hill cipher
Recently Published Documents


TOTAL DOCUMENTS

200
(FIVE YEARS 76)

H-INDEX

9
(FIVE YEARS 3)

2021 ◽  
Vol 1 (2) ◽  
pp. 105-117
Author(s):  
Fika Wahyuni ◽  
Muhammad Khudzaifah ◽  
Muhammad Nafie Jauhari
Keyword(s):  

Pada penelitian ini, digunakan algoritma columnar transposition sebagai metode transposisi dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang sebagai metode substitusi. Penyandian pesan menggunakan metode super enkripsi dengan algoritma columnar transposition dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang menghasilkan pesan akhir yang tidak mengubah, menambah maupun mengurangi pesan awal, sehingga dapat di implementasikan pada pesan dengan baik. Penyandian ini melipat gandakan keamanan suatu pesan, dimana keamanan pertama terletak pada enkripsi pesan dengan columnar transposition dan keamanan yang kedua terletak pada algoritma hill cipher yang telah dimodifikasi, sehingga membuat pesan akan semakin sulit untuk dipecahkan.   Hasil dari penelitian ini dapat dijadikan sebagai tambahan pustaka mengenai kriptografi serta solusi bagi pihak yang menggunakan teknologi informasi dan komunikasi untuk dapat melakukan pengiriman pesan dengan aman.


2021 ◽  
Vol 12 (2) ◽  
pp. 447-455
Author(s):  
Samsul Arifin ◽  
Indra Bayu Muktyas ◽  
Puguh Wahyu Prasetyo ◽  
Abdul Azis Abdillah

One of the encryption algorithms is the Hill Cipher. The square key matrix in the Hill Cipher method must have an inverse modulo. The unimodular matrix is one of the few matrices that must have an inverse. A unimodular matrix can be utilized as a key in the encryption process. This research aims to demonstrate that there is another approach to protect text message data. Symmetric cryptography is the sort of encryption utilized. A Bernoulli Map is used to create a unimodular matrix. To begin, the researchers use an identity matrix to generate a unimodular matrix. The Bernoulli Map series of real values in (0,1) is translated to integers between 0 and 255. The numbers are then inserted into the unimodular matrix's top triangular entries. To acquire the full matrix as the key, the researchers utilize Elementary Row Operations. The data is then encrypted using modulo matrix multiplication.


2021 ◽  
Vol 1 (2) ◽  
pp. 75-92
Author(s):  
Nana Nana ◽  
Puguh Wahyu Prasetyo

Message security is must be managed seriously. Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. Cryptography is used as a tool to protect messages, for example, national secrets and strategies.  The method of this research is qualitative research with a literature review. This research implements a hybrid cryptographic algorithm by combining Hill cipher and 3x3x3 Rubik's cube methods with Python software simulation.


Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Author(s):  
Wannarisuk Nongbsap ◽  
◽  
Dr. Madan Mohan Singh ◽  

In this paper, we present a public key scheme using Discrete Logarithm problem, proposed by Diffie and Hellman (DLP)[1], particularly known as the Computational Diffie-Hellman Problem (CDH)[12]. This paper uses the Elgamal encryption scheme [6] and extends it so that more than one message can be sent. The combination of Hill Cipher[14 ] and the property of the matrix ring 𝑴𝒏(𝒁𝒑), of being left m-injective over itself, where 𝒑 is a very large prime, are major contributions towards the proposal of this scheme.


2021 ◽  
Vol 2 (4) ◽  
pp. 129-134
Author(s):  
Elvis Pawan ◽  
Patmawati Hasan

A drug prescription is a written request from a doctor to a pharmacist that must be kept secret because it contains certain doses of drugs and types of drugs that cannot be known by just anyone, especially those who are not interested. From time to time technological advances have a rapid impact on all sectors, both private and government agencies, including the health sector. One form of service in the health sector that can utilize information technology is the manufacture of electronic drug prescriptions that can be sent via an application from a doctor to a pharmacist. The frequent misuse of prescription drugs by unauthorized persons, as well as errors by officers at the pharmacy in reading prescriptions can be fatal for the community, so a solution is needed to overcome this problem. This application is designed using the Hill Cipher Algorithm which is one of the classic types of algorithms in the field of cryptography, but to get the maximum level of security, the algorithm key will be modified using a postal code pattern as a matrix key. Broadly speaking, the Encryption Stage is the first starting from the plaintext which is the type of drug and drug dose, the second key matrix using a POS code pattern, the three plaintexts are converted into blocks, the fourth is arranged into a 2x2 matrix, the fifth is multiplied between the key and the sixth plaintext is multiplied into mod 26 to generate an encrypted ciphertext or recipe. The success rate of system functionality testing using the blackbox method is 100%


Author(s):  
Dian Rachmawati ◽  
Mohammad Andri Budiman ◽  
Wiro Tirta Habibi
Keyword(s):  

Author(s):  
Liqaa Saadi Mezher ◽  
Ayam Mohsen Abbass

Hill Cipher is a reimbursement coding system that converts specific textual content codes into numbers and does no longer exchange the location of fixed symbols. The symbol modifications simplest in step with the English letter table inclusive of (26) characters handiest. An encoded Hill Cipher algorithm was used that multiplication the square matrix of the apparent text with a non-public key and then combined it with the Triple Pass Protocol method used to repeat the encryption three times without relying on a personal key. Also, you could decode the code and go back it to the express textual content. The cause of mixing algorithms is to cozy the message without any key change among the sender and the recipient.


2021 ◽  
Vol 6 (1) ◽  
pp. 41
Author(s):  
Endaryono Endaryono ◽  
Nurfidah Dwitiyanti ◽  
Heri Satria Setiawan

<p><em>One of several algorithms in cryptography is the Hill Cpher method. This method is used in randomizing the contents of the message using a password key in the form of a matrix with the order MXM. The product in this research is a simulation design to explain how a plaintext message is converted into cipher text with encryption and decryption processes and vice versa from ciphertext to paintext through multiplication and inverse matrix operations. using Microsoft Excel (MS Excel). In this study, a matrix with order 2x2 and modulo 26 was used. This simulation design shows how the work process visually for each step in the process of changing the message content in the Hill Cipher method. It is hoped that the results of this study can be used as a learning medium by the community, especially students and lecturers, to increase understanding and broaden their horizons about the Hill Cipher method in cryptography lectures.</em><em></em></p>


Author(s):  
Younes Qobbi ◽  
Abdeltif Jarjar ◽  
Mohamed Essaid ◽  
Abdelhamid Benazzi

Sign in / Sign up

Export Citation Format

Share Document