Hill Cipher and Self Repetitive Matrix for Encryption and Decryption

Archana, Ashish Vashist


The role of cryptography in today’s era is most significant. It not only secures information mathematically by mailing massage with a key but also provides confidentiality. Hill cipher is also one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access. This paper gives us dimensions of new technique in Hill cipher, here we are developing the complex procedure of key generation for the process of encryption of message to avoid any kind of data loss. Hill cipher is a matrix based poly graphic substitution which is an additional factor. The method of generating self-repetitive matrix for Hill Cipher algorithm has been proposed. In the self-repetitive matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix.

Full Text:



G.R. Blakley, Twenty years of cryptography in the open literature, Security and Privacy 1999, Proceedings of the IEEE Symposium, 9-12 May 1999.

H. Imai, G. Hanaoka, J. Shikata, A. Otsuka, A.C. Nascimento, Cryptography with information theoretic security”, Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002.

A. J. Menezes, P.C. Van Oorschot, S.A. Van Stone, Handbook of applied cryptography

(CRC press, 1996).

J. Overbey, W. Traves, J. Wojdylo, On the Keyspace of the Hill cipher. Cryptologia,

(1), 2005, 59-72.

K. Petersen, Notes on number theory and cryptography,2000. Http://www.math.unc.edu/


Barr T.H., Invitation to cryptography (Prentice Hall, 2002)

W. Stallings, Cryptography and network security (4th edition, Prentice Hall, 2005)

Alam A., Sehat ullah, Itiaq W., Khalid S., (2011), International journal of advance computer science, Vol. 1, No. 3, pp. 113-117.

David S., (2008), “ The playfair cipher” Vinculum Vol. 45, No. 2, pp. 4-6.

Dhenakaran S. S., Llayaraja M., (2012)” Extansion of Playfair Cipher usinf 16×16 Matix”, International Journal of computer, Vol. 48, No . 7, pp. 37-41.

Hassan. H. A., Seab M., and Hameed H. D , (2005), “ The Pyramids of Block Cipher”,

International Journal of Network Security. Vol.1, No. 1, PP. 52-60.

Krishna A. V. N., Madhuravani K., (2012), “A Modified Hill cipher using Randamized Approach” I. J. Computer Network and Information Security, No. 5, 56-62.

Manas P. , Jyotsna K., (2012), “ A General Session Based a Bit Level Block Encoding Technique using Symmetric key Cryptography to enhance the security of Network Based Transmission”, International Journal of computer science, Engineering and Information Technolgy, Vol. 2, No. 3, pp. 31-42.

Michael A., (1995), The Metaphor is the key: Cryptography, the Clipper chip and the Constitution, University of Pennsylvania law Review, Vol. 143, No. 3.

Rushdi A., Farajallah M., (2009), “ A Design os a roust cryptosystem algorithm for Non- Invertable Matrices Based on Hill cipher”, International journal of computer science and Network Security, Vol. 9, pp. 11-16.

Sreenivasulu R., Murali S., (2012), International Journal of computer science and information technology, Vol. 2, No. 1, pp. 121-124.

Lalana, K., Tim, F., Anupam, J.: Developing secure agent systems using delegation based trust management. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI) vol. 2631, Springer, Heidelberg (2003)


  • There are currently no refbacks.