Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Electronics & Communication Engineering | India | Volume 2 Issue 4, April 2013

Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix

Rahul. R. Ravan, Atul R. Nigavekar

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a drawback of this algorithm is that the inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. This paper presents a variant of the Hill cipher that overcomes this disadvantage. The proposed technique adjusts the encryption key to form a different key for each block encryption. The proposed variant yields higher security compared to the original one. Also in this paper, a method of generating self-invertible matrix for Hill Cipher algorithm has been proposed. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption.

Keywords: Hill Cipher, Encryption, Decryption, Self-invertible matrix, modified Hill Cipher

Edition: Volume 2 Issue 4, April 2013

Pages: 392 - 395

Share this Article

How to Cite this Article?

Rahul. R. Ravan, Atul R. Nigavekar, "Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON2013695, Volume 2 Issue 4, April 2013, 392 - 395

108 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1791 - 1793

Image Encryption-Then-Compression System Operated in the Prediction Error Domain and Random Permutation

Sujatha D, Venkatakiran S

Share this Article

Informative Article, Electronics & Communication Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1774 - 1776

An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm

Vinay Kumar Soni, Prashant Puri Goswami

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1493 - 1496

Skein and Threefish Implementation on FPGA

Litty.P.Oommen, Anas A S

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 779 - 782

High Speed Advanced Encryption Standard Using Pipelining

Mradul Upadhyay, Utsav Malviya

Share this Article

Similar Articles with Keyword 'Decryption'

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2142 - 2145

Image Cryptography Based Upon Scrambling and Random Integer

Gurpreet Singh, Lovleen Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 230 - 233

Security Enhancement System through Reversible Data Embedding Technique in Encrypted Images

E. Famidha, G. Gajalakshmi, S. Devisaranya

Share this Article

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3221 - 3230

Implementation of RSA Cryptosystem Using Ancient Indian Vedic Mathematics

Shahina M. Salim, Sonal A. Lakhotiya

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1062 - 1066

Detect and Correct Single Event Upset of the AES Algorithm in On Board Satellite

Md. Riyaj, Vipin Gupta

Share this Article

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael?s Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article
Top