TY - JOUR T1 - Hill Cipher with r-Circulant Matrices TT - Hill Cipher with r-Circulant Matrices AU - Dalkılıç, Şeyda AU - Kepekçi, Ahmet Eren AU - Baştürk, Muhammed Zekeriya PY - 2025 DA - April Y2 - 2025 DO - 10.30931/jetas.1516337 JF - Journal of Engineering Technology and Applied Sciences JO - JETAS PB - Muhammet KURULAY WT - DergiPark SN - 2548-0391 SP - 21 EP - 27 VL - 10 IS - 1 LA - en AB - The Hill cipher, a historic symmetric encryption method, has limitations in contemporary cryptography. This study explores enhancing its security by incorporating r-circulant matrices. Existing literature employs circulant matrices within the Hill cipher. In this study we propose a novel encryption algorithm that employs r-circulant matrices with the objective of increasing the algorithm's complexity and resistance to cryptanalysis. The developed algorithm demonstrably achieves a more secure and intricate encryption process which is supported by comparisons and numerical data. Once the algorithm has been identified, it is translated into a computer code and implemented as a program in the Python software language. KW - Hill cipher KW - r-circulant matrices KW - cryptology KW - algorithm N2 - The Hill cipher, a historic symmetric encryption method, has limitations in contemporary cryptography. This study explores enhancing its security by incorporating r-circulant matrices. Existing literature employs circulant matrices within the Hill cipher. In this study we propose a novel encryption algorithm that employs r-circulant matrices with the objective of increasing the algorithm's complexity and resistance to cryptanalysis. The developed algorithm demonstrably achieves a more secure and intricate encryption process which is supported by comparisons and numerical data. Once the algorithm has been identified, it is translated into a computer code and implemented as a program in the Python software language. CR - [1] Hill, L., “Cryptography in an algebraic alphabet”, The American Mathematical Monthly 36(6) (1929) : 306-312. CR - [2] Hill, L., “Concerning certain linear transformation apparatus in cryptography”, The Mathematical Monthly 38(3) (1931) : 135-154. CR - [3] Christensen, C., “Review of codes, ciphers and spies: tales of military intelligence in world war i by John F. Dooley”, Cyrptologia 40(6) (2016) : 563-566. CR - [4] Christensen, C., “Lester Hill Revisited”, Cryptologia 38(8) (2014) : 293-332. CR - [5] Magamba, K., Kadaleka, S., Kasambara, A., “Variable-length hill cipher with MDS key matrix”, International Journal of Computer Applications 57(13) (2012) : 43-45. CR - [6] Acharya, B., Rath, G.S., Patra, S.K., Panigrahy, S.K., “Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security (IJS) 1(1) (2007) : 14-21. CR - [7] Lin, C.H., Lee, C.Y., Lee, C.Y., “Comments on saeednia’s improved scheme for the hill cipher”, Journal of the Chinese Institute of Engineers 27(5) (2004) : 743-746. CR - [8] Mahendran, R., Mani, K., “Generation of key matrix for hill cipher encryption using classical cipher” in 2017 World Congress on Computing and Communication Technologies (WCCCT) (2017). CR - [9] Reddy, K.A., Vishnuvardhan, B., Krishna, A.V.N., “A modified hill cipher based on circulant matrices”, Procedia Technology 4 (2012) : 114-118. CR - [10] J. Davis, Circulant matrices, New York: Wiley (1979). CR - [11] Tuglu, N., Kızılateş, C., “On the norms of circulant and r-circulant matrices with the hyperharmonic Fibonacci numbers”, Journal of Inequalities and Applications 2015(1) (2015) : 1-11. CR - [12] Hraoui, S., Gmira, F., Abbou, M.F., Oulidi, A.J., Jarjar, A., “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm”, Procedia Computer Science, (148) (2019) : 399–408. CR - [13] Wen, H., Lin, Y., Yang, L., Chen, R., “Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos”, Expert Systems with Applications (250) (2024) : 123748. CR - [14] Ranti, D., Fauzi, A., Sitompul, M.P.U., “Digital Image Security Analysis using Hill Cipher and AES Algorithm”, Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4(1) (2024) : 487–496. CR - [15] Rrghout, H., Kattass, M., Qobbi, Y., Benazzi, N., JarJar, A., Benazzi, A. “New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z”, International Journal of Electrical & Computer Engineering 14(5) (2024) : 5330-5343. CR - [16] Handoko, L.B., Umam, C., “A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image”, Protection Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control 9(3) (2024) : 267-276. CR - [17] Salman, S., Mohialden, Y.M., Abdulhameed, A., Hussien, N.M., “A Novel Method for Hill Cipher Encryption and Decryption Using Gaussian Integers Implemented in Banking Systems”, Iraqi Journal For Computer Science and Mathematics 5(1) (2024) : 277-284. CR - [18] Sıtepu, E.B., Fauzı, A., Rahmadanı, R., “Super Encryption of the Hill Cipher Method and the AES Method for Security of Employee Salary Data”, International Journal of Informatics, Economics, Management and Science 3(1) (2024) : 29-37. CR - [19] Sujarwo, S. “Key analysis of the hill cipher algorithm (Study of literature)”, Jurnal Mandiri IT 2(3) (2024). 135–141. CR - [20] Noura A.A., Raiga A.A., Fouad S.A. “The Hill 2-Cipher with Python”, African Journal of Advanced Pure and Applied Sciences (AJAPAS) 3(1) (2024) : 58–71. CR - [21] Paragas, J.R., Sison, A.M., Medina, R.P., “Hill Cipher Modification: A Simplified Approach”, 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, (2019) : 821-825, doi: 10.1109/ICCSN.2019.8905360. UR - https://doi.org/10.30931/jetas.1516337 L1 - https://dergipark.org.tr/en/download/article-file/4071202 ER -