2023
DOI: 10.25139/ijair.v5i2.6907
|View full text |Cite
|
Sign up to set email alerts
|

Keyword Security Implementation Based on Hill Cipher Optimized Using Genetic Algorithms

Mayang Arinda Yudantiar,
Purwanto Purwanto,
Sri Winarno

Abstract: In the process of exchanging data and information, the most important task is to maintain data and information security and reach out to interested parties. One way this can be achieved is through encryption, a process better known as cryptography. Cryptography can scramble messages so that, even if intercepted, the message cannot be immediately read. One example of an encryption algorithm is the Hill Cipher. The Hill Cipher uses an m-by-m-sized matrix as the key for the encryption and decryption process, maki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 19 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?