2013 IEEE Symposium on Computers and Communications (ISCC) 2013
DOI: 10.1109/iscc.2013.6754985
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the Toorani-Falahati Hill Ciphers

Abstract: In 2009 and 2011, Toorani and Falahati introduced two variants of the classical Hill Cipher, together with protocols for the exchange of encrypted messages. The designers claim that the new systems overcome the weaknesses of the original Hill Cipher, and are resistant to any ciphertext-only, known-plaintext, chosen-plaintext, or chosen-ciphertext attack. However, we describe a chosen-plaintext attack that easily breaks both Toorani-Falahati Hill Ciphers, and we present computational results that confirm the ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 8 publications
0
2
0
1
Order By: Relevance
“…Kriptanalisis adalah ilmu untuk mengamankan, menganalisis dan membobol keamanan kriptografi [3]. Kriptanalisis dapat melakukan serangan terhadap pesan yang dienkripsi berdasarkan ketersediaan data yang ada, salah satunya dengan known plaintext attack atau dengan mengetahui sebagian atau potongan plaintext dari pesan tersebut [4]. Salah satu kriptografi yang mudah dipecahkan dengan teknik known plaintext attack adalah kriptografi Hill Cipher [5].…”
Section: Pendahuluanunclassified
“…Kriptanalisis adalah ilmu untuk mengamankan, menganalisis dan membobol keamanan kriptografi [3]. Kriptanalisis dapat melakukan serangan terhadap pesan yang dienkripsi berdasarkan ketersediaan data yang ada, salah satunya dengan known plaintext attack atau dengan mengetahui sebagian atau potongan plaintext dari pesan tersebut [4]. Salah satu kriptografi yang mudah dipecahkan dengan teknik known plaintext attack adalah kriptografi Hill Cipher [5].…”
Section: Pendahuluanunclassified
“…But Liam Keliher and Anthony Z. Delaney develop Chosen Plaintext attack which breaks the secure variant of Hill Cipher [7].…”
Section: B Hill Cipher Modification Based On Affine Transform and Onmentioning
confidence: 99%
“…It thwarts the known plaintext attack but this scheme is not efficient and is vulnerable to the chosen cipher text attack and is proved by [11 12]. Keliher and Delaney (2013) proved that TFHill it is also vulnerable to attacks [13]. Mahmoud and Chefranov (2009;2012;2014) improved the security by using eigen values but these are not efficient because too many seeds are exchanged [14 15 16].…”
Section: Introductionmentioning
confidence: 99%