Preview

Hill Cipher

Better Essays
Open Document
Open Document
2825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hill Cipher
HILL CIPHER
TERM-PAPER

3/31/2013
LPU
vidit

Name: Vidit kumar Singh.
Reg no: 11009010
Roll no: B38.
Cap : 323.
Sub : Information Security and privacy.

INDEX

Introduction Workings Decryption Matrix Inverse Hill ciphers that encipher larger blocks Ciphertext Attack Known plaintext attack Security Key size Diffusion and Confusion Conclusion References

Hill Cipher
Introduction
Invented by Lester S. Hill in 1929, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Hill used matrices and matrix multiplication to mix up the plaintext.
To counter charges that his system was too complicated for day to day use, Hill constructed a cipher machine for his system using a series of geared wheels and chains. However, the machine never really sold. [1]
Hill's major contribution was the use of mathematics to design and analyse cryptosystems. It is important to note that the analysis of this algorithm requires a branch of mathematics known as number theory .Many elementary number theory text books deal with the theory behind the Hill cipher, with several talking about the cipher in detail (e.g. Elementary Number Theory and its applications, Rosen, 2000). It is advisable to get access to a book such as this, and to try to learn a bit if you want to understand this algorithm in depth. [2]
Each letter is represented by a number modulo 26. (Often the simple scheme A = 0, B = 1, ..., Z = 25 is used, but this is not an essential feature of the cipher.) To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, again modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption.
The matrix used for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26). The cipher can, of course, be adapted to an alphabet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Report

    • 288 Words
    • 2 Pages

    Step 6 : Break the input string into square matrices of maximum possible size of…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Alan Turing, founder of computer science, mathematician, philosopher, codebreaker, and visionary before his time (Hodges, 1995). Turing is known for developing the proof which states that automatic computation cannot solve all mathematical problems, concept also known as the Turing machine (BBC History), he played a vital role in deciphering messages encrypted by the German Enigma machine during WW II. Arguably the first person to design a digital computer, Turing found happiness in solving what others considered impossible or unbreakable. He was an eccentric and solitary man, never satisfied with what is but constantly striving to figure out what is to come.…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    How did it work: The enigma machine was a very complicated device. On the inside of the machine there were three rotors that contained all 26 letters of the alphabet. What would happen was that when someone would press a letter on the keyboard, a different letter would pop up on the paper, such as A for E, D for G, F for Z, and so on. These substitutions occur because of the positions of the rotors on the inside of the machine. The rotors are first situated at any random letter in the alphabet and when the button is pressed, the letter that is at the beginning of the rotor is put onto the paper. Then if the same letter were to be pressed again, a different letter would appear because the rotor will have changed position. The fully typed and encoded message would be printed out and mailed to the person it was designated to and then that person would put in that code into their enigma machine and that machine would decipher the encoded message.…

    • 3634 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Alan Turing Presentation

    • 695 Words
    • 3 Pages

    2) Indicator: Chose 3 letters at random. Type in 3 letters two times to encode message. - Sender: send Indicator and encoded message. - Receiver: with the rotors are set to the specified wheel order - Type in encoded message - set the rotors to the 3 letters that light up on lamp board.  Type in encoded message to get message in plain text. • Important: if the same letter was pressed multiple times, a different letter would light up on the lamp board each time. *This proved to be the weakness of the Enigma machine.*…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The general idea is the construction of a polynomial, the coefficient produced will be symbols such that the generator polynomial will exactly divide the data/parity polynomial. The basic principle of encoding is to find the remainder for the message divided by a generator polynomial G(x).The Reed-Solomon codeword is generated using a special polynomial known as the Generator polynomial. All valid code words are exactly divisible by the generator polynomial. The generator polynomial of the RS encoder is represented…

    • 982 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Character Encoding

    • 1485 Words
    • 9 Pages

    Assume six Chinese characters are placed in a 6×6 table and in particular in the 6 positions specified below, what binary values can be assigned to these 6 characters according to the given two-dimensional code space?…

    • 1485 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    6th Sense Technology

    • 951 Words
    • 4 Pages

    * Asymmetric Cryptosystems use a public key to encrypt and a private key to decrypt…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Encrypt/Decrypt

    • 317 Words
    • 2 Pages

    written that encodes the text by advancing each character by 3 letters. Same procedure is…

    • 317 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr. R.A. van Santen, voor een commissie aangewezen door het College voor Promoties in het openbaar te verdedigen op 6 juni 2003 om 16.00 uur…

    • 21377 Words
    • 86 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks)…

    • 713 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cryptanalysis

    • 1790 Words
    • 8 Pages

    Cryptanalysis is the study of defeating the methods generated by cryptography. The aim is to find out some flaws in a cryptographic scheme. Cryptology is the combined study of both cryptography and cryptanalysis.…

    • 1790 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The Vigenère cipher is a method of encrypting alphabetic text by using a key known as a running key, which is generated by a keyword. In a Caesar cipher, we have to shift every letter of the alphabet with other number of places The Vigenère cipher consists of many Caesar ciphers in sequence with different shift values.…

    • 1692 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    [2] Joan Daemen, Vincent Rijmen, "The Block Cipher Rijndael", Proceeding CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications, pp: 277 - 284, 2000.…

    • 2501 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    cryptography

    • 2454 Words
    • 10 Pages

    Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Since World war and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.…

    • 2454 Words
    • 10 Pages
    Better Essays