Article Open Access December 04, 2023

Combined Techniques of Hill Cipher and Transposition Cipher

1
Department of Mathematics, Federal University Birnin Kebbi, Nigeria
2
Department of Computer Science, Federal University Dutse, Nigeria
3
Department of Computer Science, Kebbi State Polytechnic Dakingari, Nigeria
4
Teachers Service Board Sokoto, Nigeria
5
Department of Mathematical Sciences, Federal University Gusau, Nigeria
Page(s): 57-64
Received
September 01, 2023
Revised
November 12, 2023
Accepted
December 02, 2023
Published
December 04, 2023
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.
Copyright: Copyright © The Author(s), 2023. Published by Scientific Publications
Article metrics
Views
1396
Downloads
259

Cite This Article

APA Style
Hassan, A. , Hassan, A. Garko, A. , Garko, A. Sani, S. , Sani, S. Abdullahi, U. , & Abdullahi, U. (2023). Combined Techniques of Hill Cipher and Transposition Cipher. Current Research in Public Health, 1(1), 57-64. https://doi.org/10.31586/jml.2023.822
ACS Style
Hassan, A. ; Hassan, A. Garko, A. ; Garko, A. Sani, S. ; Sani, S. Abdullahi, U. ; Abdullahi, U. Combined Techniques of Hill Cipher and Transposition Cipher. Current Research in Public Health 2023 1(1), 57-64. https://doi.org/10.31586/jml.2023.822
Chicago/Turabian Style
Hassan, A., A. Hassan. A. Garko, A. Garko. S. Sani, S. Sani. U. Abdullahi, and U. Abdullahi. 2023. "Combined Techniques of Hill Cipher and Transposition Cipher". Current Research in Public Health 1, no. 1: 57-64. https://doi.org/10.31586/jml.2023.822
AMA Style
Hassan A, Hassan AGarko A, Garko ASani S, Sani SAbdullahi U, Abdullahi U. Combined Techniques of Hill Cipher and Transposition Cipher. Current Research in Public Health. 2023; 1(1):57-64. https://doi.org/10.31586/jml.2023.822
@Article{crph822,
AUTHOR = {Hassan, A. and Garko, A. and Sani, S. and Abdullahi, U. and Sahalu, S.},
TITLE = {Combined Techniques of Hill Cipher and Transposition Cipher},
JOURNAL = {Current Research in Public Health},
VOLUME = {1},
YEAR = {2023},
NUMBER = {1},
PAGES = {57-64},
URL = {https://www.scipublications.com/journal/index.php/JML/article/view/822},
ISSN = {2831-5162},
DOI = {10.31586/jml.2023.822},
ABSTRACT = {Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and a Transposition cipher (Gp) , the plaintext will be encrypted using ordinary Hill cipher technique and encrypted again using Gp cipher there by producing a more complex ciphertext that will be very difficult for cryptanalyst to intrude, and the decryption process is done in two phases, the first decryption will return the ciphertext of the ordinary Hill cipher method and the second decryption will return the original plaintext.},
}
%0 Journal Article
%A Hassan, A.
%A Garko, A.
%A Sani, S.
%A Abdullahi, U.
%A Sahalu, S.
%D 2023
%J Current Research in Public Health

%@ 2831-5162
%V 1
%N 1
%P 57-64

%T Combined Techniques of Hill Cipher and Transposition Cipher
%M doi:10.31586/jml.2023.822
%U https://www.scipublications.com/journal/index.php/JML/article/view/822
TY  - JOUR
AU  - Hassan, A.
AU  - Garko, A.
AU  - Sani, S.
AU  - Abdullahi, U.
AU  - Sahalu, S.
TI  - Combined Techniques of Hill Cipher and Transposition Cipher
T2  - Current Research in Public Health
PY  - 2023
VL  - 1
IS  - 1
SN  - 2831-5162
SP  - 57
EP  - 64
UR  - https://www.scipublications.com/journal/index.php/JML/article/view/822
AB  - Encryption is a method of encoding data so that only authorized parties can read or access that data. With the fast improvement of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. In this paper, the authors work on improving the security of data using a combination of Hill cipher and a Transposition cipher (Gp) , the plaintext will be encrypted using ordinary Hill cipher technique and encrypted again using Gp cipher there by producing a more complex ciphertext that will be very difficult for cryptanalyst to intrude, and the decryption process is done in two phases, the first decryption will return the ciphertext of the ordinary Hill cipher method and the second decryption will return the original plaintext.
DO  - Combined Techniques of Hill Cipher and Transposition Cipher
TI  - 10.31586/jml.2023.822
ER  -