A new approach of classical Hill Cipher in public key cryptography

Document Type : Research Paper

Authors

College of Business Informatics, University of Information Technology and Communication, Iraq

Abstract

Secure message transformation promote the creation of various cryptography systems to enable re￾ceivers to interpret the transformed information. In the present age of information technology, the secure transfer of information is the main study of most agencies. In this study, a particular symmetric cryptography system, Hill Cipher method, is enhanced with the help of encryption and decryption algorithms of the asymmetric RSA cryptography system to avoid certain problems. Previous results show that the original Hill algorithms are still insufficient because of their weakness to known plaintext attack, and a modification of the Hill Cipher cryptography system is therefore presented to increase its invulnerability. The enhancement focuses on implementing the RSA algorithms over the Hill Cipher to increase its security efficiency. The suggested method relies on the security of the RSA and Hill Cipher cryptosystems to find the private decryption keys, and thus is much more secure and powerful than both methods applied separately. Also secure and dynamic generation of the Hill Cipher matrix instead of using static matrix are proposed. This new approach is composed of a public key cryptosystem that has a shared secret key (between participants only), public key (announced to all), and two private keys (for each person). Therefore, this new modification can increase the invulnerability of the Hill Cipher against future attacks during transmission of information between agencies in this age of information technology 

Keywords

[1] O.G. Abood, et al., A survey on cryptography algorithms international journal of scientific and research publications, 7 (2018).
[2] S. Al-Kaabi, et al., Methods toward enhancing RSA algorithm, International Journal of Network Security & Its Applications (IJNSA) 3 (2019).
[3] M. Attique, et al., Security enhancement of Hill cipher by using non-square matrix approach, 4th International conference on Knowledge and Innovation in engineering, science and technology, (2018) 21-23.
[4] H. Chien-Lung et al., A supervising authenticated encryption scheme for multilevel security, IJICIC (2011).
[5] A. ElHabshy, Augmented Hill cipher, International Journal of Network Security. 5 (2019) 812-818.
[6] I.A. Ismail, et al., How to repair the Hill cipher. Journal of Zhejiang University-Science A, 12 (2006) 2022-2030.
[7] A. Joseph Amalraj, et al., A Survey Paper on Cryptography Techniques, IJCSMC, 8 (2016) 55 59.
[8] J. Overbey, et al., On the keyspace of the Hill cipher. Cryptologia Journal, 1 (2005) 59-72.
[9] F. Qazi, et al., Modification in Hill cipher for cryptographic application, 3 CTecnologa. Glosas de innovacinaplicadas a la pyme, Special Issue, (2019) 240-257.
[10] D.R. Stinson, Cryptography Theory and Practice 3 rd edition, Chapman & Hall/CRC, (2006) 13-37.
[11] M. Toorani, et al., A secure variant of the Hill cipher. Proceedings of the 14th IEEE Symposium on Computers and Communications, (2009) 313-316.
Volume 12, Issue 2
November 2021
Pages 1071-1082
  • Receive Date: 07 March 2021
  • Revise Date: 19 April 2021
  • Accept Date: 04 May 2021