Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2006, Vol. 7 Issue (12): 11-    DOI: 10.1631/jzus.2006.A2022
    
How to repair the Hill cipher
ISMAIL I.A., AMIN Mohammed, DIAB Hossam
Faculty of Computers and Information, Zagazig University, Zagazig, 44511, Egypt; Computer Science Department, Faculty of Science, Menoufiya University, Shebeen El-kom, 32511, Egypt
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a main drawback of this algorithm is that it encrypts identical plaintext blocks to identical ciphertext blocks and cannot encrypt images that contain large areas of a single color. Thus, it does not hide all features of the image which reveals patterns in the plaintext. Moreover, it can be easily broken with a known plaintext attack revealing weak security. This paper presents a variant of the Hill cipher that overcomes these disadvantages. The proposed technique adjusts the encryption key to form a different key for each block encryption. Visually and computationally, experimental results demonstrate that the proposed variant yields higher security and significantly superior encryption quality compared to the original one.

Key wordsHill cipher      Image encryption      Modified Hill cipher      Quality of encryption     
Received: 20 March 2006     
CLC:  TP393  
Cite this article:

ISMAIL I.A., AMIN Mohammed, DIAB Hossam. How to repair the Hill cipher. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(12): 11-.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2006.A2022     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2006/V7/I12/11

[1] Cheng-qing LI, Dan ZHANG, Guan-rong CHEN. Cryptanalysis of an image encryption scheme based on the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1118-1123.
[2] Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ. Comments on “How to repair the Hill cipher”[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.
[3] ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang. Decryption of pure-position permutation algorithms[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(7): 803-809.