|
Journal of Zhejiang University SCIENCE A
ISSN 1673-565X(Print), 1862-1775(Online), Monthly
2008 Vol.9 No.2 P.211-214
Comments on “How to repair the Hill cipher”
Abstract: A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.
Key words: Hill cipher, Symmetric encryption, Image encryption
References:
Open peer comments: Debate/Discuss/Question/Opinion
<1>
DOI:
10.1631/jzus.A072143
CLC number:
TN918; TP309
Download Full Text:
Downloaded:
3753
Clicked:
5697
Cited:
5
On-line Access:
2024-08-27
Received:
2023-10-17
Revision Accepted:
2024-05-08
Crosschecked: