Key analysis of the hill cipher algorithm (Study of literature)

Authors

  • Sujarwo Sujarwo Politeknik Unggul LP3M,Indonesia

DOI:

https://doi.org/10.35335/mandiri.v12i3.250

Keywords:

Cipher text, Hill Cipher, Matrix, Modulo, Plain text

Abstract

The security of the data (message) sent is very important in maintaining the confidentiality of the message. Many algorithms can be used to secure messages. Among them is the Hill Cipher algorithm. The Hill Cipher algorithm is a classic cryptographic algorithm. This algorithm uses a square matrix key. In connection with the Hill Cipher algorithm key, this literature aims to examine the matrix that can be used as a key in the encryption and decryption process in the Hill Cipher algorithm. In this literature, we take a square matrix of order 3x3 and use 36 characters (A-Z, 0-9). To produce cipher text, the method used is to carry out an encryption process based on the Hill Cipher algorithm. The encryption process is carried out by multiplying the key matrix by the plaintext. The decryption process to get the plain text back is done by multiplying the ciphertext by the inverse modulo matrix of the key matrix. The encryption process can always be carried out, but not all decryption processes can be carried out. Because not all matrices can be used as key matrices. The results of this literature show that the key matrix must be a matrix of order mxm. A matrix with determinant value = 0 cannot be used as a key. Likewise, a matrix whose determinant value is not relatively prime with the number of characters to be encrypted or decrypted cannot be used as a key matrix

References

Alawiyah, T., Hikmah, A. B., Wiguna, W., Kusmira, M., Sutisna, H., & Simpony, B. K. (2020). Generation Of Rectangular Matrix Key For Hill Cipher Algorithm Using Playfair Cipher. Journal Of Physics: Conference Series, 1641(1). Https://Doi.Org/10.1088/1742-6596/1641/1/012094

Endaryono, E., Dwitiyanti, N., & Setiawan, H. S. (2021). Aplikasi Operasi Matriks Pada Perancangan Simulasi Metode Hill Cipher Menggunakan Microsoft Excel. String (Satuan Tulisan Riset Dan Inovasi Teknologi), 6(1). Https://Doi.Org/10.30998/String.V6i1.8603

Fadlilah, S. N., Turmudi, T., & Khudzaifah, M. (2022). Penggabungan Algoritma Hill Cipher Dan Elgamal Untuk Mengamankan Pesan Teks. Jurnal Riset Mahasiswa Matematika, 1(5). Https://Doi.Org/10.18860/Jrmm.V1i5.14496

Fitroti, H., Romdhini, M. U., & Switrayni, N. W. (2021). Hill Cipher Algorithm With Generalized Fibonacci Matrix In Message Encoding. Eigen Mathematics Journal, 4(2).

Gusmana, R., Haryansyah, H., & Fitria, F. (2022). Implementasi Algoritma Affine Cipher Dan Caesar Cipher Dalam Mengamankan Data Teks. Sebatik, 26(2). Https://Doi.Org/10.46984/Sebatik.V26i2.2084

Hamdani, D., & Junaidi, J. (2020). Modifikasi Karakter Kode Pada Cipher Hill Menggunakan Kode Ascii. Eigen Mathematics Journal. Https://Doi.Org/10.29303/Emj.V3i1.54

Hasan, P., Yunita, S., & Ariyus, D. (2020). Implementasi Hill Cipher Pada Kode Telepon Dan Five Modulus Method Dalam Mengamankan Pesan. Sisfotenika, 10(1). Https://Doi.Org/10.30700/Jst.V10i1.521

Hasibuan, Y. W., Isnarto, I., & Veronica, R. B. (2022). Perancangan Dan Implementasi Aplikasi Kriptografi Algoritma Hill Cipher Dalam Dekripsi Enkripsi Data Keuangan Nasabah Bank Sampoerna Menggunakan Kode Ascii. Unnes Journal Of Mathematics, 11(1). Https://Doi.Org/10.15294/Ujm.V11i1.29356

Hasoun, R. K., Khlebus, S. F., & Tayyeh, H. K. (2021). A New Approach Of Classical Hill Cipher In Public Key Cryptography. International Journal Of Nonlinear Analysis And Applications, 12(2). Https://Doi.Org/10.22075/Ijnaa.2021.5176

Permata Dewi, N., Sembiring, D. J. M., Br. Ginting, R., & Br. Ginting, M. (2022). Pengamanan Data Dengan Kriptografi Hibrida Algoritma Hill Cipher Dan Algoritma Luc Serta Steganografi Chaotic Lsb. Jurnal Syntax Admiration, 3(2). Https://Doi.Org/10.46799/Jsa.V3i2.389

Rahma, A. N., Arisanti, R., Marzuki, C. M. C., & Aryani, F. (2022). Invers Matriks Leslie Bentuk Khusus Ordo N×N (N≥4). Jurnal Matematika Integratif, 18(2). Https://Doi.Org/10.24198/Jmi.V18.N2.40448.127-139

Rahma, A. N., Rahmawati, R., & Vitho, R. H. (2020). Determinan Matriks Segitiga Atas Bentuk Khusus Ordo 3×3 Berpangkat Bilangan Bulat Positif Menggunakan Kofaktor. Jurnal Sains Matematika Dan Statistika, 6(2). Https://Doi.Org/10.24014/Jsms.V6i2.10524

Rahma, A. N., Rahmawati, R., & Zukrianto, Z. (2020). Aplikasi Sistem Modulo 7 Dalam Prediksi Peringatan Hari Besar Nasional Indonesia Tahun 2030. Map (Mathematics And Applications) Journal, 2(2). Https://Doi.Org/10.15548/Map.V2i2.2260

Rahmawati, R., Fitri, N., & Rahma, A. N. (2020). Invers Matriks Rsfplrcircfr (0,B,...,B). Jurnal Sains Matematika Dan Statistika, 6(1). Https://Doi.Org/10.24014/Jsms.V6i1.9260

Rasudin, R., Zulfan, Z., & Rizki, P. (2022). Analisis Perbandingan Keamanan Kriptografi Klasik Pada Algoritma Secure Hill Cipher Berbasis Kode Ascii Dan Monoalphabetic. Jurnal Teknologi Terapan And Sains ….

Sujjada, A., & Erlinda Juniar. (2022). Implementasi Algoritma Hill Cipher Untuk Proses Enkripsi Data Menggunakan Media Citra Digital. Jurnal Restikom : Riset Teknik Informatika Dan Komputer, 3(1). Https://Doi.Org/10.52005/Restikom.V3i1.76

Wasil, Moh. (2023). Implementasi Matriks Dalam Kriptografi Hill Cipher Dalam Mengamankan Pesan Rahasia. Zeta - Math Journal, 8(2). Https://Doi.Org/10.31102/Zeta.2023.8.2.71-78

Widia Asiani, R., & Yanti, I. (2022). Penerapan Kriptografi Caesar Cipher Dan Hill Cipher Dalam Pengiriman Pesan Rahasia Sebagai Media Pembelajaran Matematika Realistik Pada Materi Modulo. Baitul ’Ulum, 6(1).

Yohanes, B. (2022). Beban Kognitif Intrinsic Dalam Pembelajaran Materi Eksistensi Bilangan Irrasional. Edupedia, 6(1). Https://Doi.Org/10.24269/Ed.V6i1.1177

Downloads

Published

2024-01-20

How to Cite

Sujarwo, S. (2024). Key analysis of the hill cipher algorithm (Study of literature). Jurnal Mandiri IT, 12(3), 135–141. https://doi.org/10.35335/mandiri.v12i3.250