Diffie-Hellman Based Hill Cipher Key Generation on End-to-end Encryption Key Share

Andysah Putera Utama Siahaan1

1

Publication Date: 2022/12/06

Abstract: Data leakage is a frequent occurrence due to security system vulnerabilities. The key is the most valuable object in the encryption and decryption process. The Hill Cipher algorithm also has a key in the form of several decimal numbers placed in a square matrix. This key exchange will result in system security vulnerabilities. This study uses the Diffie-Hellman technique in key exchange where the key sent by the sender to the recipient is in the form of a number which is the component that forms the actual key value. The results of the study stated that the key generation using the Diffie-Hellman algorithm was successfully used by the Hill Cipher algorithm even though in the generation process it produced several values that did not have the appropriate determinant

Keywords: Hill Cipher, Diffie-Hellman, End-to-end, Encryption, Decryption

DOI: https://doi.org/10.5281/zenodo.7402391

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22NOV523.pdf

REFERENCES

No References Available