Skip to main content

2021 | OriginalPaper | Buchkapitel

Cryptanalysis of Modification in Hill Cipher for Cryptographic Application

verfasst von : K. Vishwa Nageshwar, N. Ravi Shankar

Erschienen in: Advances in Machine Learning and Computational Intelligence

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper focuses on the strengths and weaknesses of the algorithm proposed by Qazi et al. [1]. The cipher proposed by the authors is highly predictable and suffers from lack of sufficiently strong and complex intermediate operations along with Hill cipher. The Hill cipher, on its own, cannot offer foolproof security. It should be strengthened with sufficiently complex and nonlinear operations which offsets the known plaintext vulnerability which the Hill cipher exhibits. All intermediate operations introduced in the scheme proposed by Qazi et al. are very simple, linear and predictable. Such operations do not strengthen an existing cipher which is proven to be vulnerable to the known plaintext attack. The algorithm cannot stand even moderate cryptanalysis and can be very easily broken. To be more precise, the algorithm can be broken with the help of one chosen ciphertext and four chosen plaintexts. This paper also proposes suitable modifications to offset the vulnerabilities exhibited by the original cipher.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat B. Schneier, Applied cryptography, in Protocols, Algorithms, and Source Code in C, 2nd edn. (Wiley, New York, NY, USA, 1995) B. Schneier, Applied cryptography, in Protocols, Algorithms, and Source Code in C, 2nd edn. (Wiley, New York, NY, USA, 1995)
3.
Zurück zum Zitat A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, Handbook of Applied Cryptography, 1st edn. (CRC Press Inc., Boca Raton, FL, USA, 1996)MATH A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot, Handbook of Applied Cryptography, 1st edn. (CRC Press Inc., Boca Raton, FL, USA, 1996)MATH
4.
Zurück zum Zitat C. Paar, J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners. (Springer, 2010), p. 7. ISBN 978-364204100-6 C. Paar, J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners. (Springer, 2010), p. 7. ISBN 978-364204100-6
5.
Zurück zum Zitat W. Stallings, Cryptography and Network Security: Principles and Practices, 4th edn (Pearson Education, Asia, 2005) W. Stallings, Cryptography and Network Security: Principles and Practices, 4th edn (Pearson Education, Asia, 2005)
6.
7.
Zurück zum Zitat L.S. Hill, Concerning certain linear transformation apparatus of cryptography. The American Mathematical Monthly 38(3), 135–154 (1931)MathSciNetCrossRef L.S. Hill, Concerning certain linear transformation apparatus of cryptography. The American Mathematical Monthly 38(3), 135–154 (1931)MathSciNetCrossRef
8.
Zurück zum Zitat V.U.K. Sastry, N. Ravi Shankar, S. DurgaBhavani, A modified Hill cipher involving interweaving and iteration. Int. J. Netw. Secur. 11(2), 51–56 (2010) V.U.K. Sastry, N. Ravi Shankar, S. DurgaBhavani, A modified Hill cipher involving interweaving and iteration. Int. J. Netw. Secur. 11(2), 51–56 (2010)
9.
Zurück zum Zitat V.U.K. Sastry, S. DurgaBhavani, N. Ravi Shankar, A large block cipher involving interweaving and iteration, in International Conference on Advances and Emerging Trends in Computing Technologies (ICAET10) (Chennai, India, 2010), pp. 328–333 V.U.K. Sastry, S. DurgaBhavani, N. Ravi Shankar, A large block cipher involving interweaving and iteration, in International Conference on Advances and Emerging Trends in Computing Technologies (ICAET10) (Chennai, India, 2010), pp. 328–333
10.
Zurück zum Zitat V.U.K. Sastry, N. Ravi Shankar, S. DurgaBhavani, A large block cipher involving key dependent permutation, interlacing and iteration. Cybern. Inf. Technol. 13(3), 50–63 (2013) V.U.K. Sastry, N. Ravi Shankar, S. DurgaBhavani, A large block cipher involving key dependent permutation, interlacing and iteration. Cybern. Inf. Technol. 13(3), 50–63 (2013)
11.
Zurück zum Zitat V.U.K. Sastry, N. Ravi Shankar, Modified Hill cipher with interlacing and iteration. J. Comput. Sci. Sci. Publ. 3(11), 854–859 (2007) V.U.K. Sastry, N. Ravi Shankar, Modified Hill cipher with interlacing and iteration. J. Comput. Sci. Sci. Publ. 3(11), 854–859 (2007)
12.
Zurück zum Zitat V.U.K. Sastry, N. Ravi Shankar, Modified Hill cipher for a large block of plaintext with interlacing and iteration. J. Comput. Sci. Sci. Publ. 4(1), 15–20 (2008) V.U.K. Sastry, N. Ravi Shankar, Modified Hill cipher for a large block of plaintext with interlacing and iteration. J. Comput. Sci. Sci. Publ. 4(1), 15–20 (2008)
13.
Zurück zum Zitat V.U.K. Sastry, N. Ravi Shankar, S. DurgaBhavani, A blending of a generalized Playfair cipher and a modified Hill cipher. Int. J. Netw. Mob. Technol. 2(1), 35–43 (2011) V.U.K. Sastry, N. Ravi Shankar, S. DurgaBhavani, A blending of a generalized Playfair cipher and a modified Hill cipher. Int. J. Netw. Mob. Technol. 2(1), 35–43 (2011)
14.
Zurück zum Zitat K. Man, A. BarakathBegam, Generation of Keymatrix for Hill cipher encryption using quadratic form. Int. J. Sci. Technol. Res. 8(10), 964–968 (2019) K. Man, A. BarakathBegam, Generation of Keymatrix for Hill cipher encryption using quadratic form. Int. J. Sci. Technol. Res. 8(10), 964–968 (2019)
15.
Zurück zum Zitat J.R. Paragas, A.M. Sison, R.P. Medina, A new variant of Hill cipher algorithm using modified S-box. Int. J. Sci. Technol. Res. 8(10), 615–619 (2019) J.R. Paragas, A.M. Sison, R.P. Medina, A new variant of Hill cipher algorithm using modified S-box. Int. J. Sci. Technol. Res. 8(10), 615–619 (2019)
16.
Zurück zum Zitat S. Kumar, S. Kumar, G. Mittal, S. Narain, A Vector Space Approach to Generate Dynamic Keys for Hill Cipher. arXiv preprint arXiv:1909.06781 (2019) S. Kumar, S. Kumar, G. Mittal, S. Narain, A Vector Space Approach to Generate Dynamic Keys for Hill Cipher. arXiv preprint arXiv:​1909.​06781 (2019)
19.
Zurück zum Zitat P. Sharma, T. Dalal, Experimental analysis of modified Hill cipher to perform encryption and decryption for invertible and noninvertible matrices. Int. J. Enhanced Res. Manag. Comput. Appl. 7(7) (2018) P. Sharma, T. Dalal, Experimental analysis of modified Hill cipher to perform encryption and decryption for invertible and noninvertible matrices. Int. J. Enhanced Res. Manag. Comput. Appl. 7(7) (2018)
20.
Zurück zum Zitat P. Sharma, T. Dalal, Study of encryption and decryption for matrices using modified Hill cipher. Int. J. Enhanced Res. Manag. Comput. Appl. 7(5) (2018) P. Sharma, T. Dalal, Study of encryption and decryption for matrices using modified Hill cipher. Int. J. Enhanced Res. Manag. Comput. Appl. 7(5) (2018)
21.
Zurück zum Zitat M. Attiqueur Rehman, H. Raza, I. Akhter, Security enhancement of Hill cipher by using non-square matrix approach, in 4th International Conference on Knowledge and Innovation in Engineering, Science and Technology (2018) M. Attiqueur Rehman, H. Raza, I. Akhter, Security enhancement of Hill cipher by using non-square matrix approach, in 4th International Conference on Knowledge and Innovation in Engineering, Science and Technology (2018)
22.
Zurück zum Zitat D. Rachmawati, A. Sharif, Erick, Hybrid cryptosystem combination algorithm of Hill cipher 3 × 3 and Elgamal to secure instant messaging for Android, in Third International Conference on Computing and Applied Informatics (2018) D. Rachmawati, A. Sharif, Erick, Hybrid cryptosystem combination algorithm of Hill cipher 3 × 3 and Elgamal to secure instant messaging for Android, in Third International Conference on Computing and Applied Informatics (2018)
23.
Zurück zum Zitat F.H. Khan, R. Shams, F. Qazi, D. Agha, Hill Cipher Key generation algorithm by using orthogonal matrix. Proc. Int. J. Innovative Sci. Mod. Eng. 3(3), 5–7 (2015) F.H. Khan, R. Shams, F. Qazi, D. Agha, Hill Cipher Key generation algorithm by using orthogonal matrix. Proc. Int. J. Innovative Sci. Mod. Eng. 3(3), 5–7 (2015)
Metadaten
Titel
Cryptanalysis of Modification in Hill Cipher for Cryptographic Application
verfasst von
K. Vishwa Nageshwar
N. Ravi Shankar
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_62

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.