Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher

Summary Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based on linear algebra. Invented by Lester S. Hill in 1929, it was the first polygraph cipher which was practical to operate on more than three symbols at once, Hill Cipher has many advantages in data encryption. First, it is resistant to the frequency letter analysis. It's also very simple since it uses matrix multiplication. Finally, it has high speed and high throughput [1,13,14], However, noninvertible key matrix over is the main disadvantage of Hill Cipher, because few of the matrices have inverses over . This means that the encrypted text can't be decrypted [2]. This paper suggests a new technique in Hill Cipher algorithm to overcome its major problemnoninvertible key matrix. also our paper suggest enhancement the security of Hill Cipher against known plaintext attack because all steps in Hill Cipher depend on linear algebra calculation This is possible by using public key idea and key generating depending on various options and without linear algebra steps. Therefore, it will be difficult for the attacker to get the key. Finally, our paper will present a proper solution for the problem of sending secret key ( ) for the first time. Our idea is using a public key public ( ) that doesn't sent but generated in the encryption and decryption sides.

[1]  Mohammed Amin,et al.  How to repair the Hill cipher , 2006 .

[2]  Omar S. Elkeelany,et al.  Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware , 2008, J. Comput..

[3]  V.U.K.Sastry,et al.  An Iterative Process Involving Interlacing and Decoposition in the Devlopment of a Block Cipher , 2006 .

[4]  Saroj Kumar Panigrahy,et al.  Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .

[5]  Ganapati Panda,et al.  Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System , 2009, 2009 International Conference on Advanced Computer Control.

[6]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[7]  Gurpreet Dhillon,et al.  Principles of information systems security - text and cases , 2006 .

[8]  Chu-Hsing Lin,et al.  Comments on Saeednia's improved scheme for the hill cipher , 2004 .

[9]  Christof Paar,et al.  An instruction-level distributed processor for symmetric-key cryptography , 2005, IEEE Transactions on Parallel and Distributed Systems.

[10]  Chu,et al.  Comments on Saeednia ' s improved scheme for the hill cipher , 2004 .

[11]  Chin-Chen Chang,et al.  A new cryptosystem using matrix transformation , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.

[12]  Gustavus J. Simmons,et al.  Symmetric and Asymmetric Encryption , 1979, CSUR.

[13]  Dennis Guster,et al.  Secret key distribution protocol using public key cryptography , 2003 .