We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Variable-length Hill Cipher with MDS Key Matrix

by Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 13
Year of Publication: 2012
Authors: Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara
10.5120/9178-3587

Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara . Variable-length Hill Cipher with MDS Key Matrix. International Journal of Computer Applications. 57, 13 ( November 2012), 43-45. DOI=10.5120/9178-3587

@article{ 10.5120/9178-3587,
author = { Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara },
title = { Variable-length Hill Cipher with MDS Key Matrix },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 13 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number13/9178-3587/ },
doi = { 10.5120/9178-3587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:23.185112+05:30
%A Kondwani Magamba
%A Solomon Kadaleka
%A Ansley Kasambara
%T Variable-length Hill Cipher with MDS Key Matrix
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 13
%P 43-45
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Hill Cipher is a classical symmetric cipher which breaks plaintext into blocks of size m and then multiplies each block by an m×m key matrix to yield ciphertext. However, it is well known that the Hill cipher succumbs to cryptanalysis relatively easily. As a result, there have been efforts to strengthen the cipher through the use of various techniques e. g. permuting rows and columns of the key matrix to encrypt each plaintext vector with a new key matrix. In this paper, a method is proposed to strengthen the security of the Hill cipher against a known-plaintext attack by encrypting each plaintext matrix by a variable-length key matrix obtained from a Maximum Distance Separable (MDS) master key matrix.

References
  1. V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani, "A Block Cipher Involving a Key Applied on Both the Sides of the Plain Text," International Journal of Computer and Network Security (IJCNS), Vol. 1, No. 1, pp. 27 -30, Oct. 2009.
  2. V. U. K. Sastry and V. Janaki, "A Modified Hill Cipher with Multiple Keys", International Journal of Computational Science, Vol. 2, No. 6, 815-826, Dec. 2008.
  3. Bhibhudendra Acharya, Girija Sankar Rath, and Sarat Kumar Patra, "Novel Modified Hill Cipher Algorithm,"Proceedings of ICTAETS, pp. 126-130, 2008
  4. D. R. Stinson, 2006. "Cryptography Theory and Practice," 3rd edition, Chapman and Hall/CRC, pp. 13-37,
  5. Shahrokh Saeednia, "How to Make Hill cipher Secure," Cryptologia 24:4, pp. 353-360, Oct 2000.
  6. Ismail I A, Amin Mohammed, Diab Hossam, "How to Repair the Hill Cipher," Journal of Zhejiang University Science, 7(12), pp. 2022-2030, 2006.
  7. Overbey, J. , Traves, W. , and Wojdylo, J. , "On the keyspace of the Hill cipher," Cryptologia, 29(l), pp. 59-72, 2005.
  8. F. J. McWilliams and N. J. A. Sloane, 1977. "The Theory of Error Correcting Codes," Amsterdam, The Netherlands, North Holland.
  9. Sriram Ramanujam and Marimuthu Karuppiah, "Designing an algorithm with high Avalanche Effect,"IJCSNS International Journal of Computer Science and Network Security, VOL. 11, No. 1, 106-111 January 2011.
  10. Romero, Y. R. Garcia, R. V. et al. , "Comments on How to Repair the Hill Cipher," J. Zhejiang Univ. Sci. A 9(2): pp. 211-214, 2008.
  11. Chefranov, A. G. , "Secure Hill Cipher Modification," Proc. Of the First International Conference on Security of Information and Network (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, Elci, A. , Ors, B. , and Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-37, 2007.
  12. Daemen, J. , Rijmen, V. , The Design of Rijndael: "AES – The Advanced Encryption Standard. " Springer, 2002.
  13. Monem, A. M. , Rahma1 and Yacob, B. Z. ,"The Dynamic Dual Key Encryption Algorithm Based on joint Galois Fields," IJCSNS International Journal of Computer Science and Network Security, VOL. 11, No. 8, August 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MDS matrix Variable-Length Cipher