Comments on "How to repair the Hill cipher

A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different...

Full description

Saved in:
Bibliographic Details
Published inJournal of Zhejiang University. A. Science Vol. 9; no. 2; pp. 211 - 214
Main Author Y. RANGEL-ROMERO R. VEGA-GARCIA A. MENCHACA-MENDEZ D. ACOLTZI-CERVANTES L. MARTINEZ-RAMOS M. MECATE-ZAMBRANO F. MONTALVO-LEZAMA J. BARRON-VIDALES N. CORTEZ-DUARTE F. RODRIGUEZ-HENRIQUEZ
Format Journal Article
LanguageEnglish
Published Hangzhou Zhejiang University Press 01.02.2008
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.
Bibliography:Hill cipher, Symmetric encryption, Image encryption
TN918
TP309
33-1236/O4
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1673-565X
1862-1775
DOI:10.1631/jzus.A072143