Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

NavinMahendran 13 views 18 slides Aug 29, 2025
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

hill matrix and radix 64 bit algorithm


Slide Content

Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality Guide : M K Navin ( 126003176) R Vijay Sai R Ashwin (126003033) Assistant Professor/ICT R Vishal (126003294)

Layout of this project Motivation Objective Base Paper Problem Statement Literature Survey Brief sketch Modules Dataset Work Plan Conclusion Responsibilites

Motivation Increasing data breaches and cryptographic attacks demand stronger encryption methods to ensure data confidentiality. Standard algorithms may suffer from computational inefficiencies and vulnerabilities, requiring improved hybrid techniques. Integrating Hill Matrix encryption with Radix-64 encoding enhances both security and efficiency in modern applications like cloud storage and secure messaging.

Objective Integrate Hill Matrix encryption with Radix-64 encoding to enhance data security and confidentiality. Analyze the algorithm’s resistance to cryptographic attacks and benchmark its computational efficiency. Test the encryption method for secure data transmission in applications like cloud storage and encrypted messaging .

Base Paper Ali Arshad1, Muhammad Nadeem, Saman Riaz, Syeda Wajiha Zahra, Ashit Kumar Dutta, Zaid Alzaid , Rana Alabdan , Badr Almutairi and Sultan Almotairi “Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality”, CMC, 2023, vol.75, no.2 Year - 2022 and above Base Paper Link: https://www.techscience.com/cmc/v75n2/52065/html

Problem Statement Researchers have used predefined ASCII tables and matrix-based encryption, allowing data to be converted into ciphertext but not securely stored. Some techniques use a single randomized key for encryption and decryption, while others enhance security by encrypting with one key and decrypting with two keys or combining multiple algorithms with different keys. No single method fully protects data; security improves when multiple techniques and complex methods are combined to make unauthorized access more difficult.

Literature Survey

Sr# 1 2 3 4 5 Proposed work Year 2019 2020 2021 2021 2022   Proposed algorithm Comparison between symmetric and asymmetric algorithms Hill cipher algorithm Hill cipher algorithm Hill cipher algorithm Hill cipher chain algorithm Hill matrix algorithm, radix 64-bit encryption Novelty The efficiency of a symmetric algorithm is higher than that of an asymmetric algorithm. Implement hill cipher results on the Strassen algorithm and identify the time complexity Used all techniques that can protect data Transmission between clients via a cryptographic key Primary Key encryption Twice the Ciphertext of each character, Generated a Key from each text. ASCII table Standard Standard Standard Standard Standard Customized Encryption/ decryption keys E [0], D [0] E [0], D [0] E [0], D [0] E [0], D [0] E [0], D [0] E [0], D [2] Research gap Instead of comparing algorithms, developing the latest algorithm can provide better efficiency. This hill cipher algorithm can be easily decrypted No latest technique has been developed in this algorithm Developing a unique key from each text can provide better accuracy than using a single key. Suitable for primary key encryption only Identified all gaps Proposed paper solution Radix-64-bit encryption The proposed algorithm ciphertext is not easy to decrypt Radix 64-bit encryption made Ciphertext more than Plaintext Generate a unique Key from the hill matrix algorithm Suitable for every text. All gaps are resolved

Modules Customized ASCII Table – Uses a user-defined ASCII table to prevent attackers from decrypting data with standard tables. Key-Based Encryption – Generates random keys “K” and “J” for secure encryption, ensuring unique keys for each text. Radix-64 Bit Encryption – Converts XORed binary data into 6-bit groups, making ciphertext larger and harder to decrypt. Hill Matrix Encryption – Uses a 1 × 2 matrix and the formula X = C – K to generate a unique ciphertext. Secure Decryption Process – Reverses Hill Matrix and Radix-64 steps, applying C = A + J and XOR operations to retrieve plaintext.

Sample Dataset Testing Plain text Plaintext Cipher text Cipher text Length

Work plan Research & Analysis : Study encryption techniques, identify security issues, and define objectives. Algorithm Design : Develop a customized ASCII table, key generation, and encryption workflow. Implementation : Implement Radix-64 and Hill Matrix encryption/decryption mechanisms. Testing & Evaluation : Encrypt/decrypt sample datasets, analyze performance, and test security. Documentation & Finalization : Document processes, prepare reports, and finalize the project.

Brief sketch of the process

Conclusion The combination of Hill Matrix and Radix-64 Bit Encryption enhances data security, making it difficult for attackers to decrypt. A customized ASCII table ensures additional protection by preventing attackers from using standard decryption techniques. The encryption and decryption process is efficient, ensuring secure data transmission with minimal processing overhead. The proposed method strengthens cloud data confidentiality, reducing the risk of unauthorized access and data breaches.

References [1] M. Nadeem, A. Arshad, S. Riaz, S. S. Band and A. Mosavi , “Intercept the cloud network from brute force and ddos attacks via intrusion detection and prevention system,”IEEE Access, vol. 9, pp. 152300–152309, 2021. [2] S. Ustebay , Z. Turgut and M. A. Aydin, “Intrusion detection system with recursive feature elimination by using random forest and deep learning classifier,” in 2018 Int. Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), Ankara, Turkey, pp. 71–76, 2018. [3] S. K. Wagh , V. Pachghare and S. Kolhe , “Survey on intrusion detection system using machine learning techniques,” International Journal of Computer Applications, vol. 78, no. 16, pp. 30–37, 2013. [4] C. Stergiou, K. E. Psannis , B. GyuKim and B. Gupta, “Secure integration of iot and cloud computing,” Future Generation Computer Systems, vol. 78, no. 54, pp. 964–975, 2018. [5] N. G. McDonald, “Past, present and future methods of cryptography and data encryption,”in A Research Review. University of Utah, 2020.

Responsibilities Navin Will research and implement Radix-64 bit encryption. Will implement decryption method. Will integrate and document whole process of encryption and decryption. Ashwin Will explore and work on Hill Matrix encryption process. Will test and evaluate the code implemented. Will optimize the process. Vishal Will investigate and handle binary key generation. Will work on preparing datasets for this project. Will assist in overall experimentation and results analysis.

Encryption Steps Generate Customized ASCII Table: Create a customized ASCII table where each character is assigned a unique index value different from the standard ASCII table. This step aims to confuse attackers who might rely on the standard ASCII table to decrypt the data . Convert Plain Text to Numeric Values: Use the customized ASCII table to convert each character of the plain text into its corresponding numeric value . Apply Radix-64 Bit Encryption : Double the number of cipher values by applying a radix-64 bit encryption mechanism. This step increases the complexity of the ciphertext , making it harder for attackers to decrypt.

Encryption Steps ( contd ) Generate Key Using Hill Matrix Algorithm: Create a Hill Matrix based on the plain text or a static key. The Hill Matrix is used to generate a dynamic key that is specific to the plain text being encrypted . Encrypt Data Using Hill Matrix: Multiply the numeric values of the plain text by the Hill Matrix to obtain the ciphertext . The resulting ciphertext will be in a matrix form . Convert Ciphertext to Radix-64 Format: Apply the radix-64 bit encoding to the ciphertext obtained from the Hill Matrix multiplication. This ensures that the ciphertext is further obfuscated and difficult to reverse-engineer . Output Encrypted Data: The final encrypted data is now ready for secure transmission. These steps combine multiple encryption techniques to enhance the security of the data, making it challenging for attackers to decrypt without the correct keys and algorithms.

Enter the text to encrypt: Cryptography Encrypted Text: ±IhiERi27Tbia□ U Encryption Key: ['10010101', '01000101', '10110100', '00000000', '11010101 ', '00111101 ', '00010011', '01110101', '10101001', '00111101', '01100111', '01000101'] Sample Output
Tags