Hill Cipher with r-Circulant Matrices
Year 2025,
Volume: 10 Issue: 1, 21 - 27, 29.04.2025
Şeyda Dalkılıç
,
Ahmet Eren Kepekçi
,
Muhammed Zekeriya Baştürk
Abstract
The Hill cipher, a historic symmetric encryption method, has limitations in contemporary cryptography. This study explores enhancing its security by incorporating r-circulant matrices. Existing literature employs circulant matrices within the Hill cipher. In this study we propose a novel encryption algorithm that employs r-circulant matrices with the objective of increasing the algorithm's complexity and resistance to cryptanalysis. The developed algorithm demonstrably achieves a more secure and intricate encryption process which is supported by comparisons and numerical data. Once the algorithm has been identified, it is translated into a computer code and implemented as a program in the Python software language.
References
- [1] Hill, L., “Cryptography in an algebraic alphabet”, The American Mathematical Monthly 36(6) (1929) : 306-312.
- [2] Hill, L., “Concerning certain linear transformation apparatus in cryptography”, The Mathematical Monthly 38(3) (1931) : 135-154.
- [3] Christensen, C., “Review of codes, ciphers and spies: tales of military intelligence in world war i by John F. Dooley”, Cyrptologia 40(6) (2016) : 563-566.
- [4] Christensen, C., “Lester Hill Revisited”, Cryptologia 38(8) (2014) : 293-332.
- [5] Magamba, K., Kadaleka, S., Kasambara, A., “Variable-length hill cipher with MDS key matrix”, International Journal of Computer Applications 57(13) (2012) : 43-45.
- [6] Acharya, B., Rath, G.S., Patra, S.K., Panigrahy, S.K., “Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security (IJS) 1(1) (2007) : 14-21.
- [7] Lin, C.H., Lee, C.Y., Lee, C.Y., “Comments on saeednia’s improved scheme for the hill cipher”, Journal of the Chinese Institute of Engineers 27(5) (2004) : 743-746.
- [8] Mahendran, R., Mani, K., “Generation of key matrix for hill cipher encryption using classical cipher” in 2017 World Congress on Computing and Communication Technologies (WCCCT) (2017).
- [9] Reddy, K.A., Vishnuvardhan, B., Krishna, A.V.N., “A modified hill cipher based on circulant matrices”, Procedia Technology 4 (2012) : 114-118.
- [10] J. Davis, Circulant matrices, New York: Wiley (1979).
- [11] Tuglu, N., Kızılateş, C., “On the norms of circulant and r-circulant matrices with the hyperharmonic Fibonacci numbers”, Journal of Inequalities and Applications 2015(1) (2015) : 1-11.
- [12] Hraoui, S., Gmira, F., Abbou, M.F., Oulidi, A.J., Jarjar, A., “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm”, Procedia Computer Science, (148) (2019) : 399–408.
- [13] Wen, H., Lin, Y., Yang, L., Chen, R., “Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos”, Expert Systems with Applications (250) (2024) : 123748.
- [14] Ranti, D., Fauzi, A., Sitompul, M.P.U., “Digital Image Security Analysis using Hill Cipher and AES Algorithm”, Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4(1) (2024) : 487–496.
- [15] Rrghout, H., Kattass, M., Qobbi, Y., Benazzi, N., JarJar, A., Benazzi, A. “New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z”, International Journal of Electrical & Computer Engineering 14(5) (2024) : 5330-5343.
- [16] Handoko, L.B., Umam, C., “A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image”, Protection Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control 9(3) (2024) : 267-276.
- [17] Salman, S., Mohialden, Y.M., Abdulhameed, A., Hussien, N.M., “A Novel Method for Hill Cipher Encryption and Decryption Using Gaussian Integers Implemented in Banking Systems”, Iraqi Journal For Computer Science and Mathematics 5(1) (2024) : 277-284.
- [18] Sıtepu, E.B., Fauzı, A., Rahmadanı, R., “Super Encryption of the Hill Cipher Method and the AES Method for Security of Employee Salary Data”, International Journal of Informatics, Economics, Management and Science 3(1) (2024) : 29-37.
- [19] Sujarwo, S. “Key analysis of the hill cipher algorithm (Study of literature)”, Jurnal Mandiri IT 2(3) (2024). 135–141.
- [20] Noura A.A., Raiga A.A., Fouad S.A. “The Hill 2-Cipher with Python”, African Journal of Advanced Pure and Applied Sciences (AJAPAS) 3(1) (2024) : 58–71.
- [21] Paragas, J.R., Sison, A.M., Medina, R.P., “Hill Cipher Modification: A Simplified Approach”, 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, (2019) : 821-825, doi: 10.1109/ICCSN.2019.8905360.
Hill Cipher with r-Circulant Matrices
Year 2025,
Volume: 10 Issue: 1, 21 - 27, 29.04.2025
Şeyda Dalkılıç
,
Ahmet Eren Kepekçi
,
Muhammed Zekeriya Baştürk
Abstract
The Hill cipher, a historic symmetric encryption method, has limitations in contemporary cryptography. This study explores enhancing its security by incorporating r-circulant matrices. Existing literature employs circulant matrices within the Hill cipher. In this study we propose a novel encryption algorithm that employs r-circulant matrices with the objective of increasing the algorithm's complexity and resistance to cryptanalysis. The developed algorithm demonstrably achieves a more secure and intricate encryption process which is supported by comparisons and numerical data. Once the algorithm has been identified, it is translated into a computer code and implemented as a program in the Python software language.
References
- [1] Hill, L., “Cryptography in an algebraic alphabet”, The American Mathematical Monthly 36(6) (1929) : 306-312.
- [2] Hill, L., “Concerning certain linear transformation apparatus in cryptography”, The Mathematical Monthly 38(3) (1931) : 135-154.
- [3] Christensen, C., “Review of codes, ciphers and spies: tales of military intelligence in world war i by John F. Dooley”, Cyrptologia 40(6) (2016) : 563-566.
- [4] Christensen, C., “Lester Hill Revisited”, Cryptologia 38(8) (2014) : 293-332.
- [5] Magamba, K., Kadaleka, S., Kasambara, A., “Variable-length hill cipher with MDS key matrix”, International Journal of Computer Applications 57(13) (2012) : 43-45.
- [6] Acharya, B., Rath, G.S., Patra, S.K., Panigrahy, S.K., “Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security (IJS) 1(1) (2007) : 14-21.
- [7] Lin, C.H., Lee, C.Y., Lee, C.Y., “Comments on saeednia’s improved scheme for the hill cipher”, Journal of the Chinese Institute of Engineers 27(5) (2004) : 743-746.
- [8] Mahendran, R., Mani, K., “Generation of key matrix for hill cipher encryption using classical cipher” in 2017 World Congress on Computing and Communication Technologies (WCCCT) (2017).
- [9] Reddy, K.A., Vishnuvardhan, B., Krishna, A.V.N., “A modified hill cipher based on circulant matrices”, Procedia Technology 4 (2012) : 114-118.
- [10] J. Davis, Circulant matrices, New York: Wiley (1979).
- [11] Tuglu, N., Kızılateş, C., “On the norms of circulant and r-circulant matrices with the hyperharmonic Fibonacci numbers”, Journal of Inequalities and Applications 2015(1) (2015) : 1-11.
- [12] Hraoui, S., Gmira, F., Abbou, M.F., Oulidi, A.J., Jarjar, A., “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm”, Procedia Computer Science, (148) (2019) : 399–408.
- [13] Wen, H., Lin, Y., Yang, L., Chen, R., “Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos”, Expert Systems with Applications (250) (2024) : 123748.
- [14] Ranti, D., Fauzi, A., Sitompul, M.P.U., “Digital Image Security Analysis using Hill Cipher and AES Algorithm”, Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4(1) (2024) : 487–496.
- [15] Rrghout, H., Kattass, M., Qobbi, Y., Benazzi, N., JarJar, A., Benazzi, A. “New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z”, International Journal of Electrical & Computer Engineering 14(5) (2024) : 5330-5343.
- [16] Handoko, L.B., Umam, C., “A Super Encryption Approach for Enhancing Digital Security using Column Transposition - Hill Cipher for 3D Image”, Protection Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control 9(3) (2024) : 267-276.
- [17] Salman, S., Mohialden, Y.M., Abdulhameed, A., Hussien, N.M., “A Novel Method for Hill Cipher Encryption and Decryption Using Gaussian Integers Implemented in Banking Systems”, Iraqi Journal For Computer Science and Mathematics 5(1) (2024) : 277-284.
- [18] Sıtepu, E.B., Fauzı, A., Rahmadanı, R., “Super Encryption of the Hill Cipher Method and the AES Method for Security of Employee Salary Data”, International Journal of Informatics, Economics, Management and Science 3(1) (2024) : 29-37.
- [19] Sujarwo, S. “Key analysis of the hill cipher algorithm (Study of literature)”, Jurnal Mandiri IT 2(3) (2024). 135–141.
- [20] Noura A.A., Raiga A.A., Fouad S.A. “The Hill 2-Cipher with Python”, African Journal of Advanced Pure and Applied Sciences (AJAPAS) 3(1) (2024) : 58–71.
- [21] Paragas, J.R., Sison, A.M., Medina, R.P., “Hill Cipher Modification: A Simplified Approach”, 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN), Chongqing, China, (2019) : 821-825, doi: 10.1109/ICCSN.2019.8905360.