Cryptography is needed to store or transmit information/data. There are two important things in cryptography, which are, encryption (change an information into a form that will not be understood), and description (change the encryption back into the original message). The original message called as plaintext while the encryption form called ciphertext. Hill cipher is one of the cryptography algorithms that keeps developing. One of the development is the use of rectangle matrix as the key matrix. The use of rectangle matrix makes the ciphertext be longer than the plaintext. Those makes the message be more disguised. In this paper, the writer modifies the hill cipher algorithm by using the rectangle matrix in binary operation by adds the X-OR and XNOR logic. By adding the X-OR and XNOR logic, cryptoanalyst finds difficulties in the linier equation to find the plaintext and the key matrix. Binary operation makes the ciphertext be longer than the ciphertext in the rectangle key matrix only. Length of ciphertext is lc =((((2 * lp)/m * n) * 2)/m)*n. and ((2 * lp) mod m) =0. If ((2 * lp) mod m) ≠ 0 character of lp must be adds till ((2 * lp) mod m) =0.
IJCIT - Modifikasi Kriptografi Hill Cipher Kunci Matriks Persegi Panjang Menggunakan Fungsi Xor dan Fungsi Xnor - Mei 2016.pdf
Cover Daftar Isi IJCIT - Modifikasi Kriptografi Hill Cipher Kunci Matriks Persegi Panjang Menggunakan Fungsi Xor dan Fungsi Xnor - Mei 2016
[1] Ariyus, Dony. (2008). Pengantar Ilmu Kriptografi Teori, Analisis dan Implementasi. Yogyakarta: Penerbit Andi
[2] Chandrasekhar, Suman.,dkk. (2013). A Secure Encryption Technique Based on Advanced Hill Cipher For a Public Key Cryptosystem. IOSR Journal of Computer Engineering, Vol 11, Issue 2(May. –Jun.2013), PP 10- 14
[3] Munir, Rinaldi. (2007). Kriptografi. Bandung: Informatika
[4] Puspita, Khairani., M. Rhifky Wayahdi. (2015). Analisis Kombinasi Metode Caesar Cipher, Vernam Cipher dan Hill Cipher Dalam Proses Kriptografi. Seminar Nasional Teknologi Informasi dan Multimedia 2015.
[5] Rahman, M. Nordin A., dkk. (2013). Cryptography: A New Approach of Classical Hill Cipher. International Journal of Security and Its Applications, Vol. 7, No. 2
[6] Sastry, V. Umakanta., dkk. (2010). A Modified Hill Cipher Involving Interweaving and Iteration. International Journal of Network Security, Vol 11, No.1, PP.11-16
[7] Soulie, Juan. 2007. C++ Language Tutorial. Available at http://www.cplusplus.com/files/tutorial .pdf
[8] Supranto, J. (1997). Pengantar Matrix. Jakarta: Rineka Cipta
[9] Viswanath,M.K. (2015). A Public Key Cryptosystem Using Hill’s Cipher. London:Taylor & Francis.
[10] Wowor, Alz Danny. (2013). Modifikasi Kriptografi Hill Cipher Menggunakan Convert Between Base. Seminar Nasional Sistem Informasi Indonesia.
[11] Wowor, Alz Danny. (2014). Penggunaan Determinan Polinomial Matriks Dalam Modifikasi Kriptografi Hill Cipher.