期刊文献+

How to repair the Hill cipher 被引量:1

How to repair the Hill cipher
下载PDF
导出
摘要 The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a main drawback of this algorithm is that it encrypts identical plaintext blocks to identical ciphertext blocks and cannot encrypt images that contain large areas of a single color. Thus, it does not hide all features of the image which reveals patterns in the plaintext. Moreover, it can be easily broken with a known plaintext attack revealing weak security. This paper presents a variant of the Hill cipher that overcomes these disadvantages. The proposed technique adjusts the encryption key to form a dif- ferent key for each block encryption. Visually and computationally, experimental results demonstrate that the proposed variant yields higher security and significantly superior encryption quality compared to the original one. The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption, However, a main drawback of this algorithm is that it encrypts identical plaintext blocks to identical ciphertext blocks and cannot encrypt images that contain large areas of a single color. Thus, it does not hide all features of the image which reveals patterns in the plaintext. Moreover, it can be easily broken with a known plaintext attack revealing weak security. This paper presents a variant of the Hill cipher that overcomes these disadvantages. The proposed technique adjusts the encryption key to form a different key for each block encryption. Visually and computationally, experimental results demonstrate that the proposed variant yields higher security and significantly superior encryption quality compared to the original one.
出处 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第12期2022-2030,共9页 浙江大学学报(英文版)A辑(应用物理与工程)
关键词 Hill cipher Image encryption Modified Hill cipher Quality of encryption Hill密码 图像编码 修正 编码质量
  • 相关文献

参考文献10

  • 1Chen, G,Mao, Y,Chui, C.K.A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos[].Soliton & Fractals.2004
  • 2Elkamchouchi, H.,Makar, M.A.Measuring Encryption Quality of Bitmap Images Encrypted with Rijndael and KAMKAR Block Ciphers[].Proc Twenty Second National Radio Science Conference (NRSC ).2005
  • 3Stinson,D.R.Cryptography Theory and Practice ([]..2002
  • 4Ziedan, I,Fouad, M,Salem, D.H.Application of Data Encryption Standard to Bitmap and JPEG Images[].Proc Twentieth National Radio Science Conference (NRSC ).2003
  • 5Li, S.,Zheng, X.On the Security of an Image Encryp-tion Method[].ICIP.2002
  • 6Lerma,M.A.Modular Arithmetic[].Http://wwwmath northwesternedu/~mlerma/problem_solving/results/ modular_arithpdf.2005
  • 7Saeednia,S.How to make the Hill cipher secure[].Cryptologia.2000
  • 8Barr,T.H.Invitation to Cryptography[]..2002
  • 9Petersen,K.Notes on Number Theory and Cryptogra-phy[].Http://wwwmathuncedu/Faculty/petersen/Coding/ crpdf.2000
  • 10Overbey, J,Traves, W,Wojdylo, J.On the keyspace of the Hill cipher[].Cryptologia.2005

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部