Proceedings of the International Conference on Mathematics, Geometry, Statistics, and Computation (IC-MaGeStiC 2021)

Primary Key Encryption Using Hill Cipher Chain (Case Study: STIE Mandala PMB Site)

Authors
Muhamat Abdul Rohim*, Kiswara Agung Santoso, Alfian Futuhul Hadi
Department of Mathematics, FMIPA, University of Jember
*Corresponding author. Email: muhamatabdulrohim@gmail.com
Corresponding Author
Muhamat Abdul Rohim
Available Online 8 February 2022.
DOI
10.2991/acsr.k.220202.041How to use a DOI?
Keywords
Inverse matrix; cryptography; Hill cipher; Chained Hill cipher; Hill cipher chain
Abstract

The condition of the world experiencing the COVID-19 pandemic has resulted in some daily activities limited by health protocols. The Indonesian government’s policy in the academic field has forced STIE Mandala Jember, as one of the private universities, to implement online-based new student admissions. The registrant’s identity must be kept confidential during the online-based new student registration process, so the running system needs an identity coding (encryption) process. Hill Cipher is a cryptographic algorithm that utilizes the multiplication of matrix inverse operations. In ordinary Hill Cipher, to encrypt the entire plaintext, a key is needed. In this paper, we will modify the Hill Cipher named Hill Cipher Chain. The process of chained Hill Cipher will encrypt and decrypt the primary key based on the previous character. Firstly, we will encrypt the primary key with the key from the next column of the database. In this case, we use the name column. The encryption result will be used as a key for the subsequent character encryption. Implementation of this method makes the difficulty level of decryption more complex than the ordinary Hill Cipher, which only uses one key for all so that the security of the data obtained is also getting better.

Copyright
© 2022 The Authors. Published by Atlantis Press International B.V.
Open Access
This is an open access article under the CC BY-NC license.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Mathematics, Geometry, Statistics, and Computation (IC-MaGeStiC 2021)
Series
Advances in Computer Science Research
Publication Date
8 February 2022
ISBN
978-94-6239-529-9
ISSN
2352-538X
DOI
10.2991/acsr.k.220202.041How to use a DOI?
Copyright
© 2022 The Authors. Published by Atlantis Press International B.V.
Open Access
This is an open access article under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - Muhamat Abdul Rohim
AU  - Kiswara Agung Santoso
AU  - Alfian Futuhul Hadi
PY  - 2022
DA  - 2022/02/08
TI  - Primary Key Encryption Using Hill Cipher Chain (Case Study: STIE Mandala PMB Site)
BT  - Proceedings of the  International Conference on Mathematics, Geometry, Statistics, and Computation (IC-MaGeStiC 2021)
PB  - Atlantis Press
SP  - 222
EP  - 227
SN  - 2352-538X
UR  - https://doi.org/10.2991/acsr.k.220202.041
DO  - 10.2991/acsr.k.220202.041
ID  - Rohim2022
ER  -