2022
DOI: 10.2991/acsr.k.220202.041
|View full text |Cite
|
Sign up to set email alerts
|

Primary Key Encryption Using Hill Cipher Chain (Case Study: STIE Mandala PMB Site)

Abstract: The condition of the world experiencing the COVID-19 pandemic has resulted in some daily activities limited by health protocols. The Indonesian government's policy in the academic field has forced STIE Mandala Jember, as one of the private universities, to implement online-based new student admissions. The registrant's identity must be kept confidential during the online-based new student registration process, so the running system needs an identity coding (encryption) process. Hill Cipher is a cryptographic a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…[5] The Hill Cipher is a polygraphic substitution cipher based on linear algebra [6]. It operates on blocks of letters, rather than single letters as in traditional substitution ciphers [7]…”
Section: Algorithm Implementationmentioning
confidence: 99%
“…[5] The Hill Cipher is a polygraphic substitution cipher based on linear algebra [6]. It operates on blocks of letters, rather than single letters as in traditional substitution ciphers [7]…”
Section: Algorithm Implementationmentioning
confidence: 99%
“…When the recipient decrypts the file, they access it using the same method and Key. Rohim et al [34] wanted to encrypt primary key data. Researchers modified the Hill Cipher algorithm to solve this problem and developed a new algorithm called the Hill Cipher Chain Algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 2021 [34], researchers developed a symmetric hill cipher encryption algorithm that encrypts and decrypts data with the same Key. After encrypting the data, the data and the Key are uploaded to the server.…”
Section: Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation