Conventional HILL Algorithm: From Classical Cryptography to Modern Cryptography
Keywords:
HILL Algorithm, Classic Cryptography, Modern CryptographyAbstract
With the development of modern computer tools using standard character encoding which assigns each graphic character a number, in particular the written characters of human language, HILL’s cipher, which, in its conventional version, uses the alphabet of 26 letters reaches its limits. It has also been demonstrated that the algorithm is fallible at a frequency analysis attack but also to a known plaintext attack.
For this purpose, in order to adapt the HILL’s cipher to modern communication systems and to strengthen its cryptographical security, we are proposing in this article an improvement of the algorithm. The study will mainly focused on an expansion of the alphabet and the secret key. Thus, the standard character-encoding (example of the ASCII code) will be used instead of a 26-letter alphabet and the secret key extended to three parameters with the additional use of two randomly chosen numbers from the set real numbers .
References
L. S. Hill. “Cryptography in an Algebraic Alphabet”. The American Mathematical Monthly, vol. 36, n°16, pp. 306-312, Juin-Juillet, 1929.
N. HADJ-SAID, A. ALI-PACHA, A. M’HAMED, A. BELGORAF. “ Sécurité des Données en se basant sur le Chiffre de Hill”..
F. Gmira, S. Hraoui, A. Saaidi, A. W. Jarar, K. Sator. “ L’Amélioration de la Sécurité du Chiffrement Algébrique Modulaire par les Générateurs de Fibonacci”. Mediterranean Telecommunication Journal. vol. 4, n°1, 2014.
S. William. Cryptography and network security. Pearson Education India, 2006.
C. Channon. “Communication theory of secrecy systems”. Bell System Technical Journal, vol. 328, n°14, pp. 656-715, 1949.
P. Guillot. La cryptologie : L'art des codes secret. EDP Sciences, 2013.
A. Kerckhoffs. “ La Cryptographie Militaire”. Journal des sciences militaires. vol. IX, pp. 5-38, Janvier 1983, pp. 161–191, Février 1883.
C. Ngô. Énergie, Entropie, Information, Cryptographie et Cybersécurité. EDP Sciences, 2019.
M. Videau. Critères de sécurité des algorithmes de chiffrement à clé secrète. Paris VI,Thèse de Doctorat, Université Pierre et Marie Curie, 2005.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 International Journal of Sciences: Basic and Applied Research (IJSBAR)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.