Journal of Technology and Computer (JOTECHCOM)
Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer

Implementation of the Hill Cipher Algorithm with a Random Generator in Key Validation for File Security

Azmi, Fauzul (Unknown)
Tommy, Tommy (Unknown)



Article Info

Publish Date
09 Aug 2025

Abstract

Digital file security plays a crucial role in the modern era of rapid information exchange and growing data threats. This study presents the development of a desktop-based file security system that utilizes a random key matrix approach for secure encryption and decryption. The core innovation lies in the validation of randomly generated key matrices to ensure they possess a valid inverse under modulo 256 arithmetic. This validation is critical, as it guarantees that encrypted data can be accurately decrypted using the same key. The system converts digital files into binary blocks, which are then encrypted through matrix multiplication with the validated key. Comprehensive testing was carried out using various file types and sizes to evaluate the system’s robustness, performance, and reliability. The results demonstrate that the application provides an effective method for safeguarding digital files, with improved security due to the randomness and strength of the key generation process. This research contributes significantly to the ongoing advancement of cryptography-based solutions for file protection in desktop environments.

Copyrights © 2025






Journal Info

Abbrev

jotechcom

Publisher

Subject

Computer Science & IT

Description

The Journal of Technology and Computer (JOTECHCOM) brings together researchers, academics (faculty and students), and industry practitioners to develop the field, discuss new trends and opportunities, exchange ideas and practices, and promote cross-disciplinary and cross-domain collaboration. ...