1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North...
-
Upload
juniper-blair -
Category
Documents
-
view
218 -
download
1
Transcript of 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North...
![Page 1: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/1.jpg)
1
Secure Hill Cipher Modification SHC-M
A.G.ChefranovEastern Mediterranean University, North Cyprus,
Taganrog Institute of Technology, Federal University of South Russia, Russia
![Page 2: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/2.jpg)
2
Introduction
Hill cipher is very attractive due to its simplicity Some recent publications devoted to the Hill cipher:1. Ismail et al., J. Zhejiang Univ SCIENCE A 2006
7(12):2022-20302. Thilaka & Rajalakshmi, Cryptologia, 2005, 29:4,
367-3763. Lin et al., Zhōngguó gōngchéng xuékān (Zhōngguó
gōngchéng xuékān), 2004, vol. 27, no. 5, pp. 743-746
4. Saeednia, S.: How to Make the Hill Cipher Secure. Cryptologia, Vol. 24. 4 (2000) 353-360
![Page 3: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/3.jpg)
3
Hill cipher
Proposed in 1929 C=K·P+B Can be broken in the known plaintext-
ciphertext attack
![Page 4: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/4.jpg)
4
Secure Hill cipher SHC
Proposed by Saeednia, 2000 Initial settings. All matrices considered
below are m·m sized over Zm, (e.g., m=26 for English language texts). A sender, S, and a receiver, R, share an invertible key matrix K. A plaintext, P, and a cipher-text, C, are also matrices.
Encryption. The sender S chooses a permutation, t, over Zm, and, using it, builds a permutation matrix, Mt. For example, if
then )1,2,0,3(t
![Page 5: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/5.jpg)
5
Secure Hill cipher SHC
0
0
0
1
0
1
0
0
1
0
0
0
0
0
1
0
tM7
11
3
15
6
10
2
14
5
9
1
13
4
8
0
12
15
11
7
3
14
10
6
2
13
9
5
1
12
8
4
0
0
0
0
1
0
1
0
0
1
0
0
0
0
0
1
0
PM t
0
0
1
0
0
1
0
0
0
0
0
1
1
0
0
0
1 tM
13
9
5
1
14
10
6
2
12
8
4
0
15
11
7
3
0
0
1
0
0
1
0
0
0
0
0
1
1
0
0
0
15
11
7
3
14
10
6
2
13
9
5
1
12
8
4
0
1 tMP
![Page 6: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/6.jpg)
6
Secure Hill cipher SHC
1 ttt MKMK
PKC t
tKu S->R: C, u
![Page 7: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/7.jpg)
7
Secure Hill cipher SHC
Decryption:
uKt 1
CKP t 1
The weakness of SHC is in the transfer of the Hill encrypted vector u via network channels
![Page 8: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/8.jpg)
8
Modification of the secure Hill cipher SHC-M Initial settings. Shared data: K, SEED Encryption. Sender, S, selects a number, n,
and calculates ),( nSEEDPRPGt
S->R: C, n xor SEED
Decryption. Receiver, R, given n and SEED, calculates t. Having t, calculates Kt. Having Kt and C, calculates the plaintext P
![Page 9: 1 Secure Hill Cipher Modification SHC-M A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University.](https://reader036.fdocuments.us/reader036/viewer/2022071715/56649ec85503460f94bd4d96/html5/thumbnails/9.jpg)
9
Conclusion
Thus far, we proposed a modification to SHC which gives more strength to it due to the avoidance of secret information transfer via network channels. In our approach, only the number of a permutation is transferred (together with a cipher-text)