TY - JOUR
T1 - Comments on "how to repair the Hill cipher"
AU - Rangel-Romero, Y.
AU - Vega-García, R.
AU - Menchaca-Méndez, A.
AU - Acoltzi-Cervantes, D.
AU - Martínez-Ramos, L.
AU - Mecate-Zambrano, M.
AU - Montalvo-Lezama, F.
AU - Barrón-Vidales, J.
AU - Cortez-Duarte, N.
AU - Rodríguez-Henríquez, F.
PY - 2008/2
Y1 - 2008/2
N2 - A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.
AB - A modification of the Hill cipher algorithm was recently proposed by Ismail et al.(2006), who claimed that their new scheme could offer more security than the original one due to an extra non-linearity layer introduced via an elaborated key generation mechanism. That mechanism produces one different encryption key for each one of the plaintext blocks. Nevertheless, we show in this paper that their method still has severe security flaws whose weaknesses are essentially the same as that already found in the original Hill cipher scheme.
KW - Hill cipher
KW - Image encryption
KW - Symmetric encryption
UR - http://www.scopus.com/inward/record.url?scp=38949172736&partnerID=8YFLogxK
U2 - 10.1631/jzus.A072143
DO - 10.1631/jzus.A072143
M3 - Artículo
AN - SCOPUS:38949172736
SN - 1673-565X
VL - 9
SP - 211
EP - 214
JO - Journal of Zhejiang University: Science A
JF - Journal of Zhejiang University: Science A
IS - 2
ER -