Mishra, Kumar Gandharv
(2019)
Addendum to hill ciphers.
At Right Angles.
pp. 23-27.
ISSN 2582-1873
Abstract
The Hill Cipher method in cryptography has been
described in detail in earlier issues of At Right Angles. Through those articles, the reader will be
familiar with the art of encryption and decryption of
messages using matrices and modular arithmetic. The Hill
Cipher method requires a substitution table comprising
letters and numerals, and a fixed key invertible matrix that is
used to encrypt the plain text into the cipher text. Further,
the inverse of the key matrix is used to decrypt the cipher
text back to the plain text. A substitution table must
comprise of the characters and their corresponding numerical
values. Table 1 with 29 characters (numbered from 0 to 28)
is a particular choice, which we will use in this article.
Actions (login required)
 |
View Item |