Open Access
Subscription Access
Open Access
Subscription Access
An Application of Finite Field in Hill Cipher
Subscribe/Renew Journal
Lester S. Hill in 1929 introduced non-singular matrices to encrypt and decrypt the message in the symmetric key cryptography. Block ciphers designing and cryptographic hash functions have the use of matrices. Here, we introduce permutations, iterations and finite field in the Hill cipher to provide more security and make it free from vulnerable attacks.
Keywords
Encryption, Decryption, Finite Field, Hill Cipher.
Subscription
Login to verify subscription
User
Font Size
Information
Abstract Views: 232
PDF Views: 0