Advanced Encryption Standard (AES) and Hill Cipher A Comparative Study
Advanced Encryption Standard (AES) and Hill Cipher A Comparative Study
ISSN No:-2456-2165
Although encoded message appears arbitrary, encoding overcome this disadvantage The National Institute of
ensues in a logical and foreseeable way, permitting a party Standards and Technology (NIST) developed a novel
that obtains the encoded data and owns the right key to algorithm called Advanced Encryption Standard (AES) in
decode the data, returning it back into normal readable text. 1977. The Advanced Encryption Standard (AES) encryption
Highly complex keys are used by the extremely secure algorithm being the most prevalent symmetric block cipher
encryption so that an outside party is mostly unlikely to algorithm has a certain format to encode and decode
decode or break the coded text. Throughout history, confidential data which makes it really hard to crack using
cryptographic codes and encoding methods have been used three diverse key sizes - 128, 192 and 256 bit.
by multiple civilization in some way or the other to avert un-
authorized parties from gaining access to the information Working of AES:
which in time have grown in superiority significantly along AES prefer bytes to perform operations rather than bits
the times and are used commonly till date. so if the block length is 128 bits, then the cipher calculates
16byts (or 128 bits) at a time. Key length and number of
II. METHODOLOGY rounds as follows;
10 rounds – 128 bit key
A. Advanced Encryption Standard (AES) 12 rounds - 192 bit key
Data Encryption Standard (DES), one of the symmetric 14 rounds – 256 bit key
key encodings is having key length of 56 bits and because of
the small key length, it is very easily to be hacked and to
K0 K1 Kn
Numerous transformations are defined by AES letter in the same cipher text because it employs matrix
encryption algorithm that are to be performed on information multiplication for encoding and decoding. Hill Cipher is a
stored in an array. The information handed over to the array multi-alphabetic cipher that could be defined as a block
is the first step of the cipher, followed by multiple encryption cipher as the data to be encrypted be partitioned into blocks
rounds which repeats the cipher transformations. The of a fixed limit. Individual alphabet in each block will affect
substitution table is used in the initial transformation of the the next one in the encoding and decoding process, there for
AES encryption cipher for substitution of data. The data rows the similar alphabets are not mapped into the similar
are shifted in the second transformation followed by mixing characters. Hill Cipher is one of the typical cryptographic
of columns in the third one. The final transformation is algorithms that is hard for cryptanalysts to crack and is only
performed on individual column using a different part of the accomplished by percieving the cryptic text. The drawback of
encryption key. More rounds are needed by Longer keys to this technique is that it can be solved very easily if the
complete the iteration. cryptanalysts have both plain text and cipher text. This
cryptanalysis method is known as plain text attack.
B. HILL Cipher
Hill Cipher is an example of block cipher using the form Encryption technique in the Hill Cipher is calculated by
of matrix in cryptography. Square matrix is used as a key for the extent of the block and the key matrix size is same as the
encoding and decoding in this encryption method. In 1929, size of the block. Before doing the calculation, first divide the
Lester S. Hill created The Hill cipher with the intention of plain text to rows of blocks and the alphabet is initially
creating a cipher (code) that should be unbreakable by using converted in to a number that A is given the value 0, B is
frequency analysis methods. This encryption technique do given the value 1, up to Y = 24 and Z = 25.
not alter every similar alphabet in the plain text with other
Mathematical formula of the Hill Cipher: The key matrix Ke is 2*2 so the simple text is split into
Cyp = Pl.Ke mod26. blocks, each block is having 2 alphabets.
Cyp = Cryptic text
Ke = Key As the the Pl is ATTACK, the first block of plain text P
Pl = Plain text becomes:
0
Pl1=[ ]
For this Example, plain text: 19
Pl = ATTACK
As per the procedure, plain text is changed to: Now calculate the value using the equation.
Pl = 0 19 19 0 2 10 That is,
A 2 × 2 matrix will be used as a key for plain text encryption Cyp=Pl Ke mod26
in Hill cipher.
K= 23 Using the equation, do the calculations, after the
36 calculations will generate a result, as follows:
Pl = ATTACK
III. CONCLUSION
This paper analyses the Hill Cipher and AES which uses
the encryption techniques of symmetric algorithm also having
two types, that are block ciphers and stream ciphers. Hill
Cipher and Advanced Encryption Standard (AES)
Algorithms are example of the block cipher method that
breaks or creates blocks for encryption and decryption for
obtaining cipher text. In AES, a 3-block cipher is used and
every cipher encodes and decodes data in 128 bit blocks using
128, 192 and 256 bit cryptographic keys respectively whereas
the data to be encoded is split into multiple blocks and
individual block is encoded in Hill Cipher.
REFERENCES