International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.6, No.5, Apr. 2014

A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS

Full Text (PDF, 793KB), PP.57-65

Views:73   Downloads:4


Ahmed Y. Mahmoud, Alexander G. Chefranov

Index Terms

Hill cipher;eiqenvalue exponentiation;pseudorandom number;dynamic key;dynamic key size;image encryption


All the proposed Hill cipher modifications have been restricted to the use of dynamic keys only. In this paper, we propose an extension of Hill cipher modification based on eigenvalues HCM-EE, called HCM-EXDKS. The proposed extension generating dynamic encryption key matrix by exponentiation that is made efficiently with the help of eigenvalues, HCM-EXDKS introduces a new class of dynamic keys together with dynamically changing key size. Security of HCM-EXDKS is provided by the use of a large number of dynamic keys with variable size. The proposed extension is more effective in the encryption quality of RGB images than HCM-EE and Hill cipher-known modifications in the case of images with large single colour areas and slightly more effective otherwise. HCM-EXDKS almost has the same encryption time as HCM-EE, and HCM-HMAC. HCM-EXDKS is two times faster than HCM-H, having the best encryption quality among Hill cipher modifications compared versus HCM-EXDKS.

Cite This Paper

Ahmed Y. Mahmoud, Alexander G. Chefranov,"A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS", IJCNIS, vol.6, no.5, pp.57-65, 2014. DOI: 10.5815/ijcnis.2014.05.08


[1]Hill L. S. 1929. Cryptography in an Algebraic Alphabet, American Mathematical Monthly; 36(6): 306-312.

[2]Hill L. S. 1931. Concerning Certain Linear Transformation Apparatus of Cryptography, American Mathematical Monthly; 38(3): 135-154.

[3]Overbey, J. Traves, W. and Wojdylo, J. 2005. On the Key Space of the Hill Cipher, Cryptologia, 29(1), 59-72.

[4]Stallings W. 2006. Cryptography and Network Security Principles and Practices (4th edn.). Prentice Hall: New Jersey.

[5]Saeednia, S. 2000. How to Make the Hill Cipher Secure, Cryptologia, 24(4), 353-360.

[6]Konheim A.G. 2006. Computer Security and Cryptography. John Wiley & Sons: New Jersey, 2007.

[7]Koblitz N. 1987. A course in Number Theory and Cryptography. Springer-Verlag: New York, 64-74.

[8]Chefranov, A. G. 2008. Secure Hill Cipher Modification SHC-M, Proc. of the First International Conference on Security of Information and Networks (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, El?i, A., Ors, B., and Preneel, B. (Eds.) Trafford Publishing, Canada. 34-37.

[9]Ismail A.I., Amin M, Diab H. 2006. How to Repair the Hill Cipher. J. Zhejiang Univ Sci. A; 7(12): 2022-2030.

[10]Lin, C. H., Lee, C. Y. and Lee, C. Yu. 2004. Comments on Saeednia’s Improved Scheme for the Hill Cipher, Journal of the Chinese Institute of Engineers, 27(5), 743-746.

[11]Mahmoud A.Y, Chefranov A.G. 2009. Hill Cipher Modification Based on Eigenvalues HCM-EE, Proc. of the Second International Conference on Security of Information and Networks (SIN2009) 2009; Gazimagusa (TRNC) North Cyprus, Elci, A., Orgun, M., and Chefranov, A. (Eds.) ACM, New York, USA: 164- 167.

[12]Romero Y.R, Garcia R.V, et al. 2007. Comments on How to Repair the Hill Cipher. Journal of Zhejiang University Science A ; 9(2): 211-214.

[13]Li CD, Zhang D, Chen G. 2008. Cryptanalysis of an Image Encryption Scheme Based on the Hill Cipher. Journal of Zhejiang University Science A; 9: 1118-1123.

[14]Mohsen T, Abolfazl F. 2011. A Secure Cryptosystem Based on Affine Transformation. John Wiley & Sons; 4(2): 207-215.

[15]Rivest R, The MD5 Message-Digest Algorithm. Internet RFC 1321, April 1992.

[16]Federal Information Processing Standard (FIPS) 180-2, 2002, Secure Hash Standard, NIST, U. S. Department of Commerce.

[17]Schneier B., 1996. Applied cryptography: Protocols, Algorithms, and Source Code in C (2nd edn), John Wiley & Sons: New York.

[18]Apostol T.M. 1976. Introduction to Analytic Number Theory Springer.

[19]Galvin, W. P. 1984. Matrices with Custom-Built Eigenspaces, this MONTHLY, 91, 308-309.

[20]Ziedan I, Fouad M, Salem H.D. Application of Data Encryption Standard to Bitmap and JPEG Images. Proc. Twentieth National Radio Science Conference (NRSC), Egypt 2003; 1-16.

[21]Elkamchouchi H, Makar A.M. Measuring Encryption Quality of Bitmaps Images with Rijndael and KAMKAR Block Ciphers. Proc. Twenty Second National Radio Science Conference (NRSC), Egypt 2005; 1-8.