Volume 54 | Number 7 | Year 2018 | Article Id. IJMTT-V54P562 | DOI : https://doi.org/10.14445/22315373/IJMTT-V54P562
Cryptography is the study of methods of sending a message in disguised form so that only the intended people can receive the original message. In data communication, the major issue now is the security of the data. To maintain its confidentiality, integrity and availability, we need to protect the data and its communications from rivals. Today in this e-world, the necessity of protecting the data is of higher importance. With the introduction of computers in this modern world, message sharing becomes very easy via e-mail, mobile phone communication etc.,. Also the information that is being sent via computers can be intercepted and read by an enemy. So the necessity of data hiding is obvious. In this research paper, we give a study on Hill’s cipher in cryptography.
[1] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp. 14-21.
[2] Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C. 2002. Cyptography with Information Theoretic Security. Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002.
[3]Menezes, A. J., P.C. Van Oorschot, S.A. Van Stone. 1996. Handbook of Applied Cryptography. CRC press.
[4] Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 9(l):59-72.
[5] Petersen, K., 2000. Notes on Number Theory and Cryptography.
N.Vijayaraghavan, S.Narasimhan, M.Baskar, "A Study on the Analysis of Hill’s Cipher in Cryptography," International Journal of Mathematics Trends and Technology (IJMTT), vol. 54, no. 7, pp. 519-522, 2018. Crossref, https://doi.org/10.14445/22315373/IJMTT-V54P562