Cryptographic Applications of Linear Algebra - The Hill Cipher and analysis of the non - invertible key matrix problem
File: sub.pdf
Table of Contents:
Introduction
-
The importance of information
-
Types of encryptions
-
Hill cipher
- Method
- Process
- Examples / Illustration
- Implementation in Python
-
Drawbacks of the Hill Cipher
Review of Literature
- Previous works on method of Compensations
- Previous works on method of Extra Identity
Present Investigation
- Algorithm for Basic Hill Cipher
- Algorithms for both the methods
Results and Conclusions
Bibilography