Professional Documents
Culture Documents
www.theijst.com
1.
Introduction
Hill Cipher is one of the encryption algorithms that uses matrix (Chase & Davis, 2010) (Abdullah, Khalaf, & Riza, 2015). The
smallest matrix of 2x2 can produce the ciphertext by providing key as the determinant. The matrix bigger than 2x2 can be used as
well, but the difficulties in finding the inverse matrix gain more too. In Hill Cipher, we can randomly describe the integers for keys
beforehand (Rahman, Abidin, Yusof, & Usop, 2013) (Chowdhury, Shohag, & Sahid, 2011)\. But sometimes the key provided does
not work. It happens when decoding the ciphertext back to plaintext. The plaintext resulted is different from the original message.
Before using the key, we have to test that it has the right determinant.And if so, the inverse key will be applied to the ciphertext
when decryption is happening. Since we use the key as a password to modify the message, we have to send or give to someone who
is responsible for decrypting the message. The key must be distributed, and this moment will be taken by third parties to intercept
the known plaintext to be breakable. Three-Pass Protocol is the best way to reduce the gap of interception. On the application of
this algorithm, the form of the matrix must be modified. The are several changes of Hill Cipher part to make the both algorithms
work together.
2.
Theories
The symmetric key is one of the cryptographic systems that uses the same kind of keys in encryption and decryption. Hill Cipher
uses the symmetric key in its application. But actuary the keys used in encryption and decryption are different but same. It happens
because the key used in decryption is the inverse of the original key applied when sending plaintext to the receiver (Kumar & C.,
2015) (Ahmed, Sanja, Aldiaz, Rezaei, & Omotunde, 2008). The both keys must be correctly calculated for them to generate encrypt
and decrypt key pair in encryption and decryption works. Hill Cipher is an application of modulo arithmetic in cryptography
(Stubbs, 2013). This cryptographic technique uses matrix as the vessel of information exchange either on encryption or decryption
part. The basic theory of matrix used in Hill Cipher is the multiplication between the matrix and the inverse of the matrix. Hill
Cipher is a symmetric key hard to solve because the cryptanalysis techniques such as frequency analysis can not be applied easily
to solve this algorithm (Kumar & C., 2015). Hill cipher is very difficult to solve if cryptologist has only the ciphertext, but it can be
solved easily if the cryptologist has a part of the plaintext.
Three-Pass Protocol method is a way to send a message securely from sender to receiver without the need to exchange or distribute
encryption keys (Abdullah, Khalaf, & Riza, 2015). In Three-Pass Protocol, the sender encrypts the message using a unique
encryption key then they send it to the receiving participant. When the receiver gets the encrypted message, they then encrypt it
Vol 1 Issue 3
September, 2013
www.theijst.com
with their own unique encryption key and send back to the sender. Then the sender decrypts the message with their own key. After
this, there is only one level of encryption on the package which is sent to the receiver who decrypts the final layer with their unique
decryption key and reads the data. This protocol can only be used if using commutative ciphers or LIFO method. Commutative
means that the order of encryption and decryption is interchangeable (Encryption A - Encryption B - Decryption A - Decryption B)
(Stubbs, 2013). Figure 1 explains the flow of Three-Pass Protocol scheme.
Methodology
In the application of Three-Pass Protocol in Hill Cipher, the plaintext cannot directly transform to ciphertext and then re-encrypt the
message with the second key. If we do this when doing the decryption, the message will not turn back to its original message, it
turns to different characters order. We have to modify the encryption block with a square block. It means, when we use a key of a
matrix of 2 x 2, the plaintext block will be 2 x 2 as well. It is totally different from the usual Hill Cipher encryption that uses different
matrix order.
=(
) (
2
1
1
) (
2
=(
3
)
4
3
)
4
(1)
(2)
From the formulas above, the encryption and decryption are using the same blocks with the key.
4.
In this section, we try to prove the Three-Pass Protocol. Lets take an example below:
65
78
Plaintext
ANDY (
Key 1
240
65
97
)
163
Key 2
187
148
23
)
223
Key 1-1
205
113
145
)
16
Key 2-1
55
76
68
)
89
209
)
115
Vol 1 Issue 3
September, 2013
www.theijst.com
Determinant :
240
65
97
)
163
Key 2
Determinant :
187
148
23
)
223
Since determinants are not zero or even, we can use the key pair as keys for Hill Cipher.
Encryption 1
Encryption 2
:
65
78
Ciphertext 1 :
240
65
C1
Plaintext
C2
C3
C4
68
)
89
97
65
)x(
163
78
68
)
89
Ciphertext 1T :
126
121
43
)
239
Ciphertext 2 :
187
148
23
126
)x(
223
121
C1
126
233
C2
43
63
C3
121
226
C4
43
)
239
239
13
Ciphertext 1 :
126
43
121
)
239
Ciphertext 2 :
233
63
226
)
13
Ciphertext 1T :
126
121
43
)
239
Ciphertext 2T :
233
226
63
)
13
Ciphertext 2T is the final result of the encryption the both methods. And for the decryption, we do the same way as easrlier. We see
the explanation below:
Vol 1 Issue 3
September, 2013
Decryption 2
233
226
Ciphertext 2T :
Ciphertext 3 (
205
113
C1
C2
C3
C4
www.theijst.com
63
)
13
233
145
)x(
226
16
63
)
13
Ciphertext 3T :
151
208
249
)
159
Plaintext
55
76
P1
209
151
)x(
115
208
151
65
P2
249
68
P3
208
78
P4
249
)
159
159
89
Ciphertext 3 :
151
249
208
)
159
Plaintext
65
68
78
)
89
Ciphertext 3T :
151
208
249
)
159
Plaintext T
65
78
68
)
89
PT
84
72
69
32
81
85
73
67
75
32
CT1
228
179
220
135
198
24
11
179
253
228
CT2
5
225
63
123
212
131
42
20
102
140
CT3
115
97
240
248
185
252
167
194
228
67
PT
84
72
69
32
81
85
73
67
75
32
Vol 1 Issue 3
11
12
13
14
15
16
17
18
19
20
21
66
82
79
87
78
32
70
79
88
32
74
169
246
30
34
213
186
151
72
162
72
197
123
81
154
32
124
153
150
28
109
110
79
14
242
224
91
190
133
148
234
46
109
183
66
82
79
87
78
32
70
79
88
32
74
September, 2013
85
77
80
83
32
79
86
69
82
32
251
142
95
181
187
129
149
9
92
7
141
202
169
111
141
90
88
70
222
151
11
234
111
183
8
74
118
250
15
48
85
77
80
83
32
79
86
69
82
32
32
33
34
35
36
37
38
39
40
84
72
69
32
76
65
90
89
32
96
39
68
216
96
69
255
155
163
www.theijst.com
213
122
208
153
232
139
179
206
180
10
240
248
142
187
137
220
180
110
84
72
69
32
76
65
90
89
32
Conclusion
We conclude that Three-Pass Protocol can be applied in Hill Cipher encryption. It helps the sender to give more protection to their
data from being intercepted. The undistributed key system is more secure since the both participants do not have to exchange key
when doing this process. Three-Pass Protocol is the best technique to gain the information security more.
6.
References
i. Abdullah, A. A., Khalaf, R., & Riza, M. (2015). A Realizable Quantum Three-Pass Protocol Authentication. Mathematical
Problems in Engineering.
ii. Ahmed, M., Sanja, B., Aldiaz, D., Rezaei, A., & Omotunde, H. (2008). Diffie-Hellman and Its Application in Security
Protocols. International Journal of Engineering Science and Innovative Technology, 1(2), 69-73.
iii. Chase, J., & Davis, M. (2010). Extending the Hill Cipher.
iv. Chowdhury, S. I., Shohag, S. A., & Sahid, H. (2011). A Secured Message Transaction Approach by Dynamic Hill Cipher
Generation and Digest Concatenation. International Journal of Computer Applications, 23(9), 25-31.
iii. Khalaf, A. A., El-karim, M. S., & Hamed, H. F. (2016). A Triple Hill Cipher Algorithm Proposed to Increase the Security of
Encrypted Binary Data and its Implementation Using FPGA. ICACT Transactions on Advanced Communications
Technology, 5(1), 752-757.
vi. Kumar, R., & C., R. (2015). Analysis of Diffie Hellman Key Exchange Algorithm with Proposed Key Exchange Algorithm.
International Journal of Emerging Trends & Technology in Computer Science, 4(1), 40-43.
vii. Rahman, M. N., Abidin, A. F., Yusof, M. K., & Usop, N. S. (2013). Cryptography: A New Approach of Classical Hill Cipher.
International Journal of Security and Its Applications, 7(2), 179-190.
viii. Stubbs, C. (2013, November 20). Three-Pass Protocol. Dipetik May 1, 2016, dari Public Key Cryptography:
http://asymmetriccryptography.blogspot.co.id/
Vol 1 Issue 3
September, 2013