Keywords:-

Keywords: Cryptography, Symmetric Cryptography, Hill Cipher, Encryption and Decryption

Article Content:-

Abstract

Cryptography plays a vital role in securing sensitive information in various domains. Hill cipher, a classic encryption technique, has been widely used for its simplicity and effectiveness. However, the original Hill cipher is susceptible to certain attacks due to its limited key space and vulnerable characteristics. In this study, we propose an enhanced version of the Hill cipher called the “Block Hill Cipher” that overcomes the limitations of the original algorithm while preserving its fundamental principles. To increase the safety and effectiveness of the encryption process, the Block Hill Cipher offers a number of unique ideas. The Block Hill Cipher encrypts blocks of characters rather than single4 characters, making it possible to encrypt longer sequences at once. By expanding the key space and making the cipher more resistant to statistical attacks, this method greatly enhances the cipher’s overall security. In light drawbacks the present paper deals with a fresh strategy in which our algorithm by incorporating while upholding the Hill cipher’s fundamental ideas. Hence on the findings of the study may be useful cryptographic tool ranging from communication systems to data storage and transmission in modern digital environments.

References:-

References

1. Neha Sharma , Sachin Chirgaiya, A novel approach to Hill Cipher . International journal of Computer Applications 2014; Vol.(108), No (11) ,34-37.
2. W. Stallings , Cryptography and Network Security , 4th edition . Prentice Hall;2005.
3. Y. Kumar , R. Munjal , Dan H Sharma, “ Comparison of symmetric and Asymmetric Cryptography with existing Vulnerabilities and Countermeasures,” International Journal of Computer. Sci .Manag.Stud.,vol. 11, no. 3 , hal .60-63,2011.
4. L.S . Hill , Cryptography in An Algebraic Alphabet, The American Mathematical Monthly ,1929;306-12.
5. Bibhudendra , A novel methods of generating self invertible matrix for hill cipher algorithm . Int. J. Secur., 1: 14-21.,2006.
6. P. Shanmugam and C. Loganathan , Involutory Matrix In Cryptography ,IJRRAS Vol 6,Issue 4,424-428,2011.

Downloads

Citation Tools

How to Cite
Rekha, G., & Srinivas, V. (2023). A Novel Approach in Hill Cipher Cryptography. International Journal Of Mathematics And Computer Research, 11(06), 3503-3505. https://doi.org/10.47191/ijmcr/v11i6.06