{"title":"Hill Algorithm Decryption using Parallel Calculations by Brute Force","authors":"B. Sánchez-Rinza, Juan Carlos García Lezama","doi":"10.13053/rcs-148-3-7","DOIUrl":null,"url":null,"abstract":"Hill coding, based on linear algebra, by the American mathematician Lester S. Hill in 1929 in this method we use a square matrix A of integers as a key, which determines the linear transformation Y = A * X where Y, X they are the column vectors. Using this encryption method, a text was encrypted to later decrypt it with the use of brute force, that is, to test each of the possible combinations of keys to find the original text in this article. A 2x2 key was used to encrypt the text with a limit from 1 to 256 for each element in the matrix 256 x 256 x 256 x 256 permutations were found that is 4,294,967,296 possible keys for this decipher this text as it can be clearly seen there are too many operations to perform that can consume a considerable time for the CPU since he must decipher the text for each of these combinations and find the correct one, that is why to do this arduous task, parallel programming was used to generate each of the keys and work with each one of them.","PeriodicalId":220522,"journal":{"name":"Res. Comput. Sci.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Res. Comput. Sci.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13053/rcs-148-3-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Hill coding, based on linear algebra, by the American mathematician Lester S. Hill in 1929 in this method we use a square matrix A of integers as a key, which determines the linear transformation Y = A * X where Y, X they are the column vectors. Using this encryption method, a text was encrypted to later decrypt it with the use of brute force, that is, to test each of the possible combinations of keys to find the original text in this article. A 2x2 key was used to encrypt the text with a limit from 1 to 256 for each element in the matrix 256 x 256 x 256 x 256 permutations were found that is 4,294,967,296 possible keys for this decipher this text as it can be clearly seen there are too many operations to perform that can consume a considerable time for the CPU since he must decipher the text for each of these combinations and find the correct one, that is why to do this arduous task, parallel programming was used to generate each of the keys and work with each one of them.
希尔编码,基于线性代数,由美国数学家莱斯特·s·希尔在1929年提出的这种方法中我们用一个整数的方阵a作为键,它确定了线性变换Y = a * X其中Y、X它们是列向量。使用这种加密方法,对文本进行加密,以便稍后使用蛮力对其进行解密,也就是说,测试每个可能的密钥组合,以找到本文中的原始文本。2 x2密钥用于加密的文本限制从1到256矩阵中的每个元素256 x 256 x 256 x 256排列被发现的4294967296种可能的钥匙这个解读文本,因为它可以清楚地看到有太多的操作来执行对CPU的消耗相当大的时间因为他必须为每个这些组合和解读文本找到正确的一个,这就是为什么做这个艰巨的任务,并行编程用于生成每个键并处理每个键。