[PDF][PDF] Secure hill cipher modification based on generalized permutation matrix SHC-GPM

AY Mahmoud, AG Chefranov - Information Sciences …, 2012 - digitalcommons.aaru.edu.jo
Secure Hill cipher (SHC) modification based on dynamically changing generalized
permutation matrix, SHC-GPM is proposed. It provides better security than that of SHC due …

[PDF][PDF] Hill cipher modification based on pseudo-random eigenvalues

A Mahmoud, A Chefranov - Applied Mathematics & …, 2014 - naturalspublishing.com
The Hill cipher is resistant to brute-force and statistical attacks, but it can be broken with a
known plaintext-ciphertext attack (KPCA). In this paper, we propose a modification of the Hill …

Hill cipher modification based on eigenvalues hcm-EE

AY Mahmoud, AG Chefranov - … of the 2nd international conference on …, 2009 - dl.acm.org
We propose and analyze a new modification of the Hill cipher, HCM-EE, generating dynamic
encryption key matrix by exponentiation that is made efficiently with the help of eigenvalues …

[PDF][PDF] A hill cipher modification based on eigenvalues extension with dynamic key size hcm-exdks

AY Mahmoud, AG Chefranov - International Journal of Computer …, 2014 - researchgate.net
All the proposed Hill cipher modifications have been restricted to the use of dynamic keys
only. In this paper, we propose an extension of Hill cipher modification based on …

How to repair the Hill cipher

IA Ismail, M Amin, H Diab - Journal of Zhejiang University-Science A, 2006 - Springer
The Hill cipher algorithm is one of the symmetric key algorithms that have several
advantages in data encryption. However, a main drawback of this algorithm is that it encrypts …

Digital image encryption algorithm through unimodular matrix and logistic map using Python

IB Muktyas, S Sulistiawati, S Arifin - AIP Conference Proceedings, 2021 - pubs.aip.org
Hill Cipher is one of the methods used in Cryptography. In the Hill Cipher algorithm, the key
square matrix must have an inverse modulo. One special matrix that definitely has an …

Image encryption by novel cryptosystem using matrix transformation

B Acharya, SK Patra, G Panda - 2008 First International …, 2008 - ieeexplore.ieee.org
The Hill cipher is a famous symmetric cryptosystem that have several advantages in data
encryption. However, the Hill cipher algorithm cannot encrypt images that contain large …

A new cryptosystem of color image using a dynamic-chaos hill cipher algorithm

S Hraoui, F Gmira, MF Abbou, AJ Oulidi… - Procedia computer …, 2019 - Elsevier
The conventional symmetric Hill cipher encryption algorithm, applied for data encryption,
presents several disadvantages. However, a drawback of the conventional algorithm is …

A secure image encryption algorithm based on hill cipher system

SK Muttoo, D Aggarwal, B Ahuja - Bulletin of Electrical Engineering and …, 2012 - beei.org
We present a technique of image encryption based on Hill cipher system that provides better
security than existing approach of Bibhudendra Acharya et al. by rendering the image …

[PDF][PDF] Image encryption using orthogonal Hill Cipher algorithm

KM Reddy, A Itagi, S Dabas, BK Prakash - Int. J. Eng. Technol, 2018 - research.vit.ac.in
Abstract The Hill Cipher algorithm is a practical algorithm which requires only preliminary
knowledge of matrices which makes it quite useful. But, for decrypting the encoded …