Investigation of Hill Cipher Modifications Based on Permutation and Iteration

نویسندگان

  • Mina Farmanbar
  • Alexander G. Chefranov
چکیده

Two recent Hill cipher modifications which iteratively use interweaving and interlacing are considered. We show that strength of these ciphers is due to non-linear transformation used in them (bit-level permutations). Impact of number of iterations on the avalanche effect is investigated. We propose two Hill cipher modifications using column swapping and arbitrary permutation with significantly less computational complexity (2 iterations are used versus 16). The proposed modifications decrease encryption time while keeping the strength of the ciphers. Numerical experiments for two proposed ciphers indicate that they can provide a substantial avalanche effect.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting

This paper is discussed about the strength of extended cipher due to non-linear transformation of interweave transposition and shifting operations. The impact of number of iterations on the avalanche effect is investigated. During encryption process the interweaving of the resulting plaintext, at each stage of the iteration, and the multiplication with the key matrix followed by transposition a...

متن کامل

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

A Block Cipher Obtained By Blending Modified Feistel Cipher And Advanced Hill Cipher Involving A Single Key Matrix

In this investigation, we have developed a block cipher which includes the basic ideas of the modified Feistel cipher and the advanced Hill cipher. In the advanced Hill cipher, as the modular arithmetic inverse of a matrix is the same as the matrix itself, the computations involved in the development of the inverse of the matrix are reduced remarkably. The cryptanalysis carried out in this inve...

متن کامل

A Modified Hill Cipher Involving Interweaving and Iteration

This paper deals with a modification of the Hill cipher. In this, we have introduced interweaving in each step of the iteration. The interweaving of the resulting plaintext, at each stage of the iteration, and the multiplication with the key matrix leads to confusion and diffusion. From the cryptanalysis performed in this investigation, we have found that the cipher is a strong one.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1209.5836  شماره 

صفحات  -

تاریخ انتشار 2012