ENHANCING THE SECURITY OF HILL CYPHER ALGORITHM

Authors

  • Ankit kumar Department of Computer Science & Engineering, RD Engineering College, Ghaziabad, India Author
  • Ankit Yadav Department of Computer Science & Engineering, RD Engineering College, Ghaziabad, India. Author
  • Abhishek Singh Department of Computer Science & Engineering, RD Engineering College, Ghaziabad, India. Author
  • Ravindra Chauhan Department of Computer Science & Engineering, RD Engineering College, Ghaziabad, India. Author

DOI:

https://doi.org/10.34218/IJCET_16_02_025

Keywords:

Hill Cipher, Transposition Method, Cryptography, Security Enhancement, Known-Plaintext Attack, Frequency Analysis

Abstract

The Hill Cipher, a classical polygraphic substitution cipher, remains vulnerable to cryptanalytic attacks such as known-plaintext attacks due to its linear algebraic structure and dependence on invertible key matrices. This paper proposes a hybrid cryptographic framework that integrates the Hill Cipher with a transposition method to mitigate these vulnerabilities. By combining substitution and permutation techniques, the enhanced algorithm introduces non-linearity and disrupts statistical patterns in ciphertext, thereby improving resistance against frequency analysis and matrix-based attacks. The proposed method involves two stages: first, plaintext is encrypted using the Hill Cipher with a randomly generated invertible matrix, and second, the resulting ciphertext undergoes a columnar transposition process governed by a secret key. The transposition step scrambles the positional relationships of characters, obscuring residual patterns from the substitution phase. Security analysis demonstrates that the hybrid approach significantly increases the effective key space and complicates cryptanalysis by necessitating simultaneous recovery of both substitution and transposition keys. Experimental evaluations confirm that the augmented system resists known-plaintext attacks targeting the Hill Cipher’s linearity, as adversaries must now solve a compounded problem involving matrix inversion and transposition key derivation. Comparative results with the standard Hill Cipher highlight improved confusion and diffusion properties, measured through metrics such as entropy, avalanche effect, and n-gram frequency distribution uniformity. This work underscores the efficacy of hybridizing substitution and transposition mechanisms to fortify classical ciphers against modern cryptanalytic threats.

References

Gupta, R., & Sharma, S. (2023). Dynamic Key Matrix Generation for Hill Cipher Using PRNGs. Journal of Cryptology, 12(3), 45–60.

Al-Maadeed, S., et al. (2023). AES-Hill Hybrid Model for Enhanced Data Security. IEEE Transactions on Information Forensics, 18(2), 112–125.

Kumar, A., et al. (2024). ECC-Based Hill Cipher for Post-Quantum Security. Cryptography and Communications, 16(1), 88–104.

Li, X., & Wang, Y. (2023). Deep Reinforcement Learning for Optimal Key Matrices in Hill Cipher. Neural Computing Applications, 35(7), 2201–2215.

Patel, M., & Joshi, R. (2024). Lattice-Based Modifications for Quantum-Resistant Hill Cipher. IEEE Quantum Computing Letters, 5(1), 30–37.

Published

2025-04-22

How to Cite

Ankit kumar, Ankit Yadav, Abhishek Singh, & Ravindra Chauhan. (2025). ENHANCING THE SECURITY OF HILL CYPHER ALGORITHM. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY, 16(2), 361-370. https://doi.org/10.34218/IJCET_16_02_025