Generating Self-Invertible Matrices by Hill Cipher Algorithm In Gaussian Integers
DOI:
https://doi.org/10.24237/ASJ.02.01.701BKeywords:
Hill Cipher (HC), self-reflexive matrix, Gaussian Integers, Euclidean Algorithm.Abstract
In this paper, the Creating self-reflexive matrices for the Hill Cipher algorithm in Gaussian integers is discussed. It's not always possible to find the inverse of the matrix that was used to encrypt the plaintext. Therefore, the encrypted text cannot be deciphered if the matrix is not invertible. The encryption matrix utilized in the self-reflexive matrix Creating method is self-reflexive as well. As a result, we do not need to find the matrix's inverse during decryption. Additionally, this approach does away with the computational cost of determining the matrix's inverse during decryption. We also provided an example showing the work of Hill-Cipher using a self-reflecting matrix in Gaussian integers
References
William Stallings “ Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.
Al-Saidi, N.M.G. and M.R.M. Said, 2009. A new approach in cryptographic systems using fractal image coding. J. Math. Stat., 5: 183-189. DOI: 10.3844/jmssp.2009.183.189
Alexandria, Kaeli, William, '' The Arithmetic of the Gaussian Integers '' MATH 444 Assignment 8 June 29, 2020
Forouzan, B.A. and Mukhopadhyay, D., 2015. Cryptography and network security (Vol. 12). New York, NY, USA:: Mc Graw Hill Education (India) Private Limited.
Widyanarko, Arya. 2007. Studi dan Analisis mengenai Hill Cipher, Teknik Kriptanalisisdan Upaya Penanggulangannya. Makalah Program Studi Teknik Informatika Institut Teknologi Bandung.
Mollin, A. R. 2007. An Introduction to Cryptography. Second Edition. Taylor & Francis Group. LLC.
J. Stillwell, Elements of Number Theory. New York, NY: Springer New York, 2003. doi: 10.1007/978-0-387-21735-2.
A. Koval, “Algorithm for Gaussian Integer Exponentiation,” Advances in Intelligent Systems and Computing, pp. 1075–1085, 2016, doi: 10.1007/978-3-319-32467-8_93.
Bruce Schneir, “Applied Cryptography”, 2nd edition, John Wiley & Sons, 1996
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 CC BY 4.0
This work is licensed under a Creative Commons Attribution 4.0 International License.