Academic literature on the topic 'Hill cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hill cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hill cipher"

1

Sreeja and Kumar Sharma Mohit. "Advanced Encryption Standard (AES) and Hill Cipher: A Comparative Study." International Journal of Innovative Science and Research Technology 7, no. 12 (2023): 1983–85. https://doi.org/10.5281/zenodo.7553080.

Full text
Abstract:
From ancient time onwards encryption techniques are used to alter plain text in to cryptic text, to protect privacy of the message and also to ensure the security of the message. Various algorithms are used for encryption and its sole purpose is to ensure the privacy of the message. The objective of this research article is to decipher and compare the traditional encryption technique Hill Cipher and modern encryption method, the AES. Hill Cipher and AES are part of the symmetric encryption meaning that encryption and decryption process uses the same key and in both Hill Cipher and AES Algorith
APA, Harvard, Vancouver, ISO, and other styles
2

Haryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.

Full text
Abstract:
Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely b
APA, Harvard, Vancouver, ISO, and other styles
3

Wijayanti, Dian Eka. "BEBERAPA MODIFIKASI PADA ALGORITMA KRIPTOGRAFI AFFINE CIPHER." Journal of Fundamental Mathematics and Applications (JFMA) 1, no. 2 (2018): 64. http://dx.doi.org/10.14710/jfma.v1i2.19.

Full text
Abstract:
Affine Cipher Cryptography Technique is one of the techniques in classical cryptography which is quite simple so it is very vulnerable to cryptanalysis. Affine cipher's advantage is having an algorithm that can be modified with various techniques. The modifications that can be made to Affine Cipher is to combine Affine cipher's algorithm with other ciphers, replace Affine cipher's key with various functions and matrices and expand the space for plaintext and ciphertexts on Affine cipher. Affine cipher can also be applied to the stream cipher as a keystream generator. This research discusses se
APA, Harvard, Vancouver, ISO, and other styles
4

Pan, Yining. "The Scope of Application of Letter Frequency Analysis in Substitution Cipher." Journal of Physics: Conference Series 2386, no. 1 (2022): 012015. http://dx.doi.org/10.1088/1742-6596/2386/1/012015.

Full text
Abstract:
Abstract Since its inception, substitution ciphers have been a popular type of cipher, and over time, academics have studied them in an effort to discover patterns that will allow them to be broken. They created it because substitution ciphers are a reasonably simple type of cipher. Through a survey of the literature, this paper investigates the encryption and decryption of three sub-types of monoalphabetic ciphers: shift cipher, affine cipher, and random substitution cipher. Letter frequency analysis is the foundation of the primary decryption technique. After that, two sub-kinds of monoalpha
APA, Harvard, Vancouver, ISO, and other styles
5

Sukma Achriadi, Hardisal, Asmaidi, and M. Sulthan Hanafi. "Encryption and Description of RGB Values in Images Using the Hill Chiper Algorithm." Jurnal Inotera 9, no. 1 (2024): 48–52. http://dx.doi.org/10.31572/inotera.vol9.iss1.2024.id282.

Full text
Abstract:
Information security related to computer use cannot be separated from cryptography. Hill cipher is an application of modulo arithmetic in cryptography. This cryptography technique uses a square matrix as the key used to carry out encryption and decryption. This cryptographic technique was created with the intention of being able to create ciphers (codes) that cannot be broken using frequency analysis techniques. Hill Cipher does not replace each of the same letters in the plaintext with other letters that are the same in the ciphertext because it uses matrix multiplication as a basis for encry
APA, Harvard, Vancouver, ISO, and other styles
6

Mihaylov, Deyan. "Cryptography and Cryptanalysis in MS EXCEL." Mathematics and Informatics LXV, no. 1 (2022): 53–71. http://dx.doi.org/10.53656/math2022-1-4-kri.

Full text
Abstract:
This paper provides implementations of three well-known ciphers – Caesar Cipher, Vigenere Cipher and Hill Cipher in Microsoft Excel. It is shown how the ciphers can be broken by using Brute-force Attack, Frequency Analysis Attack and Known-plaintext Attack. For the purpose of the cryptanalysis the relative occurrence frequencies of the letters and the index of coincidence (κ ) in Bulgarian language are determined. The classical Frequency Analysis Attack is modified using the cross-correlation between frequencies of letters in the natural language and the cipher text. Modular matrix operations
APA, Harvard, Vancouver, ISO, and other styles
7

Pandey, Ashish. "TRANSPOLY HILL CIPHER — AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER." International Journal of Advanced Research in Computer Science 9, no. 1 (2018): 276–78. http://dx.doi.org/10.26483/ijarcs.v9i1.5206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nugraha, Yuniardi Wahyu, Thresye Thresye, and Oni Soesanto. "MODIFIKASI HILL CIPHER DENGAN MENGGUNAKAN MATRIKS KUNCI ORTHOGONAL DAN TRANSPOSITION SUBSTITUTION LEFT RIGHT SHIFT (TSLRS)." EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN 17, no. 1 (2023): 133. http://dx.doi.org/10.20527/epsilon.v17i1.9232.

Full text
Abstract:
Matrix is a collection of components arranged in rows and columns, concept of a matrix can be used in solving a problem related to cryptography. A mathematician named Lester Hill created a polyalphabetic cryptographic system called the Hill Cipher. Hill cipher is an algorithm that in its process uses a matrix with size (a × a) as the key matrix. The classic Hill Cipher has the disadvantage that the operation used is not complicated. In this study, the classic Hill Cipher will be modified by using an orthogonal matrix as the key matrix, as well as adding several other operations such as transpo
APA, Harvard, Vancouver, ISO, and other styles
9

Mujaddid, Azzam, and Sumarsono Sumarsono. "A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher." Proceeding International Conference on Science and Engineering 1 (October 31, 2017): 157–63. http://dx.doi.org/10.14421/icse.v1.294.

Full text
Abstract:
The hill cipher algorithm has the uniqueness of using matrix multiplication in the process where the key used is a matrix that has weaknesses in the process of encryption and decryption. In this paper will be modified to the encryption process with caesar cipher substitution. The principle of the hill cipher algorithm using the multiplication of the 2x2 key matrix of keys is enhanced through process modification lies in the combination of initial character determination using the substitution of 3 caesar ciphers. From the results of this modification can be seen that the more the number of cha
APA, Harvard, Vancouver, ISO, and other styles
10

Tuasikal, Abdul Rauf, Dolly Indra, and Farniwati Fattah. "Analisis Perbandingan Known Plaintext dan Chosen Plaintext Pada Metode Hill Chiper." Buletin Sistem Informasi dan Teknologi Islam 1, no. 1 (2020): 1–5. http://dx.doi.org/10.33096/busiti.v1i1.514.

Full text
Abstract:
Hill Cipher yang merupakan polyalphabetic cipher dapat dikategorikan sebagai block cipher karena teks yang akan diproses akan dibagi menjadi blok-blok dengan ukuran tertentu. Setiap karakter dalam satu blok akan saling mempengaruhi karakter lainnya dalam proses enkripsi dan dekripsinya, sehingga karakter yang sama tidak dipetakan menjadi karakter yang sama pula. Hill Cipher merupakan salah satu algoritma kriptografi kunci simetris. Algoritma Hill Cipher menggunakan matriks berukuran m x m sebagai kunci untuk melakukan enkripsi dan dekripsi. Dasar teori matriks yang digunakan dalam Hill Cipher
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hill cipher"

1

Porto, Victor Monteiro Ferreira. "Criptografia: Da origem aos dias atuais." Universidade do Estado do Rio de Janeiro, 2015. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=9182.

Full text
Abstract:
Esta pesquisa foi realizada com a intenção de motivar o estudo da criptografia, mostrando que a matemática e a comunicação estão presentes em diversos momentos, tanto no passado quanto no presente. Este trabalho mostra a origem da criptoanálise e toda a sua evolução dando ênfase nos mecanismos de codificação e decodificação através de exemplos práticos. Além disso, alguns métodos criptográficos são destacados como a cifra de substituição monoalfabética, a cifra de Vigenère, a criptografia RSA que é o método mais conhecido de criptografia de chave pública, as cifras de Hill, o método das transf
APA, Harvard, Vancouver, ISO, and other styles
2

Millan, William L. "Analysis and design of Boolean functions for cryptographic applications." Thesis, Queensland University of Technology, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chih, Chu Te, and 朱德智. "An Improvement of Hill Cipher." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/71700187081939569849.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊管理研究所<br>81<br>The purpose of our research is that we will find an improved Hill Cipher which has a better protection. This scheme, of course,can keep the characteristics of the Hill Cipher and can prevent the Chosen-Plaintext Attack. We also hope that this scheme can be widely accepted and applied for protecting private data, data transmitting on the network, or any application the private key cryptography can apply. In this paper,we collect the relative papers from journ
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Chin Kuang, and 陳勤廣. "A Novel Steganography Using Hill Cipher and Microarray Images." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/44579276195478075474.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊系統與應用研究所<br>104<br>With the rapid development of technology, Internet has become possible to communicate and transmit any type of data across networks. Security of data or information has become a critical issue in data storage and transmission to prevent attacks from accessing personal information and other types of data such as credit card numbers. Steganography refers to the technique of hiding information in digital media in order to conceal the existence of the information. In this thesis, we use microarray image, Hill cipher algorithm and least significant bits substitu
APA, Harvard, Vancouver, ISO, and other styles
5

Ferreira, Moisés Alfredo da Cunha. "Implementing and Evaluating Nonsingular Matrices Generators for the Hill Cipher." Master's thesis, 2018. http://hdl.handle.net/10400.6/10045.

Full text
Abstract:
A Cifra de Hill (Hill Cipher) é um exemplo clássico de um sistema criptográfico com propriedades muito interessantes, nomeadamente a implementação dos conceitos de confusão e difusão apresentados por Shannon como propriedades essenciais para as cifras; no entanto, a sua forma básica é vulnerável a Known Plaintext Attacks (KPAs). [...]<br>Hill Cipher is a classical example of a cryptosystem with interesting properties, namely that it implements the diffusion and confusion concepts coined by Shannon as essential properties for ciphers; nonetheless, its basic form is vulnerable to KPAs. [...]
APA, Harvard, Vancouver, ISO, and other styles
6

Mahapatra, Amogh, and Rajballav Dash. "Data Encryption and Decryption Using Hill Cipher Method and Self Repetitive Matrix." Thesis, 2007. http://ethesis.nitrkl.ac.in/68/1/10307021.pdf.

Full text
Abstract:
Since times immemorial, security of data to maintain its confidentiality, proper access control, integrity and availability has been a major issue in data communication. As soon as a sensitive message was etched on a clay tablet or written on the royal walls, then it must have been foremost in the sender’s mind that the information should not get intercepted and read by a rival. Codes, hence, form an important part of our history, starting from the paintings of Da Vinci and Michelangelo to the ancient Roman steganographic practices the necessity of data hiding was obvious.
APA, Harvard, Vancouver, ISO, and other styles
7

Majhi, Jyotirmayee. "Modified Hill-Cipher and CRT Methods in Galois Field GF (2^M)for Cryptography." Thesis, 2009. http://ethesis.nitrkl.ac.in/1516/1/jyoti.pdf.

Full text
Abstract:
Security can only be as strong as the weakest link. In this world of Cryptography, it is now well established, that the weakest link lies in the implementation of cryptographic algorithms. Galois field is extensively used in coding. Recently Galois field particularly GF(2^M) has been used for Cryptography. Hill-cipher is an old symmetric key Technique of Cryptography. In this project, a novel method of Hill-cipher has been introduced in Cryptography. This new type of cipher matrix utilizes. The polynomials as element in GF(2^M) . Simulation and results confirm the utility such a data security
APA, Harvard, Vancouver, ISO, and other styles
8

Yellapu, Naveen Kumar, and Bikkina Narendra. "Modification of Hill Cipher Technique using Self Repetitive Matrix (Modular Arithmatic) and Correlation of Eigen values of Matrix with the Exponent N." Thesis, 2008. http://ethesis.nitrkl.ac.in/77/1/Yellapu.pdf.

Full text
Abstract:
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information security cannot solely be achieved through mathematical algorithms and protocols alone, but require procedural techniques and abidance of laws to achieve the desired result. For example, privacy of letters is provided by sealed envelopes delivered by an accepted mail service. The physical security of the envelope is, for practical nec
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Hill cipher"

1

Lallo, Joseph R. Cipher Hill. CreateSpace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Hill cipher"

1

Rubinstein-Salzedo, Simon. "The Hill Cipher." In Springer Undergraduate Mathematics Series. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Basavaiah, Jagadeesh, Audre Arlene Anthony, and Chandrashekar Mohan Patil. "Visual Cryptography Using Hill Cipher and Advanced Hill Cipher Techniques." In Advances in VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0443-0_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nikitakos, Nikitas V. "Hill cipher application to Multimedia Security." In IFIP Advances in Information and Communication Technology. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34943-5_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vishwa Nageshwar, K., and N. Ravi Shankar. "Cryptanalysis of Modification in Hill Cipher for Cryptographic Application." In Algorithms for Intelligent Systems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5243-4_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

H.S., Sharath Kumar, Panduranga H.T., and Naveen Kumar S.K. "Hybrid Approach for Image Encryption Using Hill Cipher Technique." In Wireless Networks and Computational Intelligence. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31686-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Mervat, Hatem S. Abdul-kader, Arabi kishk, and Azza A. Abdo. "An Efficient Multi Secret Image Sharing Scheme Using Hill Cipher." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44289-7_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajvir, Chintan, Swapnil Satapathy, S. Rajkumar, and L. Ramanathan. "Image Encryption Using Modified Elliptic Curve Cryptography and Hill Cipher." In Smart Intelligent Computing and Applications. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9282-5_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mishra, Girish, and Sarvjeet Kaur. "Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing." In Advances in Intelligent Systems and Computing. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2220-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khalaf, Rifaat Z., Hamza B. Habib, and Sarkesh Khalid Aljaff. "Attacking the Application of Three-Pass Protocol in Hill-Cipher." In Lecture Notes in Networks and Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0666-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rrghout, Hicham, Mourad Kattass, Naima Benazzi, Mariem Jarjar, Abdellatif Jarjar, and Abdelhamid Benazzi. "Image Encryption Using Hill Cipher Under a Chaotic Vector's Control." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-68650-4_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hill cipher"

1

Maurya, Sarvesh, Rai Shekhar, and Mahadev Ajagalla. "Cancellable Biometric Template Generation Using Vector Quantization and Hill Cipher." In 2024 International Conference on Cybernation and Computation (CYBERCOM). IEEE, 2024. https://doi.org/10.1109/cybercom63683.2024.10803153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kalpana, P., P. Sumathi, Teena Jose, S. Deepa, I. Priya Stella Mary, and B. Manimekala. "Enhanced Hill Cipher Algorithm with Novel Encoding and Key Generation." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10859586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chilakala, Hema Srivarshini, N. Preeti, and Murali K. "Advanced Hill Cipher Hybrid Cryptography Model." In 2022 IEEE North Karnataka Subsection Flagship International Conference (NKCon). IEEE, 2022. http://dx.doi.org/10.1109/nkcon56289.2022.10126741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paragas, Jessie R., Ariel M. Sison, and Ruji P. Medina. "Hill Cipher Modification: A Simplified Approach." In 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN). IEEE, 2019. http://dx.doi.org/10.1109/iccsn.2019.8905360.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Borodzhieva, Adriana. "MS EXCEL-BASED APPLICATION FOR ENCRYPTION AND DECRYPTION USING THE HILL CIPHER ON THE BASIS OF 2X2-MATRIX AND 64-SYMBOL ALPHABET." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-049.

Full text
Abstract:
In classical cryptography, the Hill cipher, invented by Lester Hill in 1929, was the first polygraphic substitution cipher based on linear algebra, which practically processed more than three symbols at once. In the classical Hill cipher, each letter is represented by a number modulo 26. To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible matrix of size n×n, again modulus 26. In order to decrypt the message, each block is multiplied by the inverse matrix of the matrix used for encryption. In the paper a modified algorithm for encry
APA, Harvard, Vancouver, ISO, and other styles
6

Mahendran, R., and K. Mani. "Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher." In 2017 World Congress on Computing and Communication Technologies (WCCCT). IEEE, 2017. http://dx.doi.org/10.1109/wccct.2016.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xinyu, and Zhaoe Min. "Parallel algorithm for Hill Cipher on MapReduce." In 2014 International Conference on Progress in Informatics and Computing (PIC). IEEE, 2014. http://dx.doi.org/10.1109/pic.2014.6972384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Toorani, Mohsen, and Abolfazl Falahati. "A secure variant of the Hill Cipher." In 2009 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2009. http://dx.doi.org/10.1109/iscc.2009.5202241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Haridas, Deepthi, Sarma Venkataraman, and Geeta Varadan. "Strengthened Iterated Hill Cipher for encrypted processing." In 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2012. http://dx.doi.org/10.1109/pdgc.2012.6449870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, MengZe, and Wing Loon Chee. "Hill Cipher Modifications and Dynamic Cryptosystem Design." In 2023 7th International Conference on Cryptography, Security and Privacy (CSP). IEEE, 2023. http://dx.doi.org/10.1109/csp58884.2023.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hill cipher"

1

Negron, Melvin S. Study of the Hill Cipher Encryption/Decryption Algorithm. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada581720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!