Image Encryption Using Orthogonal Hill Cipher Algorithm

  • Authors

    • K. Madhusudhan Reddy
    • Anirudh Itagi
    • Saransh Dabas
    • Bonam Kamala Prakash
    2018-10-02
    https://doi.org/10.14419/ijet.v7i4.10.20707
  • Orthogonal Matrix, Hill Cipher, Invertibility, Encryption.
  • The Hill Cipher algorithm is a practical algorithm which requires only preliminary knowledge of matrices which makes it quite useful. But, for decrypting the encoded information the key matrix needs to have an inverse (The key matrix needs to be invertible) or else it is impossible to decrypt the given information. The main objective of our paper is to introduce an unorthodox and improved version of Hill Cipher which will make encryption and decryption of an image easier. This paper has diverged from the conventional method by using an orthogonal matrix (where the transpose of a matrix is equal to its inverse) as our key matrix. This method is faster and easier as finding the transpose of a matrix is much simpler than finding the inverse of a given matrix and hence, facilitating the process of faster execution. To further break down the process into an even simpler one, we have added a few more constraints. To show its application, we have used this method to encrypt images using MatLab.

     

     
  • References

    1. [1] Stallings, William. Network security essentials: applications and standards. Pearson Education India, 2007.

      [2] Stallings, William, and Mohit P. Tahiliani. Cryptography and network security: principles and practice. Vol. 6. London: Pearson, 2014.

      [3] Feistel, Horst. "Cryptography and computer privacy." Scientific american 228.5 (1973): 15-23.

      [4] Acharya, Bibhudendra, et al. "Image encryption using advanced hill cipher algorithm." International Journal of Recent Trends in Engineering 1.1 (2009).

      [5] Sastry, V. U. K., and N. Ravi Shankar. "Modified Hill Cipher with Interlacing and Iteration 1." (2007).

      [6] Acharya, B., Jena, D., Patra, S. K., & Panda, G. (2009, January). Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System. In Advanced Computer Control, 2009. ICACC'09. International Conference on (pp. 410-414). IEEE.

      [7] Hill, Lester S. "Concerning certain linear transformation apparatus of cryptography." The American Mathematical Monthly 38.3 (1931): 135-154.

      [8] Hill, Lester S. "Cryptography in an algebraic alphabet." The American Mathematical Monthly 36.6 (1929): 306-312.

      [9] Ganesan, K., and R. Anandan. "Version Control using Cryptographic Access Control." In Information Technology, 2006. ICIT'06. 9th International Conference on, pp. 192-196. IEEE, 2006.

      [10] Sastry, V. Umakanta, N. Ravi Shankar, and S. Durga Bhavani. "A Modified Hill Cipher Involving Interweaving and Iteration." IJ Network Security 10, no. 3 (2010): 210-215.

      [11] Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.

      [12] Hori, G. (2011, May). Natural gradient approach in orthogonal matrix optimization using cayley transform. In Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on (pp. 2116-2119). IEEE.

      [13] Sastry, V. U. K., Murthy, D. S. R., & Bhavani, S. D. (2010). A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side. International Journal of Computer Theory and Engineering, 2(5), 805.

      [14] Ismail, I. A., Mohammed Amin, and Hossam Diab. "How to repair the Hill cipher." Journal of Zhejiang University-Science A 7.12 (2006): 2022-2030.

      Khalaf, A. A., El-karim, M. S. A., & Hamed, H. F. (2015, July). Proposed triple hill cipher algorithm for increasing the security level of encrypted binary data and its implementation using FPGA. In Advanced Communication Technology (ICACT), 2015 17th International Conference on (pp. 454-459). IEEE.
  • Downloads

  • How to Cite

    Madhusudhan Reddy, K., Itagi, A., Dabas, S., & Kamala Prakash, B. (2018). Image Encryption Using Orthogonal Hill Cipher Algorithm. International Journal of Engineering & Technology, 7(4.10), 59-63. https://doi.org/10.14419/ijet.v7i4.10.20707