SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_____________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -13
ENCRYPTION USING LESTER HILL CIPHER
ALGORITHM
Thangarasu.N Dr.Arul Lawrence SelvaKumar
Research Scholar in Department of Computer Science Dean & Professor, Department of CSE
Bharathiar University,Coimbatore Rajiv Gandhi Institute of Technology,Bangalore
Abstract - The Hill cipher algorithm is one of the symmetrickey algorithms that have several advantages in data
encryption as well as decryptions. But, the inverse of the key matrix used for encrypting the plaintext does not always
exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involuntary matrix
generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to
find the inverse of the key matrix. The objective of this paper is to encrypt an text using a technique different from the
conventional Hill Cipher.
Keyword - Encryption, Decryption, Key, Plain Text, Cipher Text, Hill Cipher
I. INTRODUCTION
Conventional Encryption is referred to as symmetric encryption or single key encryption. It was the only type of
encryption in use prior to the development of public-key encryption. Conventional encryption can further be divided into the
categories of classical and modern techniques. The information security is an increasingly important problem. Cryptography,
the science of encryption, plays a central role in mobile phone communications, pay-TV, e-commerce, sending private
emails, transmitting financial information, security of ATM cards, computer passwords, and touches on many aspects of our
daily lives. Cryptography is the art or science encompassing the principles and methods of transforming an intelligible
message (plaintext) into one that is unintelligible (cipher text) and then retransforming that message back to its original form.
In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated
closely with information theory, computer security, andengineering [1]
Substitution cipher is one of the basic components of classical ciphers. A substitution cipher is a method of
encryption by which units of plaintext are substituted with cipher text according to a regular system; the units may be single
letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the
text by performing an inverse substitution [3]. The units of the plaintext are retained in the same sequence as in the cipher
text, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates
on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed
polygraphic.
In this paper, we have proposed aHill cipher algorithm which uses an involuntary key matrix for encryption. The
objective of this paper is to overcome the drawback of using a random key matrix in Hill cipher algorithm for encryption,
where we may not be able to decrypt the encrypted message, if the key matrix is not invertible. Also the computational
complexity can be reduced by avoiding the process of finding inverse of the matrix at the time of decryption, as we use
involuntary key matrix for encryption. Using this key matrix we encrypted text. Our algorithm works well for all types of
text except for the encrypted text as well as decrypt text.
II. HILL CIPHER
It is developed by the mathematician Lester Hill. The core of Hill cipher is matrix manipulations. For encryption,
algorithm takes m successive plaintext letters and instead of that substitutes m cipher letters. In Hill cipher, each character is
assigned a numerical value as reverse order like a= 25, b= 24, ..., z = 0[2][4]. The substitution of cipher text letters in the
place of plaintext letters leads to m linear equation. The Hill Cipher is a linear algebra technique [6] but it relies on modular
arithmetic. So we will give a quick reminder on modular calculations. Throughout the 0discussion we will let n be the
modulus, so n will be an integer and n ≥ 2.
Definition 1:
Let m and k be two integers, then we say that m ≡ k (mod n), if n | (m-k), that is, n divides the quantity m - k evenly.
Definition 2:
Let k be an integer, when we write k (mod n), we mean the number m that is in the range 25≤ m < n such that m ≡ k (mod n).
Arithmetic:
Addition, subtraction, and multiplication modulo a number are fairly straight forward. Simply does the addition, subtraction,
or multiplication as usual then take the result mod the number [4]
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_____________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -14
Definition 3:
Let k be an integer, then k-1
(mod n) is the number m that is in the range 0≤ m < n such that m .k (mod n) ≡1, if m exists. If no
such number m exists then we say that k does not have an inverse modulo n or that k is not invertible mod n.
Theorem 1: Let k be an integer, then k-1
(mod n) exists if and only if the greatest common divisor of k and n is 1, that is, gcd
(k, n) = 1. Another way to say this is that k and n are relatively prime [1]
Theorem 2: Let A be an n * n integer matrix, then A-1
(mod n) exists if and only if det(A) is invertible modulo n. That is, if
and only if (det(A))-1
(mod n) exists.
III. ENCRYPTION WITH THE HILL CIPHER
The Hill Cipher Encryption Algorithm
1. Find an n * n matrix E that is invertible modulo 26. This is actually the encryption key.
2. Take the message that is to be sent (the plaintext), remove all of the spaces and punctuation symbols, and convert the
letters into all uppercase.
3. Convert each character to a number between 0 and 25. The usual way to do this is A = 25, B = 24, C = 23. . . Z = 0.
A B C D E F G H I J K L M
25 24 23 22 21 20 19 18 17 16 15 14 13
N O P Q R S T U V W X Y Z
12 11 10 9 8 7 6 5 4 3 2 1 0
As a historical note, Lester Hill [5] did not use this coding of letters to numbers; he simply mixed up the order. Mixing up the
order does not make the method more secure, it simply combines the Hill cipher with a simple substitution cipher, which is
easy to break.
4. Divide this string of numbers up into blocks of size n. Note that if E is an n * n Matrix then the block size is n. Another
note, if the message does not break evenly into blocks of size n we pad the ending of the message with characters, this
can be done at random.
5. Write each block as a column vector of size n. At this point the message is a sequence of n-dimensional vectors, v1,
v2,.......,vt.
6. Take each of the vectors and multiply them by the encryption matrix E, so
Ev1 = V1
Ev2 = V2
Ev3 = V3
...
Evt = Vt
7. Take the vectors v1, v2,.......,vt., write the entries of the vectors in order, convert the numbers back to characters and
you have your cipher text. One note about this algorithm is that we can do step 6 with a single matrix multiplication.If
we let the message matrix M and E there for EM=C
EXAMPLE:
Say Alice wants to send Bob the message “SRIROSAN IS A GOOD BOY”
1. Alice chooses the block size n = 3 and chooses the encryption matrix E to be
2 4 5
E= 2 7 8
4 6 2
Since det(E) (mod 26) = 12, and 12 is invertible modulo 26, the matrix E is also invertible modulo 26.
2. The message that is to be sent is “SRIROSAN ISAGOODBOY ", removing the spaces and 0punctuation symbols, and
convert the letters into all uppercase gives
SRIROSAN ISAGOODBOY
3. Conversion to numbers using A = 25, B = 24, C = 23, . . . , Z = 0, gives
7 8 17 8 11 7 25 12 17 7 25 19 11 11 22 24 11 1
So no padding is needed here.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_____________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -15
4. Dividing this string of numbers up into blocks of size 3.
7 8 17 8 11 7 25 12 17 7 25 19 11 11 22 24 11 1
so no padding is needed here.
5. Converting these blocks into a message matrix M gives,
7 8 17 8 11 7
M= 25 12 17 7 25 19
11 11 22 24 11 1
6. Multiply by the encryption matrix E,
2 4 5
E= 2 7 8
4 6 2
7 8 17 8 11 7
M= 25 12 17 7 25 19
11 11 22 24 11 1
Therefore EM = C
C= 20 23 21 16 6 24
17 6 17 23 25 25
18 22 6 18 8 14
7. Convert C into the cipher text.
20 23 21 16 6 24 F C E J T B
17 6 17 23 25 25 I T I C A A
18 22 6 18 8 14 H D T H R L
FCEJTBITICAAHDTHRL
So Alice will send “FCEJTBITICAAHDTHRL" to Bob.
Since this is a symmetric cipher, Alice and Bob would have to share this key with each other. They obviously could not
simply call or text each other with this information since Eve could easily intercept that call or text and would know the
key[9].
So either Alice or Bob would have to meet in person, in a secure location, and exchange the key or they would need some
other trusted person to deliver the key from Alice to Bob. This difficulty in exchanging the key securely gave rise to the
creation of public-key systems which are comm. only used today, for more information on public-key systems please see the
references [4].
IV. DECRYPTION WITH THE HILL CIPHER
Now that Bob has the encrypted message and the encryption key he can decrypt the message that Alice had sent to him. The
decryption algorithm is essentially the same as the encryption algorithm, except that we use E 1 in place of E.
Since EM = C, and E is invertible we can calculate M = E-1
C. We will call D = E-1
the decryption matrix, so DC = M.
Remember that this inverse is the inverse modulo 26 [8].
THE HILL CIPHER DECRYPTION ALGORITHM
1. Find D = E-1
(mod 26). This is the decryption key.
2. Take the cipher text and convert it to the matrix C.
3. Calculate DC = M.
4. Convert the matrix M to the plaintext message. You may need to insert the appropriate spaces and punctuation
symbols since these were removed.
CRYPTOGRAPHIC SYSTEMS ARE GENERALLY CLASSIFIED ALONG THREE INDEPENDENT DIMENSIONS:
1. Type of operations used for transforming plaintext to cipher text. All encryption algorithms are based on two general
principles.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_____________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -16
2. Those are substitution, in which each element in the plain text is mapped into another element and transposition in which
elements in the plaintext are rearranged. The fundamental requirement is that no information be lost. Most systems
referred to as product systems, involved multiple stages of substitution and transposition [2].
3. The number of keys used: If sender and receiver use the same key, the system is referred to as symmetric, single key or
secret key conventional encryption. If the sender and the receiver each uses a different key the system is referred to as
asymmetric, two key, or public-key encryption [3].
4. The way in which the plaintext is processed: A block cipher processes the input on block of elements at a time,
producing an output block for each input block. A stream cipher processes the input elements continuously, producing
output one element at a time, as it goes along [4].
V. IMPLEMENTATION FOR THE PROBLEM IN SCILAB USING CIPHER TEXT
VI. CONCLUSION
We have given formulae for the numbers of n*n invertible and involuntary matrices mod m. We note that, while
involuntary matrices may save decryption time, requiring that key matrices be involuntary significantly reduces the size of
the key. We have also observed that, while increasing the dimension of key matrices leads to a larger key, increasing the
modulus (i.e., the size of the alphabet) may not.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_____________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -17
When. Thus, the largest key spaces result from a large matrix dimension and an alphabet of prime order. This
significantly increased the resistance of the algorithm to the known plaintext attack. Hill also implements an involuntary key
generation algorithmwhere the same matrix key can be used for both encryption and decryption.
REFERENCE
[1]. Bidhudendra Acharya, GirijaSankarRath, Sarat Kumar Patra, Saroj Kumar Panigraphy 2007. Novel Methods of
generating Self-Invertible Matrix for hill Cipher Algorithm, International Journal of Security, Volume 1, Issue 1,2007,
PP.14-21.
[2]. Menezes, A.J.,P.C. Van Oorschot, S.A.Van Stone.1996. Handbook of applied Cryptography. CRC press.
[3]. Saeednia, S., 2000.How to make the Hill Cipher secure. Cryptologia,24(4):353-360.
[4]. Stallings, W. Cryptography and Network Security, 2005. 4th
edition, Prentice Hall.
[5]. Lester S. Hill. Cryptography in an Algebraic Alphabet. Amer. Math.
[6]. David Lay. Linear Algebra and its Applications. Pearson, Boston, 3rd edition, 2006.
[7]. Maxima Computer Algebra System. http://maxima.sourceforge.net/, 2013.
[8]. D. Luciano and G. Prichett, “From Caesar Ciphers to Public-Key Cryptosystem”,.
[9]. M. Toorani and A. Falahati, “A Secure Variant of the Hill Cipher”, in Proc. www.scilab.org/download/latest

More Related Content

What's hot

Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network securityArthyR3
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
Application of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemApplication of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemMuhammad Waqas
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matricesdianasc04
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmAlexander Decker
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Austin Benson
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Design and Implementation of a Secure Communication Protocol
Design and Implementation of a Secure Communication Protocol Design and Implementation of a Secure Communication Protocol
Design and Implementation of a Secure Communication Protocol IJECEIAES
 
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONijscmcj
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGJournal For Research
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 

What's hot (19)

Cs6701 cryptography and network security
Cs6701 cryptography and network securityCs6701 cryptography and network security
Cs6701 cryptography and network security
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
Application of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemApplication of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problem
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matrices
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
B046030712
B046030712B046030712
B046030712
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Network Security CS3-4
Network Security CS3-4 Network Security CS3-4
Network Security CS3-4
 
Design and Implementation of a Secure Communication Protocol
Design and Implementation of a Secure Communication Protocol Design and Implementation of a Secure Communication Protocol
Design and Implementation of a Secure Communication Protocol
 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
 
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
G029037043
G029037043G029037043
G029037043
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 

Viewers also liked

Cipher techniques
Cipher techniquesCipher techniques
Cipher techniquesMohd Arif
 
Music consultant performance appraisal
Music consultant performance appraisalMusic consultant performance appraisal
Music consultant performance appraisalEmmanuelPetit678
 
Vandita bomb pgp30235
Vandita bomb pgp30235Vandita bomb pgp30235
Vandita bomb pgp30235Sameer Mathur
 
XX Julie Brody EDITED Thesis-1
XX Julie Brody EDITED Thesis-1XX Julie Brody EDITED Thesis-1
XX Julie Brody EDITED Thesis-1julie brody
 
Fórmulas de excel
Fórmulas de excelFórmulas de excel
Fórmulas de excelsaut coello
 
CM [008] Newton's Principia
CM [008] Newton's PrincipiaCM [008] Newton's Principia
CM [008] Newton's PrincipiaStephen Kwong
 
AAAD [02] Electrical
AAAD [02] ElectricalAAAD [02] Electrical
AAAD [02] ElectricalStephen Kwong
 
5 Body Parts That You Are Not Cleaning Properly
5 Body Parts That You Are Not Cleaning Properly5 Body Parts That You Are Not Cleaning Properly
5 Body Parts That You Are Not Cleaning ProperlyHealth Care At Home India
 
On Site Flu Clinics For Your Business
On Site Flu Clinics For Your BusinessOn Site Flu Clinics For Your Business
On Site Flu Clinics For Your BusinessMeagan Wilson
 
Smm competitive brief
Smm competitive briefSmm competitive brief
Smm competitive briefnkmilner
 
Final Chairs and Secretaries Day Presentation
Final Chairs and Secretaries Day PresentationFinal Chairs and Secretaries Day Presentation
Final Chairs and Secretaries Day PresentationKirsten Crawford
 
Polarizing brands_group 10
Polarizing brands_group 10Polarizing brands_group 10
Polarizing brands_group 10Sameer Mathur
 
Analysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant SenseAnalysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant SenseAM Publications
 
A314 Final Proposal, Out of School Learning Group
A314 Final Proposal, Out of School Learning GroupA314 Final Proposal, Out of School Learning Group
A314 Final Proposal, Out of School Learning GroupJeffrey Silva
 
Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?Stephen Kwong
 

Viewers also liked (19)

Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Music consultant performance appraisal
Music consultant performance appraisalMusic consultant performance appraisal
Music consultant performance appraisal
 
resume
resumeresume
resume
 
Vandita bomb pgp30235
Vandita bomb pgp30235Vandita bomb pgp30235
Vandita bomb pgp30235
 
XX Julie Brody EDITED Thesis-1
XX Julie Brody EDITED Thesis-1XX Julie Brody EDITED Thesis-1
XX Julie Brody EDITED Thesis-1
 
Fórmulas de excel
Fórmulas de excelFórmulas de excel
Fórmulas de excel
 
CM [008] Newton's Principia
CM [008] Newton's PrincipiaCM [008] Newton's Principia
CM [008] Newton's Principia
 
AAAD [02] Electrical
AAAD [02] ElectricalAAAD [02] Electrical
AAAD [02] Electrical
 
Happy mornings!
Happy mornings!Happy mornings!
Happy mornings!
 
5 Body Parts That You Are Not Cleaning Properly
5 Body Parts That You Are Not Cleaning Properly5 Body Parts That You Are Not Cleaning Properly
5 Body Parts That You Are Not Cleaning Properly
 
On Site Flu Clinics For Your Business
On Site Flu Clinics For Your BusinessOn Site Flu Clinics For Your Business
On Site Flu Clinics For Your Business
 
Cv gulam (1)
Cv gulam (1)Cv gulam (1)
Cv gulam (1)
 
Smm competitive brief
Smm competitive briefSmm competitive brief
Smm competitive brief
 
Final Chairs and Secretaries Day Presentation
Final Chairs and Secretaries Day PresentationFinal Chairs and Secretaries Day Presentation
Final Chairs and Secretaries Day Presentation
 
Polarizing brands_group 10
Polarizing brands_group 10Polarizing brands_group 10
Polarizing brands_group 10
 
Analysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant SenseAnalysis of Media Graphs and Significant Sense
Analysis of Media Graphs and Significant Sense
 
A314 Final Proposal, Out of School Learning Group
A314 Final Proposal, Out of School Learning GroupA314 Final Proposal, Out of School Learning Group
A314 Final Proposal, Out of School Learning Group
 
Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?Cosmic Adventure Episode 2.04 Where did these equations come from?
Cosmic Adventure Episode 2.04 Where did these equations come from?
 

Similar to ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...eSAT Journals
 
A novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key bunchA novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key buncheSAT Publishing House
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...ijtsrd
 
IRJET- Formulation of a Secure Communication Protocol and its Implementation
IRJET-  	  Formulation of a Secure Communication Protocol and its ImplementationIRJET-  	  Formulation of a Secure Communication Protocol and its Implementation
IRJET- Formulation of a Secure Communication Protocol and its ImplementationIRJET Journal
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionBRNSSPublicationHubI
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
New Digital Signature Protocol Based on Elliptic Curves
New Digital Signature Protocol Based on Elliptic CurvesNew Digital Signature Protocol Based on Elliptic Curves
New Digital Signature Protocol Based on Elliptic Curvesijcisjournal
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmeSAT Journals
 
A comprehensive framework for secure query processing on relational data in t...
A comprehensive framework for secure query processing on relational data in t...A comprehensive framework for secure query processing on relational data in t...
A comprehensive framework for secure query processing on relational data in t...Totan Banik
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...IJECEIAES
 
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsSymmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsIJECEIAES
 

Similar to ENCRYPTION USING LESTER HILL CIPHER ALGORITHM (20)

A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
 
A novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key bunchA novel block cipher involving keys in a key bunch
A novel block cipher involving keys in a key bunch
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
 
IRJET- Formulation of a Secure Communication Protocol and its Implementation
IRJET-  	  Formulation of a Secure Communication Protocol and its ImplementationIRJET-  	  Formulation of a Secure Communication Protocol and its Implementation
IRJET- Formulation of a Secure Communication Protocol and its Implementation
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
The RSA Algorithm Explored
The RSA Algorithm ExploredThe RSA Algorithm Explored
The RSA Algorithm Explored
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
G0423538
G0423538G0423538
G0423538
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
New Digital Signature Protocol Based on Elliptic Curves
New Digital Signature Protocol Based on Elliptic CurvesNew Digital Signature Protocol Based on Elliptic Curves
New Digital Signature Protocol Based on Elliptic Curves
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
 
A comprehensive framework for secure query processing on relational data in t...
A comprehensive framework for secure query processing on relational data in t...A comprehensive framework for secure query processing on relational data in t...
A comprehensive framework for secure query processing on relational data in t...
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
 
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsSymmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _____________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -13 ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Dr.Arul Lawrence SelvaKumar Research Scholar in Department of Computer Science Dean & Professor, Department of CSE Bharathiar University,Coimbatore Rajiv Gandhi Institute of Technology,Bangalore Abstract - The Hill cipher algorithm is one of the symmetrickey algorithms that have several advantages in data encryption as well as decryptions. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involuntary matrix generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to find the inverse of the key matrix. The objective of this paper is to encrypt an text using a technique different from the conventional Hill Cipher. Keyword - Encryption, Decryption, Key, Plain Text, Cipher Text, Hill Cipher I. INTRODUCTION Conventional Encryption is referred to as symmetric encryption or single key encryption. It was the only type of encryption in use prior to the development of public-key encryption. Conventional encryption can further be divided into the categories of classical and modern techniques. The information security is an increasingly important problem. Cryptography, the science of encryption, plays a central role in mobile phone communications, pay-TV, e-commerce, sending private emails, transmitting financial information, security of ATM cards, computer passwords, and touches on many aspects of our daily lives. Cryptography is the art or science encompassing the principles and methods of transforming an intelligible message (plaintext) into one that is unintelligible (cipher text) and then retransforming that message back to its original form. In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, andengineering [1] Substitution cipher is one of the basic components of classical ciphers. A substitution cipher is a method of encryption by which units of plaintext are substituted with cipher text according to a regular system; the units may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing an inverse substitution [3]. The units of the plaintext are retained in the same sequence as in the cipher text, but the units themselves are altered. There are a number of different types of substitution cipher. If the cipher operates on single letters, it is termed a simple substitution cipher; a cipher that operates on larger groups of letters is termed polygraphic. In this paper, we have proposed aHill cipher algorithm which uses an involuntary key matrix for encryption. The objective of this paper is to overcome the drawback of using a random key matrix in Hill cipher algorithm for encryption, where we may not be able to decrypt the encrypted message, if the key matrix is not invertible. Also the computational complexity can be reduced by avoiding the process of finding inverse of the matrix at the time of decryption, as we use involuntary key matrix for encryption. Using this key matrix we encrypted text. Our algorithm works well for all types of text except for the encrypted text as well as decrypt text. II. HILL CIPHER It is developed by the mathematician Lester Hill. The core of Hill cipher is matrix manipulations. For encryption, algorithm takes m successive plaintext letters and instead of that substitutes m cipher letters. In Hill cipher, each character is assigned a numerical value as reverse order like a= 25, b= 24, ..., z = 0[2][4]. The substitution of cipher text letters in the place of plaintext letters leads to m linear equation. The Hill Cipher is a linear algebra technique [6] but it relies on modular arithmetic. So we will give a quick reminder on modular calculations. Throughout the 0discussion we will let n be the modulus, so n will be an integer and n ≥ 2. Definition 1: Let m and k be two integers, then we say that m ≡ k (mod n), if n | (m-k), that is, n divides the quantity m - k evenly. Definition 2: Let k be an integer, when we write k (mod n), we mean the number m that is in the range 25≤ m < n such that m ≡ k (mod n). Arithmetic: Addition, subtraction, and multiplication modulo a number are fairly straight forward. Simply does the addition, subtraction, or multiplication as usual then take the result mod the number [4]
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _____________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -14 Definition 3: Let k be an integer, then k-1 (mod n) is the number m that is in the range 0≤ m < n such that m .k (mod n) ≡1, if m exists. If no such number m exists then we say that k does not have an inverse modulo n or that k is not invertible mod n. Theorem 1: Let k be an integer, then k-1 (mod n) exists if and only if the greatest common divisor of k and n is 1, that is, gcd (k, n) = 1. Another way to say this is that k and n are relatively prime [1] Theorem 2: Let A be an n * n integer matrix, then A-1 (mod n) exists if and only if det(A) is invertible modulo n. That is, if and only if (det(A))-1 (mod n) exists. III. ENCRYPTION WITH THE HILL CIPHER The Hill Cipher Encryption Algorithm 1. Find an n * n matrix E that is invertible modulo 26. This is actually the encryption key. 2. Take the message that is to be sent (the plaintext), remove all of the spaces and punctuation symbols, and convert the letters into all uppercase. 3. Convert each character to a number between 0 and 25. The usual way to do this is A = 25, B = 24, C = 23. . . Z = 0. A B C D E F G H I J K L M 25 24 23 22 21 20 19 18 17 16 15 14 13 N O P Q R S T U V W X Y Z 12 11 10 9 8 7 6 5 4 3 2 1 0 As a historical note, Lester Hill [5] did not use this coding of letters to numbers; he simply mixed up the order. Mixing up the order does not make the method more secure, it simply combines the Hill cipher with a simple substitution cipher, which is easy to break. 4. Divide this string of numbers up into blocks of size n. Note that if E is an n * n Matrix then the block size is n. Another note, if the message does not break evenly into blocks of size n we pad the ending of the message with characters, this can be done at random. 5. Write each block as a column vector of size n. At this point the message is a sequence of n-dimensional vectors, v1, v2,.......,vt. 6. Take each of the vectors and multiply them by the encryption matrix E, so Ev1 = V1 Ev2 = V2 Ev3 = V3 ... Evt = Vt 7. Take the vectors v1, v2,.......,vt., write the entries of the vectors in order, convert the numbers back to characters and you have your cipher text. One note about this algorithm is that we can do step 6 with a single matrix multiplication.If we let the message matrix M and E there for EM=C EXAMPLE: Say Alice wants to send Bob the message “SRIROSAN IS A GOOD BOY” 1. Alice chooses the block size n = 3 and chooses the encryption matrix E to be 2 4 5 E= 2 7 8 4 6 2 Since det(E) (mod 26) = 12, and 12 is invertible modulo 26, the matrix E is also invertible modulo 26. 2. The message that is to be sent is “SRIROSAN ISAGOODBOY ", removing the spaces and 0punctuation symbols, and convert the letters into all uppercase gives SRIROSAN ISAGOODBOY 3. Conversion to numbers using A = 25, B = 24, C = 23, . . . , Z = 0, gives 7 8 17 8 11 7 25 12 17 7 25 19 11 11 22 24 11 1 So no padding is needed here.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _____________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -15 4. Dividing this string of numbers up into blocks of size 3. 7 8 17 8 11 7 25 12 17 7 25 19 11 11 22 24 11 1 so no padding is needed here. 5. Converting these blocks into a message matrix M gives, 7 8 17 8 11 7 M= 25 12 17 7 25 19 11 11 22 24 11 1 6. Multiply by the encryption matrix E, 2 4 5 E= 2 7 8 4 6 2 7 8 17 8 11 7 M= 25 12 17 7 25 19 11 11 22 24 11 1 Therefore EM = C C= 20 23 21 16 6 24 17 6 17 23 25 25 18 22 6 18 8 14 7. Convert C into the cipher text. 20 23 21 16 6 24 F C E J T B 17 6 17 23 25 25 I T I C A A 18 22 6 18 8 14 H D T H R L FCEJTBITICAAHDTHRL So Alice will send “FCEJTBITICAAHDTHRL" to Bob. Since this is a symmetric cipher, Alice and Bob would have to share this key with each other. They obviously could not simply call or text each other with this information since Eve could easily intercept that call or text and would know the key[9]. So either Alice or Bob would have to meet in person, in a secure location, and exchange the key or they would need some other trusted person to deliver the key from Alice to Bob. This difficulty in exchanging the key securely gave rise to the creation of public-key systems which are comm. only used today, for more information on public-key systems please see the references [4]. IV. DECRYPTION WITH THE HILL CIPHER Now that Bob has the encrypted message and the encryption key he can decrypt the message that Alice had sent to him. The decryption algorithm is essentially the same as the encryption algorithm, except that we use E 1 in place of E. Since EM = C, and E is invertible we can calculate M = E-1 C. We will call D = E-1 the decryption matrix, so DC = M. Remember that this inverse is the inverse modulo 26 [8]. THE HILL CIPHER DECRYPTION ALGORITHM 1. Find D = E-1 (mod 26). This is the decryption key. 2. Take the cipher text and convert it to the matrix C. 3. Calculate DC = M. 4. Convert the matrix M to the plaintext message. You may need to insert the appropriate spaces and punctuation symbols since these were removed. CRYPTOGRAPHIC SYSTEMS ARE GENERALLY CLASSIFIED ALONG THREE INDEPENDENT DIMENSIONS: 1. Type of operations used for transforming plaintext to cipher text. All encryption algorithms are based on two general principles.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _____________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -16 2. Those are substitution, in which each element in the plain text is mapped into another element and transposition in which elements in the plaintext are rearranged. The fundamental requirement is that no information be lost. Most systems referred to as product systems, involved multiple stages of substitution and transposition [2]. 3. The number of keys used: If sender and receiver use the same key, the system is referred to as symmetric, single key or secret key conventional encryption. If the sender and the receiver each uses a different key the system is referred to as asymmetric, two key, or public-key encryption [3]. 4. The way in which the plaintext is processed: A block cipher processes the input on block of elements at a time, producing an output block for each input block. A stream cipher processes the input elements continuously, producing output one element at a time, as it goes along [4]. V. IMPLEMENTATION FOR THE PROBLEM IN SCILAB USING CIPHER TEXT VI. CONCLUSION We have given formulae for the numbers of n*n invertible and involuntary matrices mod m. We note that, while involuntary matrices may save decryption time, requiring that key matrices be involuntary significantly reduces the size of the key. We have also observed that, while increasing the dimension of key matrices leads to a larger key, increasing the modulus (i.e., the size of the alphabet) may not.
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _____________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -17 When. Thus, the largest key spaces result from a large matrix dimension and an alphabet of prime order. This significantly increased the resistance of the algorithm to the known plaintext attack. Hill also implements an involuntary key generation algorithmwhere the same matrix key can be used for both encryption and decryption. REFERENCE [1]. Bidhudendra Acharya, GirijaSankarRath, Sarat Kumar Patra, Saroj Kumar Panigraphy 2007. Novel Methods of generating Self-Invertible Matrix for hill Cipher Algorithm, International Journal of Security, Volume 1, Issue 1,2007, PP.14-21. [2]. Menezes, A.J.,P.C. Van Oorschot, S.A.Van Stone.1996. Handbook of applied Cryptography. CRC press. [3]. Saeednia, S., 2000.How to make the Hill Cipher secure. Cryptologia,24(4):353-360. [4]. Stallings, W. Cryptography and Network Security, 2005. 4th edition, Prentice Hall. [5]. Lester S. Hill. Cryptography in an Algebraic Alphabet. Amer. Math. [6]. David Lay. Linear Algebra and its Applications. Pearson, Boston, 3rd edition, 2006. [7]. Maxima Computer Algebra System. http://maxima.sourceforge.net/, 2013. [8]. D. Luciano and G. Prichett, “From Caesar Ciphers to Public-Key Cryptosystem”,. [9]. M. Toorani and A. Falahati, “A Secure Variant of the Hill Cipher”, in Proc. www.scilab.org/download/latest