TRANSPOLY HILL CIPHER — AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER

Main Article Content

ASHISH PANDEY
STUTI PANDEY
ABHAY KUMAR AGARWAL

Abstract

Every encryption technique is based on any one of two facts- substitution or transposition. Sometimes the combination of both techniques is used. A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols. The basic concept behind this paper is to improve the strength of Hill cipher, ‘a multiple-letter substitution cipher’ against known plaintext attack. This paper presents a modified approach which is an enhancement over traditional Hill cipher by using symmetric matrix of plaintext letters.

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

W. Stallings (Fourth Edition) Cryptography and Network Security. Pearson Education India. ISBN 9788177587746

Behrouz A. Forouzan & D. Mukhopadhyay (2015) CRYPTOGRAPHY AND NETWORK SECURITY. Mc Graw Hill India. ISBN 978-9339220945

S. Bose & P. Vijayakumar (First edition - 1 March 2016) CRYPTOGRAPHY AND NETWORK SECURITY. Pearson Education India. ISBN 978-9332543645

B. Menezes (1 edition - 1 April 2010) Network Security and Cryptography. Cengage. ISBN 978-8131513491

Keith M. Martin. Everyday Cryptography: Fundamental Principles and Applications. Oxford University Press India. ISBN 978-0199695591

W. Mao Modern Cryptography: Theory & Practice. Pearson Education. ISBN 978-8131702123