Hill Cipher Key Generation Algorithm by using Orthogonal Matrix
Fozia Hanif Khan1, Rehan Shams2, Farheen Qazi3, Dure-E-ShawarAgha4
1Fozia Hanif Khan, Department of Mathematics Sir Syed University of Engineering and Technology, Karachi, Pakistan.
2Rehan Shams, Department of Telecommunication Sir Syed University of Engineering and Technology, Karachi, Pakistan.
3Farheen Qazi, Department of Computer Engineering Sir Syed University of Engineering and Technology, Karachi, Pakistan.
4Dure-e-ShawarAgha, Department of Computer Engineering Sir Syed University of Engineering and Technology, Karachi, Pakistan.
Manuscript received on January 17, 2015. | Revised Manuscript received on January 28, 2015. | Manuscript published on February 15, 2015. | PP: 5-7 | Volume-3 Issue-3, February 2015. | Retrieval Number: C0799023315/2015©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The role of cryptography in today’s world is significant. It secures information mathematically by mailing massage with a key. Hill cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access. This paper suggest a new technique in Hill cipher, here we are establishing the complex procedure of key generation for the process of encryption. This paper explains how the orthogonal matrix can be useful for the generating the key matrix in Hill cipher. Hill cipher is a matrix based poly-graphic substitution. For example {abcd}= ab cd ef… or abc def…and so on. The purpose of generating the key by using orthogonal matrix is to overcome the disadvantage of non invertible matrix in Hill cipher. This paper discovers the idea of generating key that is basically the reflection on a given plane in 3 . The proposed concept is very easy to implement but it will be more difficult for the attacker to get the key.
Keywords: Hill cipher, Network security, Cryptography, orthogonal matrix.