Nuacht

The ciphertext is generated based on the Hill Cipher algorithm. Hill Cipher can, however, be easily broken and has weak security and to add complexity, Elliptic curve cryptography (ECC), is combined ...
About Implemented the classical Hill Cipher algorithm for secure message encryption and decryption using matrix manipulation and modular arithmetic (mod 26).
This paper attempts to compare two new techniques for generating the key matrix for the hill cipher cryptosystem. The proposed algorithm has been developed keeping consideration of security aspects, ...