Journal of Zhejiang University-SCIENCE A

, Volume 7, Issue 12, pp 2022–2030 | Cite as

How to repair the Hill cipher

  • Ismail I. A. 
  • Amin Mohammed 
  • Diab Hossam 


The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a main drawback of this algorithm is that it encrypts identical plaintext blocks to identical ciphertext blocks and cannot encrypt images that contain large areas of a single color. Thus, it does not hide all features of the image which reveals patterns in the plaintext. Moreover, it can be easily broken with a known plaintext attack revealing weak security. This paper presents a variant of the Hill cipher that overcomes these disadvantages. The proposed technique adjusts the encryption key to form a different key for each block encryption. Visually and computationally, experimental results demonstrate that the proposed variant yields higher security and significantly superior encryption quality compared to the original one.

Key words

Hill cipher Image encryption Modified Hill cipher Quality of encryption 

CLC number



Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Barr, T.H., 2002. Invitation to Cryptography. Prentice Hall.Google Scholar
  2. Chen, G., Mao, Y., Chui, C.K., 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Soliton & Fractals, 21(3):749–761. [doi:10.1016/j.chaos.2003.12.022]MathSciNetCrossRefzbMATHGoogle Scholar
  3. Elkamchouchi, H., Makar, M.A., 2005. Measuring Encryption Quality of Bitmap Images Encrypted with Rijndael and KAMKAR Block Ciphers. Proc. Twenty Second National Radio Science Conference (NRSC 2005), Cairo, Egypt.Google Scholar
  4. Li, S., Zheng, X., 2002. On the Security of an Image Encryption Method. ICIP2002. Http://
  5. Overbey, J., Traves, W., Wojdylo, J., 2005. On the keyspace of the Hill cipher. Cryptologia, 29(1):59–72.CrossRefzbMATHGoogle Scholar
  6. Petersen, K., 2000. Notes on Number Theory and Cryptography. Http://
  7. Saeednia, S., 2000. How to make the Hill cipher secure. Cryptologia, 24(4):353–360.CrossRefGoogle Scholar
  8. Stinson, D.R., 2002. Cryptography Theory and Practice (2nd Ed.). CRC Press, Boca Raton, Florida.zbMATHGoogle Scholar
  9. Ziedan, I., Fouad, M., Salem, D.H., 2003. Application of Data Encryption Standard to Bitmap and JPEG Images. Proc. Twentieth National Radio Science Conference (NRSC 2003), Egypt. [doi:10.1109/NRSC.2003.1217349]Google Scholar

Copyright information

© Springer-Verlag 2006

Authors and Affiliations

  • Ismail I. A. 
    • 1
  • Amin Mohammed 
    • 2
  • Diab Hossam 
    • 2
  1. 1.Faculty of Computers and InformationZagazig UniversityZagazigEgypt
  2. 2.Computer Science Department, Faculty of ScienceMenoufiya UniversityShebeen El-komEgypt

Personalised recommendations