The NTIS website and supporting ordering systems are undergoing a major upgrade from 8PM on September 25th through approximately October 6. During that time, much of the functionality, including subscription and product ordering, shipping, etc., will not be available. You may call NTIS at 1-800-553-6847 or (703) 605-6000 to place an order but you should expect delayed shipment. Please do NOT include credit card numbers in any email you might send NTIS.
Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website http://www.gpo.gov/fdsys; (3) the federal government Internet portal USA.gov; or (4) a web search conducted using a commercial search engine such as http://www.google.com.
Accession Number ADA581720
Title Study of the Hill Cipher Encryption/Decryption Algorithm.
Publication Date Apr 2012
Media Count 29p
Personal Author M. S. Negron
Abstract The Hill Cypher was Invented by Lester S. Hill in 1929, it was the first polygraphic cipher in which it was practical (though barely) to operate on more than three symbols at once. As stated before, the Hill Cipher is an encryption algorithm that uses polygraphic substitution ciphers based on linear algebra concepts. Each letter is encoded as a number. In the case of the English alphabet, letters are usually represented by the following scheme: A =0, B=1, C=2 Z=25. The message that is to be encrypted/decrypted will be held in a block of n letters and multiplied by a square matrix using modulo of the amount of letters in the alphabet in use. In this research project, the main goal is to recreate this cipher using the values of the ASCII table. Since the Hill Cipher works by assigning a numeric value to the characters that are to be used, using the ASCII table seems like a perfect fit for this application.
Keywords Algorithms
Ascii table
Computer programs
Cryptography
Decryption
Encryption
Hill cipher
Polygraphic cyphers
Polygraphic substitution


 
Source Agency Non Paid ADAS
NTIS Subject Category 72B - Algebra, Analysis, Geometry, & Mathematical Logic
62B - Computer Software
62 - Computers, Control & Information Theory
Corporate Author Army Research Office, Research Triangle Park, NC.
Document Type Technical report
Title Note Research paper.
NTIS Issue Number 1325
Contract Number W911NF-11-1-0174

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader