HILL-CIPHER METHOD WITH MATRICE IN TEXT CODING PROCESSING

desi vinsensia, Kiky Maulana, Dedy Nofrianto

Abstract


Cryptography is one of the matrice applications that can be used to translate a message. This research discusses cryptography, which is the science or art of encryption with the aim of making messages incomprehensible to others. The cryptography method  that will be used in this research is the Hill Cipher, ,which is one of the cryptographic techniques for encrypting a text by translating a message into a code over a matrice of numbers modulo 26 and  converting the codes into the actual message using the decipher method over a matrice of numbers modulo 26. The purpose of this research is to develop the Hill Cipher in word encoding and decipher through the  matrices. The test result found that the hill cipher method and the decipher method are able to translate the actual text as long as the matrices given in the hill cipher algorithm have an inverse and determinant.

Keywords: Hill-Cipher, criptograhy, matrices, plaintext 

Kriptografi merupakan salah satu aplikasi matriks yang dapat digunakan untuk menerjemahkan sebuah pesan. Penelitian ini membahas tentang kriptografi yang merupakan ilmu atau seni dari penyandian dengan tujuan agar pesan tidak dimengerti oleh orang lain. Metode kriptografi yang akan digunakan dalam penelitian ini adalah metode Hill Cipher dan metode Decipher  yang merupakan kriptografi merupakan salah satu teknik kriptografi untuk mengenkripsi teks dengan menerjemahkan pesan ke dalam kode melalui matriks angka modulo 26 dan mengubah kode menjadi pesan yang sebenarnya dengan menggunakan metode penguraian melalui matriks angka modulo 26. Penelitian ini berfokus pada pengembangan algoritma Hill Cipher dalam penyandian kata dan Dechiper melalui matriks berodo . Hasil pengujian didapatkan bahwa metode Hill Cipher dan metode decipher mampu menterjemahkan teks yang sebenarnya selama matriks-matriks yang diberikan pada algoritma Hill Cipher memiliki invers dan determinan.

Kata kunci: Hill-Cipher, Kriptografi, Matriks, plaintext


Full Text:

PDF

References


V. Kalaichelvi, K. Manimozhi, P. Meenakshi, B. Rajakumar, and P. Vimaladevi, “A new variant of Hill cipher algorithm for data security,” Int. J. Pure Appl. Math., vol. 117, no. 15 Special Issue, pp. 581–588, 2017.

M. Stinson, Douglas Robert Paterson, Cryptography Theory and Practice, 4th ed. New york: CRC Press, 2018. doi: https://doi.org/10.1201/9781315282497.

K. J. Liew and V. T. Nguyen, “Hill Cipher Key Generation Using Skew-symmetric Matrix,” Proc. 7th Int. Cryptol. Inf. Secur. Conf. 2020, Cryptol. 2020, no. June, pp. 85–93, 2020.

M. Viswambari and K. Mani, “Generation of Key Matrix for Hill Cipher using Magic Rectangle,” Proc. - 2nd World Congr. Comput. Commun. Technol. WCCCT 2017, vol. 10, no. 5, pp. 51–54, 2017.

A. Hidayat and T. Alawiyah, “Enkripsi dan Dekripsi Teks menggunakan Algoritma Hill Cipher dengan Kunci Matriks Persegi Panjang,” J. Mat. Integr., vol. 9, no. 1, p. 39, 2013, doi: 10.24198/jmi.v9i1.10196.

V. S. Shetty, R. Anusha, K. Dileep, and P. Hegde, “A Survey on Performance Analysis of Block Cipher Algorithms,” Proc. 5th Int. Conf. Inven. Comput. Technol. ICICT 2020, pp. 167–174, 2020, doi: 10.1109/ICICT48043.2020.9112491.

L. J. Pangaribuan, “Kriptografi Hybrida Agloritma Hill Cipher Dan Rivest Shamir Adleman (RSA) Sebagai Pengembangan Kriptografi Kunci Simetris (Studi Kasus : Nilai Mahasiswa Amik Mbp),” J. Teknol. Inf. Dan Komun., vol. 7, no. 1, pp. 11–26, 2018.

J. R. Paragas, A. M. Sison, and R. P. Medina, “Hill cipher modification: A simplified approach,” 2019 IEEE 11th Int. Conf. Commun. Softw. Networks, ICCSN 2019, no. June, pp. 821–825, 2019, doi: 10.1109/ICCSN.2019.8905360.

M. D. L. Siahaan and A. P. U. Siahaan, “Application of Hill Cipher Algorithm in Securing Text Messages,” Int. J. Innov. Res. Multidiscip. F., vol. 4, no. 10, pp. 55–59, 2018.

K. Madhusudhan Reddy, A. Itagi, S. Dabas, and B. K. Prakash, “Image encryption using orthogonal Hill Cipher algorithm,” Int. J. Eng. Technol., vol. 7, no. 4, pp. 59–63, 2018, doi: 10.14419/ijet.v7i4.10.20707.

T. Alawiyah, A. B. Hikmah, W. Wiguna, M. Kusmira, H. Sutisna, and B. K. Simpony, “Generation of Rectangular Matrix Key for Hill Cipher Algorithm Using Playfair Cipher,” J. Phys. Conf. Ser., vol. 1641, no. 1, 2020, doi: 10.1088/1742-6596/1641/1/012094.

A. J. Menezes, “Applied Cryptography,” Electr. Eng., vol. 1, no. [32, pp. 429–455, 1996, [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.2838&rep=rep1&type=pdf

S. W. Bray, Introduction to Cryptography and Python. 2020. doi: 10.1002/9781119612216.ch1.

Nana; and P. W. Prasetyo, “2021_An implementation of Hill Cipher and ×3×3 rubik’s,” Bull. Appl. Math. Math. Educ., vol. 1, no. 2, pp. 75–92, 2021.

W. Shwetambari and M. Ujwala, “Development of Matrix for Cryptography,” J. Emerg. Technol. Innov. Res., vol. 7, no. 4, pp. 112–118, 2020.




DOI: http://dx.doi.org/10.20527/klik.v10i1.598

Copyright (c) 2023 KLIK - KUMPULAN JURNAL ILMU KOMPUTER

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Indexed by:

  
 

 

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.joomla
counter View My Stats