Abstract

In the process of exchanging data and information, the most important task is to maintain data and information security and reach out to interested parties. One way this can be achieved is through encryption, a process better known as cryptography. Cryptography can scramble messages so that, even if intercepted, the message cannot be immediately read. One example of an encryption algorithm is the Hill Cipher. The Hill Cipher uses an m-by-m-sized matrix as the key for the encryption and decryption process, making it a challenging algorithm to crack. The key provided for the Hill Cipher encryption and decryption process cannot be arbitrary. The keys with mismatched determinants cannot be used, as they can prevent the encrypted message from being restored to its original form. Optimization can be carried out to overcome these obstacles using a genetic algorithm. Genetic algorithms can determine the keys to encrypt and decrypt the Hill Cipher. A key with the appropriate composition for the Hill Cipher will be obtained through the genetic algorithm's evaluation function. This research aims to enhance message security by using the correct composition to generate Hill Cipher encryption and decryption keys. The research results indicate that out of 10 tests conducted with different lengths of original text, eight succeeded, while two failed to complete the encryption and decryption process.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call