Addendum to hill ciphers

Mishra, Kumar Gandharv (2019) Addendum to hill ciphers. At Right Angles. pp. 23-27. ISSN 2582-1873

[img] Text - Published Version
Download (255kB)


The Hill Cipher method in cryptography has been described in detail in earlier issues of At Right Angles. Through those articles, the reader will be familiar with the art of encryption and decryption of messages using matrices and modular arithmetic. The Hill Cipher method requires a substitution table comprising letters and numerals, and a fixed key invertible matrix that is used to encrypt the plain text into the cipher text. Further, the inverse of the key matrix is used to decrypt the cipher text back to the plain text. A substitution table must comprise of the characters and their corresponding numerical values. Table 1 with 29 characters (numbered from 0 to 28) is a particular choice, which we will use in this article.

Item Type: Articles in APF Magazines
Authors: Mishra, Kumar Gandharv
Document Language:
Uncontrolled Keywords: Cryptography, Hill cipher, Code, Substitution, Matrix
Subjects: Natural Sciences > Mathematics
Divisions: Azim Premji University > University Publications > At Right Angles
Full Text Status: Public
Publisher URL:

Actions (login required)

View Item View Item