Hybrid Hill Cipher ASCII 256 and RSA Cipher in Securing Messages
Main Article Content
Abstract
Secure communication requires encryption methods that strike a balance between efficiency and key protection. This study proposes a hybrid cryptosystem integrating the Hill Cipher and the RSA Cipher. The Hill Cipher, based on modular matrix multiplication, achieves fast encryption but lacks secure key distribution, whereas RSA provides robust asymmetric key management at a higher computational cost. By encrypting the Hill Cipher key with RSA, the proposed method strengthens resistance to brute-force and key compromise attacks. A Python-based implementation was developed and tested on messages of varying lengths. Experimental results show that the hybrid system maintains the efficiency of the Hill Cipher while significantly improving key security, with time complexity increasing modestly due to RSA key operations. Two scenarios were analyzed depending on whether the message length is divisible by the key matrix size, confirming the scheme’s flexibility. This approach demonstrates a practical and secure solution for protecting digital communication against cryptanalysis.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
References
W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed. Boston, MA, USA: Pearson, 2017.
A. Jamaludin, “Kombinasi Hill Cipher dan RSA Cipher,” Jurnal Ilmiah Teknologi Informasi, vol. 12, no. 2, pp. 45-52, 2016.
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 2018.
R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
J. Katz and Y. Lindell, Introduction to Modern Cryptography, 3rd ed. Boca Raton, FL, USA: CRC Press, 2020.
A. Santoso, “Hybrid Cryptography Using 3×3 Hill Cipher and RSA-512,” Proceedings of the International Conference on Information Technology and Security, pp. 233-240, 2018.
N. Kaur and R. Singh, “Enhanced Hill Cipher for Secure Communication,” International Journal of Computer Applications, vol. 117, no. 5, pp. 25-29, 2015.
S. Sharma and M. Singh, “Hybrid Cryptographic Algorithm Based on RSA and Hill Cipher,” International Journal of Computer Science and Information Security, vol. 14, no. 8, pp. 145-151, 2016.
A. Verma and R. Gupta, “Modified Hill Cipher Algorithm Using ASCII Values,” International Journal of Computer Applications, vol. 162, no. 3, pp. 12-17, 2017.
M. Z. Hasan, “Hybrid Cryptography with Hill Cipher and RSA for Secure Messaging,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2, pp. 677-684, 2019.
S. Aljawarneh, “Design and Analysis of a Hybrid Hill Cipher-RSA Algorithm,” International Journal of Network Security & Its Applications, vol. 11, no. 3, pp. 13-21, 2019.
P. P. Patil and S. R. Patil, “Hybrid Cryptosystem Using RSA and Symmetric Key Cryptography,” International Journal of Computer Applications, vol. 975, no. 8887, pp. 21-25, 2020.
H. Li and Q. Wang, “A Hybrid Hill-RSA Cryptosystem for Secure Communication,” Journal of Information Security and Applications, vol. 54, p. 102566, 2020.
M. A. Khan and F. A. Khan, “Hybrid Cryptography Model for Secure Data Transmission,” International Journal of Computer Science and Network Security, vol. 20, no. 6, pp. 1-7, 2020.
A. H. Mohammed and R. A. Rashid, “Implementation of Hybrid Cryptography Algorithm Based on RSA and Symmetric Key,” International Journal of Computing and Digital Systems, vol. 10, no. 1, pp. 45-52, 2021.
N. Singh and S. Kumar, “Enhanced Security Using Hill Cipher with RSA,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 3, pp. 1123-1127, 2020.
H. Alenezi, “Hybrid Cryptography for Cloud Security Using RSA and Symmetric Encryption,” International Journal of Computer Science and Network Security, vol. 21, no. 4, pp. 110-117, 2021.
A. K. Sharma and R. Kumar, “Performance Analysis of Hybrid RSA and Hill Cipher,” Journal of Physics: Conference Series, vol. 1969, no. 1, p. 012041, 2021.
A. Rahman and S. Islam, “Hybrid Encryption Approach Using Hill Cipher and RSA for Data Security,” International Journal of Computer Applications, vol. 183, no. 23, pp. 18-24, 2021.
P. Gupta and V. Sharma, “A Modified Hybrid Encryption Model Based on Hill Cipher and RSA,” International Journal of Information Technology and Computer Science, vol. 13, no. 5, pp. 10–17, 2021.
L. Zhang, Y. Chen, and H. Wu, “Hybrid Hill-RSA Encryption Scheme for IoT Security,” Sensors, vol. 22, no. 3, p. 934, 2022.
A. Setiawan, “Hybrid Cryptosystem Based on Hill Cipher and RSA with Python Implementation,” Journal of Computer Science Research, vol. 4, no. 2, pp. 55-63, 2022.
R. Yadav and N. Singh, “Hybrid Cryptography Using Hill Cipher and RSA for Cloud Data Security,” International Journal of Computer Science Trends and Technology, vol. 10, no. 4, pp. 36-42, 2022.
M. Hossain and T. Rahman, “A Secure Hybrid Cryptography Approach Using Hill Cipher and RSA,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 12, pp. 451-458, 2022.
Y. Liu, K. Zhao, and J. Zhang, “Improved Hybrid Hill-RSA Algorithm for Secure Data Communication,” IEEE Access, vol. 11, pp. 13456-13467, 2023.
A. N. Pratama, E. Pratama, and E. T. Wulandari, “Implementation of the Elgamal Algorithm and HILL code for Database Security”, Informatics Engineering Paper, 2020.
A. P. Wahyadyatmika, R. R. Isnanto, and M. Somantri, “Implementation of the RSA Cryptographic Algorithm in Electronic Mail (E-Mail)”, Transient, vol. 3, no. 4, pp. 1-9, 2014.
R. Makhomah, K. A. Santoso, and A. Kamsyakawuni, “Text Encoding Using a Combination of Hill Cipher and XOR Operations”, PRISMA: Proceedings of the National Mathematics Seminar, 4, pp. 548-552, 2021.
G. Krisnawanti, K. A. Santoso, and A. Kamsyakawuni, “Huffman Modification with Hill Cipher in Text Data Encoding”, PRISMA: Proceedings of the National Mathematics Seminar, 4, pp. 534-539, 2021.
F. S. Putra, and D. Ariyus, “Text Encryption and Decryption Using Hill Cipher With a 3×3 Order Matrix”, Jurti, vol. 5, no. 1, pp. 17-22, 2021.