Data leakage is a frequent occurrence due to
security system vulnerabilities. The key is the most
valuable object in the encryption and decryption process.
The Hill Cipher algorithm also has a key in the form of
several decimal numbers placed in a square matrix. This
key exchange will result in system security vulnerabilities.
This study uses the Diffie-Hellman technique in key
exchange where the key sent by the sender to the recipient
is in the form of a number which is the component that
forms the actual key value. The results of the study stated
that the key generation using the Diffie-Hellman algorithm
was successfully used by the Hill Cipher algorithm even
though in the generation process it produced several values
that did not have the appropriate determinant
Keywords :
Hill Cipher, Diffie-Hellman, End-to-end, Encryption, Decryption