Generating Self-Invertible Matrices by Hill Cipher Algorithm In Gaussian Integers

Authors

  • Ayat A. Jafaar
  • Rifaat Z. Khalaf

DOI:

https://doi.org/10.24237/ASJ.02.01.701B

Keywords:

Hill Cipher (HC), self-reflexive matrix, Gaussian Integers, Euclidean Algorithm.

Abstract

In this paper, the Creating self-reflexive matrices for the Hill Cipher algorithm in Gaussian integers is discussed. It's not always possible to find the inverse of the matrix that was used to encrypt the plaintext. Therefore, the encrypted text cannot be deciphered if the matrix is not invertible. The encryption matrix utilized in the self-reflexive matrix Creating method is self-reflexive as well. As a result, we do not need to find the matrix's inverse during decryption. Additionally, this approach does away with the computational cost of determining the matrix's inverse during decryption. We also provided an example showing the work of Hill-Cipher using a self-reflecting matrix in Gaussian integers

References

William Stallings “ Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.

Al-Saidi, N.M.G. and M.R.M. Said, 2009. A new approach in cryptographic systems using fractal image coding. J. Math. Stat., 5: 183-189. DOI: 10.3844/jmssp.2009.183.189

Alexandria, Kaeli, William, '' The Arithmetic of the Gaussian Integers '' MATH 444 Assignment 8 June 29, 2020

Forouzan, B.A. and Mukhopadhyay, D., 2015. Cryptography and network security (Vol. 12). New York, NY, USA:: Mc Graw Hill Education (India) Private Limited.

Widyanarko, Arya. 2007. Studi dan Analisis mengenai Hill Cipher, Teknik Kriptanalisisdan Upaya Penanggulangannya. Makalah Program Studi Teknik Informatika Institut Teknologi Bandung.

Mollin, A. R. 2007. An Introduction to Cryptography. Second Edition. Taylor & Francis Group. LLC.

J. Stillwell, Elements of Number Theory. New York, NY: Springer New York, 2003. doi: 10.1007/978-0-387-21735-2.

A. Koval, “Algorithm for Gaussian Integer Exponentiation,” Advances in Intelligent Systems and Computing, pp. 1075–1085, 2016, doi: 10.1007/978-3-319-32467-8_93.

Bruce Schneir, “Applied Cryptography”, 2nd edition, John Wiley & Sons, 1996

Downloads

Published

2024-02-13

How to Cite

A. Jafaar, A. . ., & Z. Khalaf, R. . (2024). Generating Self-Invertible Matrices by Hill Cipher Algorithm In Gaussian Integers . Academic Science Journal, 2(1), 108–122. https://doi.org/10.24237/ASJ.02.01.701B

Issue

Section

Articles