{"title":"Performance And Security Enhanced Improved Hill Cipher","authors":"Muralidharan D, B. R, Vijay Sai R, C. K","doi":"10.1109/ICECCT56650.2023.10179696","DOIUrl":null,"url":null,"abstract":"Hill cipher is one of the classical ciphers which is considered as a secured one till date apart from its vulnerability of known plaintext attack. Because of its simplicity, in recent days also it is used as one of the building block of cryptography and steganography based algorithms. Many research articles are available to minimize the known plaintext attack vulnerability of Hill cipher. One of the research works suggests to use a second key which varies exponentially with block numbers of the plaintext. Though the proposal is very simple, it is a time consuming process. Furthermore, it has some weak blocks which deteriorates the security. In this research article both issues are rectified by the inclusion of a look-up-table method. The proposed method saves power and enhances the speed by slightly compromising with area. Implementation results show that the proposed method reduces the performance complexity from O(nlogn) to O(n).","PeriodicalId":180790,"journal":{"name":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECCT56650.2023.10179696","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Hill cipher is one of the classical ciphers which is considered as a secured one till date apart from its vulnerability of known plaintext attack. Because of its simplicity, in recent days also it is used as one of the building block of cryptography and steganography based algorithms. Many research articles are available to minimize the known plaintext attack vulnerability of Hill cipher. One of the research works suggests to use a second key which varies exponentially with block numbers of the plaintext. Though the proposal is very simple, it is a time consuming process. Furthermore, it has some weak blocks which deteriorates the security. In this research article both issues are rectified by the inclusion of a look-up-table method. The proposed method saves power and enhances the speed by slightly compromising with area. Implementation results show that the proposed method reduces the performance complexity from O(nlogn) to O(n).