2008
DOI: 10.1631/jzus.a072143
|View full text |Cite
|
Sign up to set email alerts
|

Comments on “How to repair the Hill cipher”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…However, Hill-Cipher succumbs to a known plain-text attack [6] and another weakness is the very poor encryption quality for images with very close pixel values or with uniform background. To address these weaknesses we propose an improvement of the basic method with a Lagged Fibonacci Generators.…”
Section: A Image Encryption With Hill-cipher and Its Vulnerabilitiesmentioning
confidence: 99%
“…However, Hill-Cipher succumbs to a known plain-text attack [6] and another weakness is the very poor encryption quality for images with very close pixel values or with uniform background. To address these weaknesses we propose an improvement of the basic method with a Lagged Fibonacci Generators.…”
Section: A Image Encryption With Hill-cipher and Its Vulnerabilitiesmentioning
confidence: 99%
“…Ismail et al [6] proposed a modified Hill cipher named HILLMRIV algorithm, a secret initial vector is used to obtain the unique key for enciphering. Rangel-Romero et al [7] claimed that HILLMRIV algorithm has few major drawbacks and it is still prone to Known-plaintext attacks.…”
Section: Introductionmentioning
confidence: 99%
“…[7] tried to improve the security of the Hill cipher's by using initial vector (HiIlMRIV) that multiplies successively by some orders of the key matrix to produce the corresponding key of each block but it is also proved that this scheme is also vulnerable to known-plaintext attack. [9] presented that If Initial Vector is not chosen carefully, some of the new generated keys may not be invertible over Zm, this make encryption/decryption process useless . [10] improved the Hill cipher's security by using many random numbers.…”
Section: Introductionmentioning
confidence: 99%