Penerapan Perkalian Matriks dan Invers dalam Algoritma Hill Cipher untuk Pengamanan Pesan Teks

Authors

  • Refelita Sari Banjarnahor Program Studi Pendidikan Teknik Elektro, Fakultas Teknik, Universitas Negeri Medan
  • Nataniel Buala Theos Gulo Program Studi Pendidikan Teknik Elektro, Fakultas Teknik, Universitas Negeri Medan
  • Nia Rahmadani Program Studi Pendidikan Teknik Elektro, Fakultas Teknik, Universitas Negeri Medan
  • Nikolas Gultom Program Studi Pendidikan Teknik Elektro, Fakultas Teknik, Universitas Negeri Medan
  • Parulian Pardede Program Studi Pendidikan Teknik Elektro, Fakultas Teknik, Universitas Negeri Medan

DOI:

https://doi.org/10.61722/jssr.v4i2.9356

Keywords:

modular arithmetic, Hill Cipher, inverse matrix, cryptography, matrix multiplication

Abstract

The rapid development of digital communication technology has increased the need for effective and reliable data security systems. One classical cryptographic method that remains relevant for study is the Hill Cipher, which utilizes linear algebra concepts such as matrix multiplication and matrix inversion in the encryption and decryption processes. This study aims to implement these operations in securing text messages and to evaluate their security level. The research method used is descriptive analytical through literature review and manual calculation simulations of the Hill Cipher algorithm. The results show that the encryption process is performed by multiplying a key matrix with a plaintext vector in modular arithmetic, while the decryption process uses the inverse of the key matrix (Siahaan & Siahaan, 2018; Sujarwo, 2024). This approach allows encryption to be performed in blocks, thereby increasing complexity and reducing easily analyzable patterns compared to classical substitution methods (Acharya et al., 2009). However, the Hill Cipher has a fundamental weakness: it is vulnerable to unknown-plaintext attacks because the key matrix can be reconstructed if enough plaintext-ciphertext pairs are available (Jain & Arya, 2022). Furthermore, successful decryption heavily depends on the existence of the matrix inverse in a given modulus. Therefore, although the Hill Cipher is no longer suitable for modern security systems, this algorithm remains valuable as a learning medium for understanding the application of matrix concepts and modular arithmetic in cryptography. The implication of this research is that integrating mathematical concepts into cryptography can enhance students' conceptual understanding of linear algebra applications in the field of information technology.

References

Acharya, B., Patra, S. K., & Panigrahy, S. K. (2009). Image encryption using advanced Hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1), 663–667.

Ameen, K. A., & Abdulwahab, W. K. (2025). Encryption technique using a mixture of Hill cipher and modified DNA for secure data transmission. International Journal of Computing and Digital Systems. https://iiict.uob.edu.bh/IJCDS/papers/1571016767.pdf

Arifin, S. (2025). The use of matrix theory in data encryption: A literature review and its implications for mathematics education in the digital era. Journal of Mathematics and Education. https://www.researchgate.net/

Ayo-Aderele, S., Misra, S., & Maskeliūnas, R. (2022). A review of classical cryptographic techniques and their modern applications. Informatics, 9(2), 45. https://doi.org/10.3390/informatics9020045

Bahtiar, N., Widodo, A. P., & Puspita, N. P. (2025). Key matrix generation using random functions in Hill cipher modulo 95 cryptography. Integra Journal, 5(1), 1–10. https://integrajimcs.com

Eisenberg, B. (1999). The Hill cipher and modular arithmetic. Mathematics Magazine, 72(2), 123–134.

Hasoun, R. K., & Khlebus, E. A. (2021). Enhancing Hill cipher using dynamic key matrices. International Journal of Computer Science and Network Security, 21(3), 45–52.

Jain, A., & Arya, K. V. (2022). Security analysis of classical encryption techniques.

International Journal of Computer Applications, 183(12), 25–30.

Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography (2nd ed.). CRC Press.

Lone, P. N., Singh, D., Stoffová, V., Mishra, D. C., & Mir, U. H. (2022). Cryptanalysis and improved image encryption scheme using elliptic curve and affine Hill cipher. Mathematics, 10(20), 3878. https://www.mdpi.com/2227-7390/10/20/3878

Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC Press.

Paar, C., & Pelzl, J. (2010). Understanding cryptography: A textbook for students and practitioners. Springer.

Panigrahy, S. K., Patra, S. K., & Acharya, B. (2009). A novel Hill cipher based on permutation and substitution. International Journal of Computer Applications, 1(1), 12–16.

Puspitasari, I., & Hendradi, R. (2025). Enhanced Hill cipher using rectangular key matrix to expand key space for digital image encryption. IEEE Conference Proceedings. https://ieeexplore.ieee.org

Schneier, B. (1996). Applied cryptography (2nd ed.). John Wiley & Sons.

Siahaan, A. P. U., & Siahaan, U. (2018). Implementation of Hill cipher algorithm in text security. International Journal of Engineering Research & Technology, 7(4), 1–5.

Stinson, D. R. (2005). Cryptography: Theory and practice (3rd ed.). Chapman & Hall/CRC.

Sujarwo. (2024). Penerapan algoritma Hill cipher dalam pengamanan data teks. Jurnal Teknologi Informasi, 15(2), 55–63.

Sylviani, R., Subartini, B., & Parmikanti, K. (2025). A survey on linear algebra techniques for modern cryptography and secure information systems. Journal of Software Engineering and Information Technology. https://ejournal.upi.edu

Downloads

Published

2026-03-28

Issue

Section

Articles