. This method is used in randomizing the contents of the message using a password key in the form of a matrix with the order MXM. The product in this research is a simulation design to explain how a plaintext message is converted into cipher text with encryption and decryption processes and vice versa from ciphertext to paintext through multiplication and inverse matrix operations. using Microsoft Excel (MS Excel). In this study, a matrix with order 2x2 and modulo 26 was used. This simulation design shows how the work process visually for each step in the process of changing the message content in the Hill Cipher method. It is hoped that the results of this study can be used as a learning medium by the community, especially students and lecturers, to increase understanding and broaden their horizons about the Hill Cipher method in cryptography lectures.</em><em></em></p>

Author(s):  
Azzam Mujaddid ◽  
Sumarsono Sumarsono

The hill cipher algorithm has the uniqueness of using matrix multiplication in the process where the key used is a matrix that has weaknesses in the process of encryption and decryption. In this paper will be modified to the encryption process with caesar cipher substitution. The principle of the hill cipher algorithm using the multiplication of the 2x2 key matrix of keys is enhanced through process modification lies in the combination of initial character determination using the substitution of 3 caesar ciphers. From the results of this modification can be seen that the more the number of characters processed the time required will be longer. The magnitude of the determinant also affects time and size during the poses. A 1 character increment occurs if the initial character of the encryption process is an odd number.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Computer security aims to help users prevent fraud or detect fraud in an information-based system. The information must be secured to be free from threats. Cryptographic techniques can prevent data theft. One cryptographic algorithm is Hill Cipher. This algorithm is one symmetric cryptography algorithm. The Hill Cipher algorithm uses an m x m sized matrix as the key to encryption and decryption. The fundamental matrix theory used in Hill Cipher is multiplication between matrices and inverses the matrix. Hill Cipher has two types of matrices in general, 2 x 2 and 3 x 3. This study discusses the order 2 x 2. The application of Hill Cipher in text-shaped media is highly recommended because it has fast encryption and decryption speeds. This method is very good at securing data that will be transmitted on an open network.


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.


2020 ◽  
Vol 4 (2) ◽  
pp. 92-97
Author(s):  
Abd Charis Fauzan ◽  
Veradella Yuelisa Mafula

Security and confidentiality of documents stored on a computer is an important aspect in the field of computer or information system security. Documents will no longer be useful if they are intercepted or hijacked by unauthorized people, they will even endanger the document owner, if documents containing important information are misused by irresponsible people. Therefore the documents on the computer must be preserved so that they are only accepted and used by interested persons. One of the solutions to prevent eavesdropping of documents is to use cryptography. This study aims to increase cryptographic complexity using a combination of hill cipher algorithms and block chaining cipher modes. The combination of the two methods is expected to be able to cover the shortcomings of each method so that the cryptographic complexity can be increased. The method in this study consists of two stages, namely the document encryption and document decryption stages. The encryption stage is to change the plaintext document into a ciphertext document, on the other hand, the decryption stage is to change the ciphertext document back into a plaintext document. The stages for document encryption include; 1) retrieve plain text messages in the document so that they can be processed by the system (parsing); 2) encryption to convert plaintext documents into ciphertext documents using the hill cipher algorithm; 3) encryption to convert plaintext documents into cipher text documents using cipher block chaining mode. While the methods for decryption are 1) taking the ciphertext message in the document so that it can be processed by the system (parsing); 2) decryption to convert ciphertext documents into plaintext documents using cipher block chaining mode; 3) decryption to convert ciphertext documents into plaintext documents using a hill cipher.


Author(s):  
Andysah Putera Utama Siahaan

The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 59
Author(s):  
K. Madhusudhan Reddy ◽  
Anirudh Itagi ◽  
Saransh Dabas ◽  
Bonam Kamala Prakash

The Hill Cipher algorithm is a practical algorithm which requires only preliminary knowledge of matrices which makes it quite useful. But, for decrypting the encoded information the key matrix needs to have an inverse (The key matrix needs to be invertible) or else it is impossible to decrypt the given information. The main objective of our paper is to introduce an unorthodox and improved version of Hill Cipher which will make encryption and decryption of an image easier. This paper has diverged from the conventional method by using an orthogonal matrix (where the transpose of a matrix is equal to its inverse) as our key matrix. This method is faster and easier as finding the transpose of a matrix is much simpler than finding the inverse of a given matrix and hence, facilitating the process of faster execution. To further break down the process into an even simpler one, we have added a few more constraints. To show its application, we have used this method to encrypt images using MatLab.  


2021 ◽  
Vol 2 (4) ◽  
pp. 129-134
Author(s):  
Elvis Pawan ◽  
Patmawati Hasan

A drug prescription is a written request from a doctor to a pharmacist that must be kept secret because it contains certain doses of drugs and types of drugs that cannot be known by just anyone, especially those who are not interested. From time to time technological advances have a rapid impact on all sectors, both private and government agencies, including the health sector. One form of service in the health sector that can utilize information technology is the manufacture of electronic drug prescriptions that can be sent via an application from a doctor to a pharmacist. The frequent misuse of prescription drugs by unauthorized persons, as well as errors by officers at the pharmacy in reading prescriptions can be fatal for the community, so a solution is needed to overcome this problem. This application is designed using the Hill Cipher Algorithm which is one of the classic types of algorithms in the field of cryptography, but to get the maximum level of security, the algorithm key will be modified using a postal code pattern as a matrix key. Broadly speaking, the Encryption Stage is the first starting from the plaintext which is the type of drug and drug dose, the second key matrix using a POS code pattern, the three plaintexts are converted into blocks, the fourth is arranged into a 2x2 matrix, the fifth is multiplied between the key and the sixth plaintext is multiplied into mod 26 to generate an encrypted ciphertext or recipe. The success rate of system functionality testing using the blackbox method is 100%


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Dian Rachmawati ◽  
Mohammad Andri Budiman ◽  
Wiro Tirta Habibi
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document