Implementasi Matriks Skew-symmetric dalam Metode Kriptografi Affine-Hill Cipher

Authors

  • Putri Nisa Pratiwi Departemen Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Padjadjaran, Sumedang 45363, Indonesia
  • Sisilia Sylviani Departemen Matematika, Fakultas Matematika dan Ilmu Pengetahuan Alam, Universitas Padjadjaran, Sumedang 45363, Indonesia

DOI:

https://doi.org/10.22437/msa.v4i1.28864

Keywords:

Modular operation, Affine-Hill Cipher, Skew-symmetric matrix

Abstract

The concept of cryptography is widely used to reduce data security threats along with developments in information technology. Affine Cipher is an example of classic cryptography that utilizes modular operations and shifts on characters. On the other hand, Hill Cipher method is more dependent on matrix operations. The combination of the two methods, Affine-Hill Cipher, creates a more complex and superior method in terms of security. In this research, we utilize a square skew-symmetric matrix with an order corresponds to the secret key to construct the key matrix. The encryption and decryption processes are carried out using the Affine-Hill Cipher and adding the key exchange concept into the algorithm. The results indicate that this algorithm’s complexity can effectively reduce data security threats.

Downloads

Download data is not yet available.

References

Maulana, K., Nofrianto, D., & and others. 2023. Hill-Cipher Method with Matrice In Text Coding Processing. Klik-Kumpulan Jurnal Ilmu Komputer, 10(1), 51–61.

Alawiyah, T., Hikmah, A. B., Wiguna, W., Kusmira, M., Sutisna, H., & Simpony, B. K. 2020. Generation of Rectangular Matrix Key for Hill Cipher Algorithm Using Playfair Cipher. Journal of Physics: Conference Series, 1641(1), 012094. https://doi.org/10.1088/1742-6596/1641/1/012094.

Liew, K. J., & Nguyen, V. 2020. Hill Cipher Key Generation Using Skew-symmetric Matrix.

Chen, Y., Xie, R., Zhang, H., Li, D., & Lin, W. 2023. Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices. Wireless Networks. https://doi.org/10.1007/s11276-023-03330-8.

Acharya, B., Rath, G., Patra, S., & Panigrahy, S. K. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm. International Journal of Security, 1.

Hidayat, A., & Alawiyah, T. 2013. Enkripsi dan Dekripsi Teks menggunakan Algoritma Hill Cipher dengan Kunci Matriks Persegi Panjang. Jurnal Matematika Integratif, 9(1), 39. https://doi.org/10.24198/jmi.v9.n1.10196.39-52.

Kanwal, S., Inam, S., Othman, M. T. Ben, Waqar, A., Ibrahim, M., Nawaz, F., Hamam, H. 2022. An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices. Sensors, 22(12), 4359. https://doi.org/10.3390/s22124359.

Sharma, N., & Chirgaiya, S. 2014. A Novel Approach to Hill Cipher. International Journal of Computer Applications, 108, 34–37. https://doi.org/10.5120/18958-0285.

Sundarayya, P., & Vara Prasad, G. 2019. A public key cryptosystem using Affine Hill Cipher under modulation of prime number. Journal of Information and Optimization Sciences, 40(4), 919–930. https://doi.org/10.1080/02522667.2018.1470751.

Prasad, K., & Mahato, H. 2022. Cryptography using generalized Fibonacci matrices with Affine-Hill cipher. Journal of Discrete Mathematical Sciences and Cryptography, 25(8), 2341–2352. https://doi.org/10.1080/09720529.2020.1838744.

Billore, V., & Patel, N. 2023. Cryptography utilizing the Affine-Hill cipher and Extended Generalized Fibonacci matrices. Electronic Journal of Mathematical Analysis and Applications, 11(2), 1–11. https://doi.org/10.21608/ejmaa.2023.295792.

Kumari, M., & Tanti, J. 2023. Cryptography using multinacci block matrices. International Journal of Nonlinear Analysis and Applications. https://doi.org/10.22075/ijnaa.2023.29918.4295.

Mohanta, K. K., & Sharanappa, D. S. 2022. A Public-Key Cryptographic Model Based on Hybrid Key Exchange Technique using Affine-Hill Cipher. Communications in Combinatorics, Cryptography & Computer Science, 2022(2), 94–104.

Kumari, M., & Tanti, J. 2020. A public key cryptography using multinacci block matrices. arXiv preprint arXiv:2003.08634.

Prasad, K., Mahato, H., & Kumari, M. 2022, October. A novel public key cryptography based on generalized Lucas matrices.

Viswanath, M. K., & Kumar, M. R. 2015. A Public Key Cryptosystem Using Hiil’s Cipher. Journal of Discrete Mathematical Sciences and Cryptography, 18(1–2), 129–138. https://doi.org/10.1080/09720529.2014.962856.

Downloads

Published

2023-10-31

How to Cite

Pratiwi, P. N. ., & Sylviani, S. . (2023). Implementasi Matriks Skew-symmetric dalam Metode Kriptografi Affine-Hill Cipher. Mathematical Sciences and Applications Journal, 4(1), 40-45. https://doi.org/10.22437/msa.v4i1.28864