Hill Cipher Algorithm with Generalized Fibonacci Matrix in Message Encoding
DOI:
https://doi.org/10.29303/emj.v4i2.107Keywords:
Hill Cipher, Matrix of Fibonacci number Generalization, Encryption, DecryptionAbstract
Hill Cipher algorithm is a technique of message encoding by implementing a matrix of order as a key matrix. The key matrix is a matrix that has a multiplicative inverse. The security of message is measured by the number of processes in encoding. The more processes in encoding the longer time it takes. Consequently, the massage will be more secure. The purpose of this research is to modify the Hill Cipher algorithm by using generalized Fibonacci matrix whose degree-p and rank-n . This research showed that for any non-negative integer p and positive integer n, matrix can be used as a key matrix in Hill Cipher algorithm. The modification of the Hill Cipher algorithm has been done by modifying the former key by making the degree and rank of as the key used in the encryption and decryption process of data (message).References
Anton, H. & Rorres, C. (2004). Aljabar Linear Elementer versi Aplikasi Edisi Delapan jilid Satu. Jakarta: Erlangga.
Gere, J. M., William, Jr. W. (1987). Aljabar Matriks untuk Para Insinyur Edisi kedua. Jakarta: Erlangga.
Hasugian, A. H. (2013). Imlementasi Algoritma Hil Cipher dalam Penyandian Data. Pelita Informatika Budi Darma, Volume: IV, Nomor: 2, Agustus 2013.
Leon, S. J. (2001). Aljabar Linear dan Aplikasinya Edisi 5. Jakarta: Erlangga.
Munir, R. (2012) Matematika Diskrit. Bandung: INFORMATIKA.
Parekh, R. (2006). Principle of Multimedia. New Delhi: Tata McGraw-Hill Publishing Company Limited.
Purnamayanti. (2012). Formula Binet dan Jumlah n suku pertama pada Generelisasi Bilangan Fibonacci dengan Metode Matriks. Jurnal Matematika Murni dan Terapan Vol. 6 no. 1 Juni 2012: 38-46.
Rosen, K. H. (1986). Elementary Number Theory and Its Applications, Canada: Addison-Wesley Publishing Company.
Supiyanto. (2015). Implementasi Hill Cipher pada Citra menggunakan Koefisien Binomial Sebagai Matriks Kunci. Seminar Nasional Informatika 2015 UPN “Veteran” Yogyakarta, 14 November 2015 ISSN: 1979-2328.
Tuasikal, A. R., Indra, D., & Fattah, F. (2020). Kriptanalalisis pada Metode Hill Cipher. Buletin Sistem Informasi dan Teknologi Islam Vol 1, No. 1, Februari 2020, pp. 1-5.
Downloads
Published
How to Cite
Issue
Section
License
All articles published in the Eigen Mathematics Journal will be available for free reading and downloading. The license applied to this journal is Creative Commons Attribution-Non-Commercial-Share Alike (CC BY-NC-SA).
Most read articles by the same author(s)
- Puguh Riawang, Mamika Ujianita Romdhini, Irwansyah -, Perbandingan Algoritma A* (A star) dan Algoritma IDA* (Iterative Deepening A* Pada Permainan Sliding Puzzle , EIGEN MATHEMATICS JOURNAL: Vol. 2 No. 2 Desember 2019
- Kurniawan Sugiarto, Mamika Ujianita Romdhini, Ni Wayan Switrayni, Analisis Automorfisma Graf Pembagi-nol dari Ring Komutatif dengan Elemen Satuan , EIGEN MATHEMATICS JOURNAL: Vol. 1 No. 1: Juni 2018
- Dais Alifian Fatahillah, Ni Wayan Switrayni, Sifat-Sifat Graf Pembagi Nol pada Gelanggang Polinom Kuosien (Z_p [x])/〈x^(n+1) 〉 ×(Z_q [x])/〈x^(n+1) 〉 , EIGEN MATHEMATICS JOURNAL: Vol. 3 No. 1 Juni 2020
- Muklas Maulana, Ni Wayan Switrayni, Banyak Pohon Pembangun pada Graf Barbell , EIGEN MATHEMATICS JOURNAL: Vol. 2 No. 2 Desember 2019
- I Gede Adhitya Wisnu Wardhana, Ni Wayan Switrayni, Qurratul Aini, Submodul Prima Lemah dan Submodul Hampir Prima Pada Z‐modul M_2x2 (Z_9) , EIGEN MATHEMATICS JOURNAL: Vol. 1 No. 1: Juni 2018
- Muhammad Taufan, Mamika Ujianita Romdhini, Ni Wayan Switrayni, Analisis Keberhinggaan Matriks Representasi atas Grup Berhingga , EIGEN MATHEMATICS JOURNAL: Vol. 1 No. 1: Juni 2018
- Muhammad Rijal Alfian, Fariz Maulana, Ni Wayan Switrayni, Qurratul Aini, Dwi Noorma Putri, I Gede Adhitya Wisnu Wardhana, The Prime Submodule Of The Integer Module Over Itself , EIGEN MATHEMATICS JOURNAL: Vol. 5 No. 1 Juni 2022