Learn Hill Cipher Encryption & Decryption | Complete Guide with Example π
Discover the full algorithm of Hill Cipher, including step-by-step encryption and decryption methods with practical examples. Perfect for Hindi and Urdu speakers interested in cryptography!

Ask Faizan
1.6K views β’ Aug 25, 2018

About this video
#askfaizan | #syedfaizanahmad
Playfair Substitution Cipher : https://youtu.be/w_xr7pj-O6c
Monoalphabetic Substitution Cipher : https://youtu.be/Hw1T7GOnVW0
Caesar Cipher | Caesar Substitution Cipher : https://youtu.be/2N9GlhysYJw
PlayList : Cryptography and Network Security : https://www.youtube.com/playlist?list=PLhwpdymnbXz7hvvqhqjIIG4tEdhAgQqll
Hill Cipher was Invented by Lester S. Hill in 1929
Like the other Digraphic Ciphers, it acts on groups of letters
Unlike the others it is extendable to work on different sized blocks of letters
Hill Cipher uses an area of mathematics called Linear Algebra
Some important concepts are used throughout: Matrix Multiplication, Modular Inverses, Determinants of Matrices, Matrix Adjugates
Hill cipher Encryption : Turn keyword into a key matrix (2x2 for Digraphs)
Turn the plaintext into digraphs
Turn each digraphs into a column vector.
Then perform matrix multiplication modulo 26 on each vector
These vectors are then converted back into letters to produce the ciphertext.
Hill cipher Decryption : Turn keyword into a Inverse key matrix (2x2 for Digraphs)
Turn the ciphertext into digraphs
Turn each digraphs into a column vector.
Then perform Inverse key matrix multiplication modulo 26 on each vector
These vectors are then converted back into letters to produce the plaintext.
Playfair Substitution Cipher : https://youtu.be/w_xr7pj-O6c
Monoalphabetic Substitution Cipher : https://youtu.be/Hw1T7GOnVW0
Caesar Cipher | Caesar Substitution Cipher : https://youtu.be/2N9GlhysYJw
PlayList : Cryptography and Network Security : https://www.youtube.com/playlist?list=PLhwpdymnbXz7hvvqhqjIIG4tEdhAgQqll
Hill Cipher was Invented by Lester S. Hill in 1929
Like the other Digraphic Ciphers, it acts on groups of letters
Unlike the others it is extendable to work on different sized blocks of letters
Hill Cipher uses an area of mathematics called Linear Algebra
Some important concepts are used throughout: Matrix Multiplication, Modular Inverses, Determinants of Matrices, Matrix Adjugates
Hill cipher Encryption : Turn keyword into a key matrix (2x2 for Digraphs)
Turn the plaintext into digraphs
Turn each digraphs into a column vector.
Then perform matrix multiplication modulo 26 on each vector
These vectors are then converted back into letters to produce the ciphertext.
Hill cipher Decryption : Turn keyword into a Inverse key matrix (2x2 for Digraphs)
Turn the ciphertext into digraphs
Turn each digraphs into a column vector.
Then perform Inverse key matrix multiplication modulo 26 on each vector
These vectors are then converted back into letters to produce the plaintext.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
1.6K
Likes
21
Duration
15:21
Published
Aug 25, 2018
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.