0% found this document useful (0 votes)
67 views

Application of Cryptography For Military Map Image Security

1) The document proposes encrypting military map images using the Hill cipher algorithm to secure the data from intruders. 2) The Hill cipher is a polyalphabetic cipher that operates on blocks of text and uses a square matrix as the encryption key. 3) The authors conducted an experiment encrypting and decrypting map images using the Hill cipher. Encryption resulted in obscured images while decryption recovered the original images as intended.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views

Application of Cryptography For Military Map Image Security

1) The document proposes encrypting military map images using the Hill cipher algorithm to secure the data from intruders. 2) The Hill cipher is a polyalphabetic cipher that operates on blocks of text and uses a square matrix as the encryption key. 3) The authors conducted an experiment encrypting and decrypting map images using the Hill cipher. Encryption resulted in obscured images while decryption recovered the original images as intended.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Application of Cryptography for Military Map Image Security Using the

Hill Chiper Algorithm


Fadhil Muhammad Hadini1, Andri Purwoko2, Wikik Andhitias Sutrisno3
1
Fadhil Muhammad Hadini, Kendari, 93121, Indonesia
2
Andri Purwoko, Magelang, 56172 , Indonesia
3
Wikik Andhitias Sutrisno, Jakarta,13610, Indonesia
e-mail: [email protected]*1, [email protected], [email protected]

A B S T R A C K
In today's modern era, information in the form of images is very important, especially in the military field. Image maps processed
through aerial capture must be kept confidential, so that image map data is not easily read by intruders. To apply security to
images, it is necessary to apply several methods to encrypt images. One method that can be used is the Hill Chipper Method. Hill
Chiper is a method that applies a square matrix as the key used for encryption and decryption. The hill cipher encryption process
will not replace every letter that is the same in plaintext with another that is the same, because the hill cipher uses matrix
multiplication on the basis of encryption. In this study the authors conducted experiments to encrypt map images using the hill
chipper method.

1. INTRODUCTION types of cryptographic operations as well as the key and


how long the key is used. [3]
With the development of today's digital era, the
This study proposes to create an image encryption
demand for security related to the encryption and
cryptographic system using the hill chipper algorithm to
description of information or images has become an
secure military target map data so that the data cannot be
important research area and has very broad research
seen and read by intruders. In addition, data that has been
prospects.
encrypted must be safe from various kinds of attacks,
Image-related security often has serious threats and
such as brute force, which works by carrying out various
needs attention. Encryption and decryption of images has
combinations of guessing attacks until the key for
been widely applied in the field of military
decryption is found.
communications, etc
In the military field, each of course must have secret
2. THEORITICAL BASIS
images that must be secured which cannot be seen by
third parties or intruders, such as images of maps of 2.1 Cryptography
military targets, military buildings or structures, war All In mathematics, Cryptography is a science or
equipment, etc. Most of this information is now collected technique to hide or hide messages or data so that they
and stored on electronic computers and sent over cannot be read or seen, in short cryptography is a
networks to other computers. If the secret image falls into technique of hiding data before it is sent to the recipient
the wrong hands, there will be a breach of data security of the data.[2].
which can result in a declaration of war, imitation of Cryptography has two main techniques in the
military objects, threats of military attacks, etc. process, namely encryption and decryption, where
Based on the problems above, the authors took the encryption means randomizing and changing the
initiative to perform encryption techniques on military structure and inside of messages or data so that the
map images. Cryptography itself is one of the most contents of the original message cannot be read or cannot
significant and popular techniques for keeping data secret be seen, and decryption means changing an unreadable
from attackers or intruders. Encryption is the process of message into a message. readable. Both processes require
scrambling and changing the structure of the data so that a key to be able to perform each process. [2]
the original data cannot be read by intruders or attackers. Hill cipher which is a polyalphabetic cipher can be
This technique contains a way to keep the contents of the categorized as a block cipher, because the text to be
original data (Plaintext) secret in a data format whose processed will be divided into blocks of a certain size.
structure has been changed and scrambled and cannot be Each character in a block will affect other characters in
read by intruders, which is known as Cipher Text[3]. the process of encryption and decryption, so that the same
The next process is Decryption. Decryption is a character is not mapped to the same character.[5]
technique that has the opposite properties of encryption, The basis of the hill cipher technique is arithmetic
where decryption is a technique to change back files that modulo to the matrix. In its application, hill cipher uses
have been scrambled and changed their structure at the matrix multiplication techniques and matrix inverse
encryption stage into plain text again (Plain text). The techniques. The key to the hill cipher is an n x n matrix
two data security techniques have various formulas and where n is the block size. If we call the key matrix K, then
the K matrix is as follows
1
Cipher encryption so that the original image cannot be
The K matrix which is the key must be an invertible displayed.
matrix, which has a multiplicative inverse K-1 so that the
key must have an inverse because the K-1 matrix is the
key used for decryption

2.2 Encryption Technique

The encryption process in the hill cipher is done per


plaintext block. The block size is the same as the key
matrix size. Before the process of dividing the text into a
series of blocks, the initial plaintext or text must first be
converted into numbers. So it becomes A=0, B=1, until
Z=25
Mathematically, the encryption process using
the hill cipher method has the formula:

C = K.p Figure 4.1 Hill Cipher Algorithm Encryption


Results
Description :
C = Cipherteks
K = Kunci
P = Plainteks

2.3 Decryption Technique


The decryption process in the hill cipher is basically
almost the same as the encryption process. However, the Figure 4.2. Hill Cipher Algorithm Encryption
key matrix must be inversed first.. Results

The following is the formula for the decryption process 4.2 Decryption Results
n The Decryption Result is the stage of changing the
encrypted image file into plain text so that the military
3. APPLICATION DESIGN map image file can be opened and displayed again.
Hillcipher's algorithm will inverse the entire process.
In this section, images that will be encrypted using Of course, with a suitable key password. The results of
HillChiper will go through several stages. Here are the the decryption are shown in Figures 4.3 and 4.4
steps:
The first stage, the image will be converted first to
pixels. Then the pixels are converted into a 3x3 matrix.
The second stage, enter the security key for the
image you want to encrypt.
The third stage, the results of the matrix inverse
multiplication and the key input will be combined. Then
an image cipher will be formed from the hill cipher
encryption results.
The fourth stage, namely the decryption process
where the cipher text results from the hill cipher will be
decrypted with the same key so that the final result will
be plain text from the initial image.

4. RESULT AND DISCUSSION


This section discusses the results obtained from the
encryption, decryption, key testing and testing of
encrypted files. The results of encryption can be seen in
Figure 4.1 and Figure 4.2.

4.1 Encryption Results


Based on the results of Hill Cipher encryption in 5. CONCLUSSION
Figure 4.1, the image display will be blurred using Hill
Cryptographic techniques in data security are a field
of science to keep data confidential. Cryptography in this
study applies the Hill Chiper algorithm. From the test
results on the map image file, it shows that the image file
encrypted using the hill cipher method has been
successfully disguised so that it is not easy to guess or
decrypt the original appearance of the military map if it
does not have a matching key.

REFERENCES
[1] A. Abdulgader, M. Ismail, N. Zainal, and T. Idbeaa,
“Enhancement of AES algorithm based on chaotic
maps and shift operation for image encryption,” J.
Theor. Appl. Inf. Technol., vol. 71, no. 1, pp. 1–12,
2015
[2] B. Schneier, “Applied Cryptography,” Electr. Eng.,
vol. 1, no. [32, pp. 429–455, 1996, doi:
10.1.1.99.2838.
[3] A. Muhammad Abdullah and A. Muhamad
Abdullah, “Advanced Encryption Standard (AES)
Algorithm to Encrypt and Decrypt Data Advanced
Encryption Standard (AES) Algorithm to Encrypt
and Decrypt Data View project Call for papers View
project Advanced Encryption Standard (AES)
Algorithm to Encrypt and Decrypt,” 2017, [Online].
[4] W. Cao, Y. Zhou, and C. L. P. Chen, “Author ’ s
Accepted Manuscript Medical Image Encryption
Using Edge Maps Reference : To appear in : Signal
Processing Accepted date : 3 October 2016,” Signal
Processing, 2016, doi:10.1016/j.sigpro.2016.10.003.
[5] X. Chai, Y. Chen, and L. Broyde, “A novel chaos-
based image encryption algorithm using DNA
sequence operations,” Opt. Lasers Eng., vol. 88, pp.
197–213, 2017, doi:
10.1016/j.optlaseng.2016.08.009.

You might also like