Key analysis of the hill cipher algorithm (Study of literature)
DOI:
https://doi.org/10.35335/mandiri.v12i3.250Keywords:
Cipher text, Hill Cipher, Matrix, Modulo, Plain textAbstract
The security of the data (message) sent is very important in maintaining the confidentiality of the message. Many algorithms can be used to secure messages. Among them is the Hill Cipher algorithm. The Hill Cipher algorithm is a classic cryptographic algorithm. This algorithm uses a square matrix key. In connection with the Hill Cipher algorithm key, this literature aims to examine the matrix that can be used as a key in the encryption and decryption process in the Hill Cipher algorithm. In this literature, we take a square matrix of order 3x3 and use 36 characters (A-Z, 0-9). To produce cipher text, the method used is to carry out an encryption process based on the Hill Cipher algorithm. The encryption process is carried out by multiplying the key matrix by the plaintext. The decryption process to get the plain text back is done by multiplying the ciphertext by the inverse modulo matrix of the key matrix. The encryption process can always be carried out, but not all decryption processes can be carried out. Because not all matrices can be used as key matrices. The results of this literature show that the key matrix must be a matrix of order mxm. A matrix with determinant value = 0 cannot be used as a key. Likewise, a matrix whose determinant value is not relatively prime with the number of characters to be encrypted or decrypted cannot be used as a key matrix
References
Alawiyah, T., Hikmah, A. B., Wiguna, W., Kusmira, M., Sutisna, H., & Simpony, B. K. (2020). Generation Of Rectangular Matrix Key For Hill Cipher Algorithm Using Playfair Cipher. Journal Of Physics: Conference Series, 1641(1). Https://Doi.Org/10.1088/1742-6596/1641/1/012094
Endaryono, E., Dwitiyanti, N., & Setiawan, H. S. (2021). Aplikasi Operasi Matriks Pada Perancangan Simulasi Metode Hill Cipher Menggunakan Microsoft Excel. String (Satuan Tulisan Riset Dan Inovasi Teknologi), 6(1). Https://Doi.Org/10.30998/String.V6i1.8603
Fadlilah, S. N., Turmudi, T., & Khudzaifah, M. (2022). Penggabungan Algoritma Hill Cipher Dan Elgamal Untuk Mengamankan Pesan Teks. Jurnal Riset Mahasiswa Matematika, 1(5). Https://Doi.Org/10.18860/Jrmm.V1i5.14496
Fitroti, H., Romdhini, M. U., & Switrayni, N. W. (2021). Hill Cipher Algorithm With Generalized Fibonacci Matrix In Message Encoding. Eigen Mathematics Journal, 4(2).
Gusmana, R., Haryansyah, H., & Fitria, F. (2022). Implementasi Algoritma Affine Cipher Dan Caesar Cipher Dalam Mengamankan Data Teks. Sebatik, 26(2). Https://Doi.Org/10.46984/Sebatik.V26i2.2084
Hamdani, D., & Junaidi, J. (2020). Modifikasi Karakter Kode Pada Cipher Hill Menggunakan Kode Ascii. Eigen Mathematics Journal. Https://Doi.Org/10.29303/Emj.V3i1.54
Hasan, P., Yunita, S., & Ariyus, D. (2020). Implementasi Hill Cipher Pada Kode Telepon Dan Five Modulus Method Dalam Mengamankan Pesan. Sisfotenika, 10(1). Https://Doi.Org/10.30700/Jst.V10i1.521
Hasibuan, Y. W., Isnarto, I., & Veronica, R. B. (2022). Perancangan Dan Implementasi Aplikasi Kriptografi Algoritma Hill Cipher Dalam Dekripsi Enkripsi Data Keuangan Nasabah Bank Sampoerna Menggunakan Kode Ascii. Unnes Journal Of Mathematics, 11(1). Https://Doi.Org/10.15294/Ujm.V11i1.29356
Hasoun, R. K., Khlebus, S. F., & Tayyeh, H. K. (2021). A New Approach Of Classical Hill Cipher In Public Key Cryptography. International Journal Of Nonlinear Analysis And Applications, 12(2). Https://Doi.Org/10.22075/Ijnaa.2021.5176
Permata Dewi, N., Sembiring, D. J. M., Br. Ginting, R., & Br. Ginting, M. (2022). Pengamanan Data Dengan Kriptografi Hibrida Algoritma Hill Cipher Dan Algoritma Luc Serta Steganografi Chaotic Lsb. Jurnal Syntax Admiration, 3(2). Https://Doi.Org/10.46799/Jsa.V3i2.389
Rahma, A. N., Arisanti, R., Marzuki, C. M. C., & Aryani, F. (2022). Invers Matriks Leslie Bentuk Khusus Ordo N×N (N≥4). Jurnal Matematika Integratif, 18(2). Https://Doi.Org/10.24198/Jmi.V18.N2.40448.127-139
Rahma, A. N., Rahmawati, R., & Vitho, R. H. (2020). Determinan Matriks Segitiga Atas Bentuk Khusus Ordo 3×3 Berpangkat Bilangan Bulat Positif Menggunakan Kofaktor. Jurnal Sains Matematika Dan Statistika, 6(2). Https://Doi.Org/10.24014/Jsms.V6i2.10524
Rahma, A. N., Rahmawati, R., & Zukrianto, Z. (2020). Aplikasi Sistem Modulo 7 Dalam Prediksi Peringatan Hari Besar Nasional Indonesia Tahun 2030. Map (Mathematics And Applications) Journal, 2(2). Https://Doi.Org/10.15548/Map.V2i2.2260
Rahmawati, R., Fitri, N., & Rahma, A. N. (2020). Invers Matriks Rsfplrcircfr (0,B,...,B). Jurnal Sains Matematika Dan Statistika, 6(1). Https://Doi.Org/10.24014/Jsms.V6i1.9260
Rasudin, R., Zulfan, Z., & Rizki, P. (2022). Analisis Perbandingan Keamanan Kriptografi Klasik Pada Algoritma Secure Hill Cipher Berbasis Kode Ascii Dan Monoalphabetic. Jurnal Teknologi Terapan And Sains ….
Sujjada, A., & Erlinda Juniar. (2022). Implementasi Algoritma Hill Cipher Untuk Proses Enkripsi Data Menggunakan Media Citra Digital. Jurnal Restikom : Riset Teknik Informatika Dan Komputer, 3(1). Https://Doi.Org/10.52005/Restikom.V3i1.76
Wasil, Moh. (2023). Implementasi Matriks Dalam Kriptografi Hill Cipher Dalam Mengamankan Pesan Rahasia. Zeta - Math Journal, 8(2). Https://Doi.Org/10.31102/Zeta.2023.8.2.71-78
Widia Asiani, R., & Yanti, I. (2022). Penerapan Kriptografi Caesar Cipher Dan Hill Cipher Dalam Pengiriman Pesan Rahasia Sebagai Media Pembelajaran Matematika Realistik Pada Materi Modulo. Baitul ’Ulum, 6(1).
Yohanes, B. (2022). Beban Kognitif Intrinsic Dalam Pembelajaran Materi Eksistensi Bilangan Irrasional. Edupedia, 6(1). Https://Doi.Org/10.24269/Ed.V6i1.1177
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Sujarwo Sujarwo

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




