Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2008, Vol. 9 Issue (2): 211-214    DOI: 10.1631/jzus.A072143
Electrical & Electronic Engineering     
Comments on “How to repair the Hill cipher”
Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ
Computer Science Department, CINVESTAV-IPN, Av.IPN No. 2508 Col. San Pedro Zacatenco, Mexico City 07300, Mexico
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.

Key wordsHill cipher      Symmetric encryption      Image encryption     
Received: 26 June 2007      Published: 11 January 2008
CLC:  TN918  
  TP309  
Cite this article:

Y. RANGEL-ROMERO, R. VEGA-GARCÍA, A. MENCHACA-MÉNDEZ, D. ACOLTZI-CERVANTES, L. MARTÍNEZ-RAMOS, M. MECATE-ZAMBRANO, F. MONTALVO-LEZAMA, J. BARRÓN-VIDALES, N. CORTEZ-DUARTE, F. RODRÍGUEZ-HENRÍQUEZ. Comments on “How to repair the Hill cipher”. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 211-214.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A072143     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2008/V9/I2/211

[1] Cheng-qing LI, Dan ZHANG, Guan-rong CHEN. Cryptanalysis of an image encryption scheme based on the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1118-1123.
[2] ISMAIL I.A., AMIN Mohammed, DIAB Hossam. How to repair the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(12): 11-.
[3] ZHAO Xiao-yu, CHEN Gang, ZHANG Dan, WANG Xiao-hong, DONG Guang-chang. Decryption of pure-position permutation algorithms[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(7): 803-809.