%0 Journal Article
%T A new approach of classical Hill Cipher in public key cryptography
%J International Journal of Nonlinear Analysis and Applications
%I Semnan University
%Z 2008-6822
%A Hasoun, Rajaa K.
%A Khlebus, Sameerah Faris
%A Tayyeh, Huda Kadhim
%D 2021
%\ 07/01/2021
%V 12
%N 2
%P 1071-1082
%! A new approach of classical Hill Cipher in public key cryptography
%K Asymmetric cryptosystem
%K Hill Cipher
%K Invertible Key Matrix
%K Involutory matrix
%K RSA cryptosystem
%K Symmetric cryptosystem
%R 10.22075/ijnaa.2021.5176
%X Secure message transformation promote the creation of various cryptography systems to enable receivers to interpret the transformed information. In the present age of information technology, the secure transfer of information is the main study of most agencies. In this study, a particular symmetric cryptography system, Hill Cipher method, is enhanced with the help of encryption and decryption algorithms of the asymmetric RSA cryptography system to avoid certain problems. Previous results show that the original Hill algorithms are still insufficient because of their weakness to known plaintext attack, and a modification of the Hill Cipher cryptography system is therefore presented to increase its invulnerability. The enhancement focuses on implementing the RSA algorithms over the Hill Cipher to increase its security efficiency. The suggested method relies on the security of the RSA and Hill Cipher cryptosystems to find the private decryption keys, and thus is much more secure and powerful than both methods applied separately. Also secure and dynamic generation of the Hill Cipher matrix instead of using static matrix are proposed. This new approach is composed of a public key cryptosystem that has a shared secret key (between participants only), public key (announced to all), and two private keys (for each person). Therefore, this new modification can increase the invulnerability of the Hill Cipher against future attacks during transmission of information between agencies in this age of information technology
%U https://ijnaa.semnan.ac.ir/article_5176_b9a2fab810d9bc150ad6e5924234ac9d.pdf