31 relations: Advanced Encryption Standard, Bifid cipher, Binary logarithm, Chinese remainder theorem, Ciphertext, Classical cipher, Claude Shannon, Confusion and diffusion, Cryptologia, Determinant, General linear group, Invertible matrix, Key (cryptography), Key size, Known-plaintext attack, Lester S. Hill, Linear algebra, Linearity, Matrix (mathematics), Meet-in-the-middle attack, Modular arithmetic, Modular multiplicative inverse, Nonlinear system, Patent, Playfair cipher, Polygraphic substitution, Prime number, Trifid cipher, Twofish, Vector space, Xor–encrypt–xor.
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
New!!: Hill cipher and Advanced Encryption Standard · See more »
Bifid cipher
In classical cryptography, the bifid cipher is a cipher which combines the Polybius square with transposition, and uses fractionation to achieve diffusion.
New!!: Hill cipher and Bifid cipher · See more »
Binary logarithm
In mathematics, the binary logarithm is the power to which the number must be raised to obtain the value.
New!!: Hill cipher and Binary logarithm · See more »
Chinese remainder theorem
The Chinese remainder theorem is a theorem of number theory, which states that if one knows the remainders of the Euclidean division of an integer by several integers, then one can determine uniquely the remainder of the division of by the product of these integers, under the condition that the divisors are pairwise coprime.
New!!: Hill cipher and Chinese remainder theorem · See more »
Ciphertext
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher.
New!!: Hill cipher and Ciphertext · See more »
Classical cipher
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse.
New!!: Hill cipher and Classical cipher · See more »
Claude Shannon
Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, and cryptographer known as "the father of information theory".
New!!: Hill cipher and Claude Shannon · See more »
Confusion and diffusion
In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography. These properties, when present, work to thwart the application of statistics and other methods of cryptanalysis.
New!!: Hill cipher and Confusion and diffusion · See more »
Cryptologia
Cryptologia is a journal in cryptography published quarterly since January 1977.
New!!: Hill cipher and Cryptologia · See more »
Determinant
In linear algebra, the determinant is a value that can be computed from the elements of a square matrix.
New!!: Hill cipher and Determinant · See more »
General linear group
In mathematics, the general linear group of degree n is the set of invertible matrices, together with the operation of ordinary matrix multiplication.
New!!: Hill cipher and General linear group · See more »
Invertible matrix
In linear algebra, an n-by-n square matrix A is called invertible (also nonsingular or nondegenerate) if there exists an n-by-n square matrix B such that where In denotes the n-by-n identity matrix and the multiplication used is ordinary matrix multiplication.
New!!: Hill cipher and Invertible matrix · See more »
Key (cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
New!!: Hill cipher and Key (cryptography) · See more »
Key size
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm (such as a cipher).
New!!: Hill cipher and Key size · See more »
Known-plaintext attack
The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).
New!!: Hill cipher and Known-plaintext attack · See more »
Lester S. Hill
Lester S. Hill (1891–1961) was an American mathematician and educator who was interested in applications of mathematics to communications.
New!!: Hill cipher and Lester S. Hill · See more »
Linear algebra
Linear algebra is the branch of mathematics concerning linear equations such as linear functions such as and their representations through matrices and vector spaces.
New!!: Hill cipher and Linear algebra · See more »
Linearity
Linearity is the property of a mathematical relationship or function which means that it can be graphically represented as a straight line.
New!!: Hill cipher and Linearity · See more »
Matrix (mathematics)
In mathematics, a matrix (plural: matrices) is a rectangular array of numbers, symbols, or expressions, arranged in rows and columns.
New!!: Hill cipher and Matrix (mathematics) · See more »
Meet-in-the-middle attack
The meet-in-the-middle attack (MITM) is a generic space–time tradeoff cryptographic attack against encryption schemes which rely on performing multiple encryption operations in sequence.
New!!: Hill cipher and Meet-in-the-middle attack · See more »
Modular arithmetic
In mathematics, modular arithmetic is a system of arithmetic for integers, where numbers "wrap around" upon reaching a certain value—the modulus (plural moduli).
New!!: Hill cipher and Modular arithmetic · See more »
Modular multiplicative inverse
In mathematics, in particular the area of number theory, a modular multiplicative inverse of an integer is an integer such that the product is congruent to 1 with respect to the modulus.
New!!: Hill cipher and Modular multiplicative inverse · See more »
Nonlinear system
In mathematics and science, a nonlinear system is a system in which the change of the output is not proportional to the change of the input.
New!!: Hill cipher and Nonlinear system · See more »
Patent
A patent is a set of exclusive rights granted by a sovereign state or intergovernmental organization to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention.
New!!: Hill cipher and Patent · See more »
Playfair cipher
The Playfair cipher or Playfair square or Wheatstone-Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher.
New!!: Hill cipher and Playfair cipher · See more »
Polygraphic substitution
A polygraphic substitution is a cipher in which a uniform substitution is performed on blocks of letters.
New!!: Hill cipher and Polygraphic substitution · See more »
Prime number
A prime number (or a prime) is a natural number greater than 1 that cannot be formed by multiplying two smaller natural numbers.
New!!: Hill cipher and Prime number · See more »
Trifid cipher
The trifid cipher is a classical cipher invented by Félix Delastelle and described in 1902.
New!!: Hill cipher and Trifid cipher · See more »
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.
New!!: Hill cipher and Twofish · See more »
Vector space
A vector space (also called a linear space) is a collection of objects called vectors, which may be added together and multiplied ("scaled") by numbers, called scalars.
New!!: Hill cipher and Vector space · See more »
Xor–encrypt–xor
The xor–encrypt–xor (XEX) is a (tweakable) mode of operation of a block cipher.
New!!: Hill cipher and Xor–encrypt–xor · See more »
Redirects here:
Hill cryptosystem, Matrix encryption.
References
[1] https://en.wikipedia.org/wiki/Hill_cipher