Variable-Length Hill Cipher With MDS Key Matrix: Magambakho@yahoo - Co.uk Skadaleka@poly - Ac.mw Akasambara@poly - Ac.mw
Variable-Length Hill Cipher With MDS Key Matrix: Magambakho@yahoo - Co.uk Skadaleka@poly - Ac.mw Akasambara@poly - Ac.mw
Variable-Length Hill Cipher With MDS Key Matrix: Magambakho@yahoo - Co.uk Skadaleka@poly - Ac.mw Akasambara@poly - Ac.mw
in the same fashion and considering the 6 permutations of Calculate 𝑀𝑡 ; Calculate 𝐾𝑡 = 𝑀𝑡 𝐾𝑀𝑡−1
𝐾 we get all 24 dynamic matrices. Get 𝑚 from control key
It can be seen that the key space of SHC-M is now Obtain 𝐾𝑚 from 𝐾𝑡
𝑚 𝑚
2 Decrypt using 𝑃𝑚 = 𝐾𝑚−1 𝐶𝑚
𝑗=2 𝑗! which is a significant increase from 𝑚!. This
𝑗 end
number doubles when we permute the dynamic matrices in
a row wise manner. The key space can also be increased From the encryption algorithm one easily sees that the
by using 𝑗 × 𝑗 matrices to form 2𝑗 × 2𝑗 matrices for sender and receiver need to find a way of obtaining a
encryption. For example, if we have the 4 𝑗 × 𝑗 matrices length 𝑚 encryption matrix 𝐾𝑚 from 𝐾𝑡 . One way could
𝐾1 , 𝐾2 , 𝐾3 and 𝐾4 we may, 𝑤𝑙𝑜𝑔, form a new matrix; be to take matrices in a left-right then top-bottom manner.
𝐾1 𝐾2 It is worth noting that there are different ways of choosing
𝐾∗ = variable-length matrices from 𝐾𝑡 and this strengthens the
𝐾3 𝐾4
proposed algorithm even more.
6.2. Encryption and Decryption
Algorithm 2: Decryption
Data: Ciphertext C, K, SEED, Control Key
Result: Plaintext, P
begin
Calculate 𝑡 from SEED and 𝑟
4
References
[1] V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani, “A
Block Cipher Involving a Key Applied on Both the Sides of
the Plain Text,” International Journal of Computer and
Network Security (IJCNS), Vol. 1, No. 1, pp. 27 -30, Oct.
2009.
[2] V. U. K. Sastry, V. Janaki, “A Modified Hill Cipher with
Multiple Keys”, International Journal of
Computational Science, Vol. 2, No. 6, 815-826, Dec. 2008.
[3] Bhibhudendra Acharya, Girija Sankar Rath, and Sarat
Kumar Patra, “Novel Modified Hill Cipher Algorithm,”
Proceedings of ICTAETS, pp. 126-130, 2008
[4] D.R. Stinson, “Cryptography Theory and Practice,” 3rd
edition, Chapman and Hall/CRC, pp.13-37, 2006.
[5] Shahrokh Saeednia, “How to Make Hill cipher Secure,”
Cryp- tologia 24:4, pp. 353-360, Oct 2000.
[6] Ismail I A, Amin Mohammed, Diab Hossam, “How to
Repair the Hill Cipher,” Journal of Zhejiang University
Science, 7(12), pp. 2022-2030, 2006.
[7] Overbey, J., Traves, W., and Wojdylo, J., “On the keyspace
of the Hill cipher,” Cryptologia, 29(l), pp. 59-72, 2005.
[8] F. J. McWilliams and N. J. A. Sloane, “The Theory of Error
Correcting Codes,” Amsterdam, The Netherlands, North
Holland, 1977.
[9] Sriram Ramanujam and Marimuthu Karuppiah, “Designing
an algorithm with high Avalanche Effect,” IJCSNS
International Journal of Computer Science and Network
Security, VOL.11, No.1, 106-111 January 2011.
[10] Romero, Y. R. Garcia, R. V. et al., “Comments on How to
Repair the Hill Cipher,” J. Zhejiang Univ. Sci. A 9(2): pp.
211-214, 2008.
[11] Chefranov, A. G., “Secure Hill Cipher Modification,”
Proc. Of the First International Conference on Security of
Information and Network (SIN2007) 7-10 May 2007,
Gazimagusa (TRNC) North Cyprus, Elci, A., Ors, B., and
Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-
37, 2007.
[12] Daemen, J., Rijmen, V.,The Design of Rijndael: “AES –
The Advanced Encryption Standard.” Springer, 2002.
[13] Monem, A.M., Rahma1 and Yacob, B.Z.,”The Dynamic
Dual Key Encryption Algorithm Based on joint Galois
Fields,” IJCSNS International Journal of Computer Science
and Network Security, VOL.11, No.8, August 2011.