Application of Matrix in Hill Cipher Algorithm

  • Irmayani Irmayani Faculty of Computer, Universitas Cokroaminoto Palopo, Indonesia
Keywords: algorithm encryption, decryption, Hill Cipher, Modulo

Abstract

The aim of the research is applying the 3x 3 matrix in the Hill Cipher of cryptography. Hill cipher is one of cryptography algorithm used of symmetric matrix. It uses an n x n sized as key matrix to convert from plaintext to ciphertext.  The method of research is quantitative method. The hill cipher algorithm has two processes they are encryption and decryption. The matrix used in Hill Cipher algorithm is multiplication between matrix and inverses matrix. Hill cipher used is key matrix ordo 3x3 an modulo theory. The result of the research is Matrix operations used in the hill cipher encryption process such as multiplication, transpose and determination of a matrix's determinants. The more matrix operation is in a hill cipher, the higher the security level of a cipher. The more complicated the application of the matrix in the hill cipher, the significant function of the hill cipher in maintaining data security.

Downloads

Download data is not yet available.

References

Anton, H. (2010). Dasar-Dasar Aljabar Linear. Jilid 1. Tangerang: Binarupa Aksara.

Pabokory, F.N. (2015). Implementasi Kriptografi pengaman data pada Pesan Teks,Isi Dokumen, dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard. Jurnal Informatika Mulawarman, 10(1):22

Rosenthal, J. (2015). Handbook of Cryptography, Zurich: University of Zurich.

Schenier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition. New York: John Wiley & Sons, Inc.

Setyaningsih, E. (2015). Kriptografi dan Implementasi Menggunakan Matlab. Yogyakarta: Andi.

Stinson, R. D. (2006). Cryptography Theory and Practice. New York: Chapman & Hall/CRC.

Published
2019-10-18
How to Cite
Irmayani, I. (2019). Application of Matrix in Hill Cipher Algorithm. International Conference on Natural and Social Sciences (ICONSS) Proceeding Series, 1(1), 141-147. https://doi.org/10.30605/iconss.88
Section
Computation, Informatics, & Science Education