Electrical & Electronic Engineering |
|
|
|
|
Comments on “How to repair the Hill cipher” |
Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ |
Computer Science Department, CINVESTAV-IPN, Av.IPN No. 2508 Col. San Pedro Zacatenco, Mexico City 07300, Mexico |
|
|
Abstract A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.
|
Received: 26 June 2007
Published: 11 January 2008
|
|
|
Cite this article:
Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ. Comments on “How to repair the Hill cipher”. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.
URL:
http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A072143 OR http://www.zjujournals.com/xueshu/zjus-a/Y2008/V9/I2/211
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|