A Modified Hill Cipher using Randomized Approach

Full Text (PDF, 939KB), PP.56-62

Views: 0 Downloads: 0


A.V.N.Krishna 1,* K.Madhuravani 2

1. Principal, PJMS CET


* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.05.07

Received: 17 Sep. 2011 / Revised: 28 Dec. 2011 / Accepted: 14 Feb. 2012 / Published: 8 Jun. 2012

Index Terms

Cipher text, Hill cipher, Known plain text, Randomized Approach, Security analysis


In Hill Cipher, the plain text is divided into equal sized blocks. The blocks are encrypted one at a time. Cipher text only Crypto analysis of Hill Cipher is difficult. But it is susceptible to known plain text attack. In this work, Hill Cipher is improvised to make it more secure. The output of hill cipher is randomized to generate multiple cipher texts for one plain text. Any one cipher text is used for transmission of data. This approach thwarts any known plain text attacks and also chosen cipher text attacks.

Cite This Paper

A.V.N.Krishna, K.Madhuravani, "A Modified Hill Cipher using Randomized Approach", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.5, pp.56-62, 2012. DOI:10.5815/ijcnis.2012.05.07


[1]Adi Narayana Reddy Ka,Vishnuvardhan Bb,Krishna A V Nc, Madhuviswanathamd, * "A Modified Hill Cipher Based on Circulant Matrices", presented in C3IT-2012, available online on www.Science Direct.com
[2]Chefranov A. G., "Secure Hill Cipher Modification SHC-M" Proc. Of the First International Conference on Security of Information and Network (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, Elci, A., Ors, B., and Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-37, 2007
[3]D. Kalman and J.E. White, Polynomial equations and circulant matrices, Amer. Math. Monthly 108 (2001), 821–840.
[4]Georg J.Fuchsbauer: An Introduction to Probabilistic Encryption, 'Osjecki Matematicki List 6(2006), pp37-44
[5]Guo D, Cheng L.M., Cheng L.L: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks, Applied Intelligence, Vol 10, No.1, Jan 99, pp 71-84.
[6]Hill LS Cryptography in an Algebraic Alphabet. American Mathematical Monthly 1929; 36: 306-312
[7]Hill LS Concerning Certain Linear Transformation Apparatus of cryptography. American Mathematical Monthly 1931; 38: 135-154
[8]Krishna A.V.N, S.N.N.Pandit, A.Vinaya Babu: A generalized scheme for data encryption technique using a randomized matrix key, Journal of Discrete Mathematical Sciences & Cryptography, Vol 10, No. 1, Feb 2007, pp73-81
[9]Krishna A.V.N, A.Vinaya Babu: A Modified Hill Cipher Algorithm for Encryption of Data in Data Transmission, Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2007 !N0. 3(14) pp 78-83.
[10]Lin CH, Lee CY, Lee CY. Comments on Saeednia's improved scheme for the Hill cipher. Journal of the Chinese institute of engineers 2004; 27: 743-746
[11]Li C, Zhang D, Chen G. Cryptanalysis of an image encryption scheme based on the Hill cipher.Journal of Zhejiang University - Science A 2008; 9: 1118-1123
[12]Mohsen Toorani, Abolfazl Falahati. A Secure Cryptosystem based on Affine Transformation. Journal of Security and Communication Networks 2011. 2:207-215
[13]Mohsen Toorani, Abolfazl Falahati. A secure variant of the Hill cipher. IEEE 2009. 313-316
[14]Saeednia S. How to Make the Hill Cipher Secure. Cryptologia Journal 2000; 24: 353-360
[15]William Stallings Cryptography and Network Security Principles and Practices. Printice Hall, 2006
[16]Yeh YS, Wu TC, Chang CC, Yang WC. A New Cryptosystem Using Matrix Transformation. 25th IEEE International Carnahan Conference on Security Technology 1991: 131-138
[17]Y.Mahmoud Ahmed, Alexander G. Chefranov. "Hill Cipher Modification Based on Eigenvalues HCM-EE". In Proc. Of the First International Conference on Security of Information and Network (SIN2009) Gazimagusa (TRNC), North Cyprus, Elci, A., Orgun, M., and Chefranov, A. (Eds), ACM NewYork, USA, pp. 164-167, 2009.
[18]Y. Mahmoud Ahmed, Chefranov A. G., " Hill Cipher Modification Based on Pseudo-Random Eigenvalues HCM-PRE" Submitted to Turkish Journal of Electrical Engineering & Computer Science on 2-03-2010.