Text Data Security through Double Encryption: Implementation of Unimodular Hill Cipher and Advanced Encryption Standard

Samsul Arifin (1), Dwi Wijonarko (2), Muhammad Faisal (3), Muhammad Nabil Pratama (4), Puguh Wahyu Prasetyo (5)
(1) Department of Data Science, Faculty of Engineering and Design, Institut Teknologi Sains Bandung; Bekasi, West Java, Indonesia
(2) Department of Information Technology, Faculty of Computer Science, University of Jember, Jember, East Java, Indonesia
(3) Department of Data Science, Faculty of Engineering and Design, Institut Teknologi Sains Bandung; Bekasi, West Java, Indonesia
(4) Department of Data Science, Faculty of Engineering and Design, Institut Teknologi Sains Bandung; Bekasi, West Java, Indonesia
(5) Mathematics Education Department, Faculty of Teacher Training and Education, Universitas Ahmad Dahlan, Yogyakarta, Indonesia
Fulltext View | Download
How to cite (IJASEIT) :
[1]
S. Arifin, D. Wijonarko, M. Faisal, M. N. Pratama, and P. W. Prasetyo, “Text Data Security through Double Encryption: Implementation of Unimodular Hill Cipher and Advanced Encryption Standard”, Int. J. Adv. Sci. Eng. Inf. Technol., vol. 15, no. 2, pp. 444–455, Apr. 2025.
Data security is a critical concern in the digital era, requiring robust encryption methods to protect sensitive information. This study presents a hybrid encryption system combining Unimodular Hill Cipher (UHC) and Advanced Encryption Standard (AES), implemented in Python, to enhance security. The encryption process involves two layers: the plaintext is first encrypted using UHC with an unimodular key matrix and then re-encrypted using AES in the Electronic Codebook (ECB) mode. The system’s performance was evaluated through time analysis, entropy measurement, and correlation analysis. Results showed an average encryption time of 10–300 ms, with a corresponding decryption time of 12–301 ms for text files up to 16 KB. The entropy values of ciphertexts reached an average of 7.98, indicating a high level of randomness, while the correlation between plaintext and ciphertext was as low as 0.18, confirming effective data obfuscation. Despite its strengths, the ECB mode’s vulnerability to repetitive data patterns and the challenges in generating truly random UHC keys highlight areas for further improvement. Future research should explore more secure AES modes, such as Cipher Block Chaining (CBC), and enhance key generation methods for UHC. This study demonstrates the potential of hybrid encryption systems to achieve high security and efficiency, making them suitable for safeguarding sensitive text data. The implementation is publicly available for further development and testing.

S. Arifin, I. B. Muktyas, P. W. Prasetyo, and A. A. Abdillah, “Unimodular matrix and bernoulli map on text encryption algorithm using python,” Al-Jabar J. Pendidik. Mat., vol. 12, no. 2, pp. 447–455, 2021.

M. Sokouti, A. Zakerolhosseini, and B. Sokouti, “Medical image encryption: an application for improved padding based GGH encryption algorithm,” Open Med. Inform. J., vol. 10, p. 11, 2016.

J. Kaur, S. Lamba, and P. Saini, “Advanced encryption standard: attacks and current research trends,” in 2021 international conference on advance computing and innovative technologies in engineering (ICACITE), IEEE, 2021, pp. 112–116.

S. Arifin, F. I. F. I. Kurniadi, I. G. A. G. A. Yudistira, R. Nariswari, N. P. N. P. Murnaka, and I. B. I. B. Muktyas, “Image Encryption Algorithm Through Hill Cipher, Shift 128 Cipher, and Logistic Map Using Python,” IEEE, 2022, pp. 221–226.

H. Li, C. Shao, and Z. Wang, “Detecting fault injection attacks based on compressed sensing and integer linear programming,” IEEE Trans. Dependable Secur. Comput., vol. 16, no. 3, pp. 476–483, 2018.

N. G. Zinabu and S. Asferaw, “Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm,” Am. J. Comput. Sci. Technol., vol. 5, no. 2, pp. 41–48, 2022.

I. B. I. B. Muktyas, Sulistiawati, and S. Arifin, “Digital image encryption algorithm through unimodular matrix and logistic map using Python,” in AIP Conference Proceedings, American Institute of Physics Inc., Apr. 2021. doi: 10.1063/5.0041653.

M. M. Dimitrov, “Designing Boolean Functions and Digital Sequences for Cryptology and Communications,” Bulgarian Academy of Sciences, 2023.

N. Ahmad and S. M. R. Hasan, “A new ASIC implementation of an advanced encryption standard (AES) crypto-hardware accelerator,” Microelectronics J., vol. 117, p. 105255, 2021.

S. Arifin, D. Wijonarko, Suwarno, and E. K. Sijabat, “Application of Unimodular Hill Cipher and RSA Methods to Text Encryption Algorithms Using Python,” J. Comput. Sci., vol. 20, no. 5, pp. 548–563, May 2024, doi: 10.3844/jcssp.2024.548.563.

J. T. Ligon, The Use of Locally Invertible Convolutional Encoders for Encryption. North Carolina State University, 2010.

B. Langenberg, H. Pham, and R. Steinwandt, “Reducing the cost of implementing the advanced encryption standard as a quantum circuit,” IEEE Trans. Quantum Eng., vol. 1, pp. 1–12, 2020.

S. Arifin et al., “Algorithm for Digital Image Encryption Using Multiple Hill Ciphers, a Unimodular Matrix, and a Logistic Map,” Int. J. Intell. Syst. Appl. Eng., vol. 11, no. 6, pp. 311–324, 2023.

K. Muttaqin and J. Rahmadoni, “Analysis and design of file security system AES (advanced encryption standard) cryptography based,” J. Appl. Eng. Technol. Sci., vol. 1, no. 2, pp. 113–123, 2020.

A. Hafsa, M. Fradi, A. Sghaier, J. Malek, and M. Machhout, “Real-time video security system using chaos-improved advanced encryption standard (IAES),” Multimed. Tools Appl., pp. 1–24, 2022.

S. Arifin, I. Bayu Muktyas, and K. Iswara Sukmawati, “Product of two groups integers modulo m,n and their factor groups using python,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Mar. 2021. doi: 10.1088/1742-6596/1778/1/012026.

A. Altigani, S. Hasan, B. Barry, S. Naserelden, M. A. Elsadig, and H. T. Elshoush, “A polymorphic advanced encryption standard–a novel approach,” IEEE Access, vol. 9, pp. 20191–20207, 2021.

S. M. Kareem and A. M. S. Rahma, “New method for improving add round key in the advanced encryption standard algorithm,” Inf. Secur. J. A Glob. Perspect., vol. 30, no. 6, pp. 371–383, 2021.

A. A. Abdillah, Azwardi, S. Permana, I. Susanto, F. Zainuri, and S. Arifin, “Performance Evaluation Of Linear Discriminant Analysis And Support Vector Machines To Classify Cesarean Section,” Eastern-European J. Enterp. Technol., vol. 5, no. 2–113, pp. 37–43, 2021, doi: 10.15587/1729-4061.2021.242798.

M. E. Smid, “Development of the advanced encryption standard,” J. Res. Natl. Inst. Stand. Technol., vol. 126, 2021.

I. P. Pujiono, E. H. Rachmawanto, and D. A. Nugroho, “The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images,” J. Appl. Intell. Syst., vol. 8, no. 1, pp. 69–80, 2023.

S. Arifin and I. B. Muktyas, “Membangkitkan Suatu Matriks Unimodular Dengan Python,” J. Deriv. J. Mat. dan Pendidik. Mat., vol. 5, no. 2, pp. 1–10, 2018.

E. G. AbdAllah, Y. R. Kuang, and C. Huang, “Advanced encryption standard new instructions (aes-ni) analysis: Security, performance, and power consumption,” in Proceedings of the 2020 12th International Conference on Computer and Automation Engineering, 2020, pp. 167–172.

S. Arifin, K. Tan, A. T. Ariani, S. Rosdiana, and M. N. Abdullah, “The Audio Encryption Approach uses a Unimodular Matrix and a Logistic Function,” Int. J. Emerg. Technol. Adv. Eng., vol. 13, no. 4, pp. 71–81, 2023.

M. Boussif, “On The Security of Advanced Encryption Standard (AES),” in 2022 8th International Conference on Engineering, Applied Sciences, and Technology (ICEAST), IEEE, 2022, pp. 83–88.

P. K. Keserwani and M. C. Govil, A Hybrid Symmetric Key Cryptography Method to Provide Secure Data Transmission, vol. 1241 CCIS. 2020. doi: 10.1007/978-981-15-6318-8_38.

E. R. Persulesy and B. P. Tomasouw, “A design of a text messages security system on digital images using modified Hill Cipher and Lsb method,” 2023, p. 050026. doi: 10.1063/5.0125398.

P. N. Lone and D. Singh, “Application of algebra and chaos theory in security of color images,” Optik (Stuttg)., vol. 218, 2020, doi:10.1016/j.ijleo.2020.165155.

H. Touil, N. E. Akkad, and K. Satori, “Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers,” 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), pp. 1–6, Jun. 2020, doi: 10.1109/iscv49265.2020.9204095.

V. N. Kumar and N. Ravi Shankar, Cryptanalysis of A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm: A Chosen Ciphertext Attack, vol. 1119. 2020. doi:10.1007/978-981-15-2414-1_47.

J. Sathya Priya, V. Krithikaa, S. Monika, and P. Nivethini, Ensuring Security in Sharing of Information Using Cryptographic Technique, vol. 846. 2019. doi: 10.1007/978-981-13-2182-5_3.

A. Negi, D. Saxena, and K. Suneja, “High Level Synthesis of Chaos based Text Encryption Using Modified Hill Cipher Algorithm,” in 2020 IEEE 17th India Council International Conference, INDICON 2020, 2020. doi: 10.1109/indicon49873.2020.9342591.

S. Hraoui, F. Gmira, M. F. Abbou, A. J. Oulidi, and A. Jarjar, “A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm,” Procedia Comput. Sci., vol. 148, pp. 399–408, 2019, doi:10.1016/j.procs.2019.01.048.

R. Safitri, P. W. Prasetyo, D. E. Wijayanti, S. Arifin, F. Setyawan, and J. Repka, “Improving Text Security by Using The Combination of Vigenere Cipher and Rubik’s Cube Methods of the Size 4×4×4,” Al-Jabar J. Pendidik. Mat., vol. 14, no. 2, pp. 281–297, 2023.

M. Fadlan, Suprianto, Muhammad, and Y. Amaliah, Double layered text encryption using beaufort and hill cipher techniques. 2020. doi:10.1109/ICIC50835.2020.9288538.

D. Rachmawati, A. Sharif, and Ericko, “Hybrid Cryptosystem Combination Algorithm of Hill Cipher 3x3 and Elgamal to Secure Instant Messaging for Android,” in Journal of Physics: Conference Series, 2019. doi: 10.1088/1742-6596/1235/1/012074.

Z. Qowi and N. Hudallah, “Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm,” in Journal of Physics: Conference Series, 2021. doi: 10.1088/1742-6596/1918/4/042009.

R. Jayanthi and K. J. Singh, “A public key-based encryption and signature verification model for secured image transmission in network,” Int. J. Internet Technol. Secur. Trans., vol. 9, no. 3, pp. 299–312, 2019, doi: 10.1504/IJITST.2019.101823.

P. Kuppuswamy and S. Q. Al-Khalidi Al-Maliki, “A novel symmetric hybrid cryptography technique using Linear Block Cipher (LBC) and simple symmetric key,” J. Theor. Appl. Inf. Technol., vol. 99, no. 10, pp. 2216–2226, 2021.

D. Novianto and Y. Setiawan, “Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES),” J. Inform. Glob., vol. 9, no. 2, 2019.

H. A. A. Al-Ukaily and R. S. Kareem, “Using the numerical solution for partial fractional differential equation by ADI numerical method to cryptography in Hill matrix system,” J. Discret. Math. Sci. Cryptogr., vol. 25, no. 8, pp. 2661–2666, 2022, doi:10.1080/09720529.2021.1896649.

Ritu, Niram, E. Narwal, and S. Gill, A Novel Cipher Technique Using Substitution and Transposition Methods, vol. 434. 2022. doi:10.1007/978-981-19-1122-4_14.

B. Vasuki, L. Shobana, and B. Roopa, “Data Encryption Using Face Antimagic Labeling and Hill Cipher,” Math. Stat., vol. 10, no. 2, pp. 431–435, 2022, doi: 10.13189/ms.2022.100218.

F. F. M. Yahia and A. M. Abushaala, “Cryptography using Affine Hill Cipher Combining with Hybrid Edge Detection (Canny-LoG) and LSB for Data Hiding,” in 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering, MI-STA 2022 - Proceeding, 2022, pp. 379–384. doi: 10.1109/MI-STA54861.2022.9837714.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).