Abstract
In this paper we analyze two iterated Hill Cipher variants due to Sastry et al. The designers claim that their modifications to the classical Hill Cipher provide a high level of resistance to cryptanalysis. However, we describe how to break these iterated Hill Ciphers using a standard slide attack, and we present computational results from the implementation of our attack that confirm its effectiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245–259. Springer, Heidelberg (1999)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Berlin (2002)
Hill, L.S.: Cryptography in an Algebraic Alphabet. Amer. Math. Monthly 36, 306–312 (1929)
Ismail, I.A., Amin, M., Diab, H.: How to Repair the Hill Cipher. J. Zhejiang Univ. Sci. A 7, 2022–2030 (2006)
Li, C., Zhang, D., Chen, G.: Cryptanalysis of an Image Encryption Scheme Based on the Hill Cipher. J. Zhejiang Univ. Sci. A 9, 1118–1123 (2008)
Lin, C.H., Lee, C.Y., Lee, C.Y.: Comments on Saeednia’s Improved Scheme for the Hill Cipher. J. Chinese Inst. Engrs. 27, 743–746 (2004)
Keliher, L.: Cryptanalysis of a Modified Hill Cipher. Internat. J. Comp. Netw. Secur. 2, 122–126 (2010)
Keliher, L., Delaney, A.Z.: Cryptanalysis of the Toorani-Falahati Hill Ciphers. In: 22nd IEEE Symposium on Computers and Communications. IEEE Press, New York (to appear)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Overbey, J., Traves, W., Wojdylo, J.: On the Keyspace of the Hill Cipher. Cryptologia 29, 59–72 (2005)
Saeedinia, S.: How to Make the Hill Cipher Secure. Cryptologia 24, 353–360 (2000)
Sastry, V.U.K., Shankar, N.R.: Modified Hill Cipher with Interlacing and Iteration. J. Comp. Sci. 3, 854–859 (2007)
Sastry, V.U.K., Murthy, D.S.R., Bhavani, S.D.: A Block Cipher Involving a Key Applied on Both Sides of the Plain Text. Internat. J. Comp. Netw. Secur. 1, 27–30 (2009)
Sastry, V.U.K., Shankar, N.R., Bhavani, S.D.: A Modified Hill Cipher Involving Interweaving and Iteration. Internat. J. Netw. Secur. 11, 11–16 (2010)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice Hall, Boston (2011)
Strang, G.: Introduction to Linear Algebra, 4th edn. Wellesley-Cambridge Press, Wellesley (2009)
Toorani, M., Falahati, A.: A Secure Variant of the Hill Cipher. In: 18th IEEE Symposium on Computers and Communications, pp. 313–316. IEEE Press, New York (2009)
Toorani, M., Falahati, A.: A Secure Cryptosystem Based on Affine Transformation. J. Secur. Commun. Networks 4, 207–215 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Keliher, L., Thibodeau, S. (2013). Slide Attacks against Iterated Hill Ciphers. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-40576-1_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40575-4
Online ISBN: 978-3-642-40576-1
eBook Packages: Computer ScienceComputer Science (R0)