Conventional HILL Algorithm: From Classical Cryptography to Modern Cryptography

Authors

  • Matar Niane Information systems security expert, (Dakar, Senegal)

Keywords:

HILL Algorithm, Classic Cryptography, Modern Cryptography

Abstract

With the development of modern computer tools using standard character encoding which assigns each graphic character a number, in particular the written characters of human language, HILL’s cipher, which, in its conventional version, uses the alphabet of 26 letters reaches its limits. It has also been demonstrated that the algorithm is fallible at a frequency analysis attack but also to a known plaintext attack.

For this purpose, in order to adapt the HILL’s cipher to modern communication systems and to strengthen its cryptographical security, we are proposing in this article an improvement of the algorithm. The study will mainly focused on an expansion of the alphabet and the secret key. Thus, the standard character-encoding (example of the ASCII code) will be used instead of a 26-letter alphabet and the secret key extended to three parameters with the additional use of two randomly chosen numbers  from the set real numbers .

References

L. S. Hill. “Cryptography in an Algebraic Alphabet”. The American Mathematical Monthly, vol. 36, n°16, pp. 306-312, Juin-Juillet, 1929.

N. HADJ-SAID, A. ALI-PACHA, A. M’HAMED, A. BELGORAF. “ Sécurité des Données en se basant sur le Chiffre de Hill”..

F. Gmira, S. Hraoui, A. Saaidi, A. W. Jarar, K. Sator. “ L’Amélioration de la Sécurité du Chiffrement Algébrique Modulaire par les Générateurs de Fibonacci”. Mediterranean Telecommunication Journal. vol. 4, n°1, 2014.

S. William. Cryptography and network security. Pearson Education India, 2006.

C. Channon. “Communication theory of secrecy systems”. Bell System Technical Journal, vol. 328, n°14, pp. 656-715, 1949.

P. Guillot. La cryptologie : L'art des codes secret. EDP Sciences, 2013.

A. Kerckhoffs. “ La Cryptographie Militaire”. Journal des sciences militaires. vol. IX, pp. 5-38, Janvier 1983, pp. 161–191, Février 1883.

C. Ngô. Énergie, Entropie, Information, Cryptographie et Cybersécurité. EDP Sciences, 2019.

M. Videau. Critères de sécurité des algorithmes de chiffrement à clé secrète. Paris VI,Thèse de Doctorat, Université Pierre et Marie Curie, 2005.

Downloads

Published

2022-09-04

How to Cite

Matar Niane. (2022). Conventional HILL Algorithm: From Classical Cryptography to Modern Cryptography. International Journal of Sciences: Basic and Applied Research (IJSBAR), 63(2), 213–222. Retrieved from https://www.gssrr.org/index.php/JournalOfBasicAndApplied/article/view/14368

Issue

Section

Articles