Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Application of Finite Field in Hill Cipher


Affiliations
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, India
     

   Subscribe/Renew Journal


Lester S. Hill in 1929 introduced non-singular matrices to encrypt and decrypt the message in the symmetric key cryptography. Block ciphers designing and cryptographic hash functions have the use of matrices. Here, we introduce permutations, iterations and finite field in the Hill cipher to provide more security and make it free from vulnerable attacks.

Keywords

Encryption, Decryption, Finite Field, Hill Cipher.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 233

PDF Views: 0




  • An Application of Finite Field in Hill Cipher

Abstract Views: 233  |  PDF Views: 0

Authors

P. L. Sharma
Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, India
S. Sharma
Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, India

Abstract


Lester S. Hill in 1929 introduced non-singular matrices to encrypt and decrypt the message in the symmetric key cryptography. Block ciphers designing and cryptographic hash functions have the use of matrices. Here, we introduce permutations, iterations and finite field in the Hill cipher to provide more security and make it free from vulnerable attacks.

Keywords


Encryption, Decryption, Finite Field, Hill Cipher.