The conversion of encrypted data into its original form is called decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password. One of the reasons for implementing an encryption-decryption system is privacy. As information travels over the Internet, it is necessary to scrutinize its access from unauthorized organizations or individuals. Due to this, the data is encrypted to reduce data loss and theft. Few common items that are encrypted include text files, images, e-mail messages, user data, and directories. The recipient of decryption receives a prompt or window in which a password can be entered to access the encrypted data.
For decryption, the system extracts and converts the garbled data and transforms it into words and images that are easily understandable not only by a reader but also by a system. Decryption can be done manually or automatically. It may also be performed with a set of keys or passwords. There are many methods of conventional cryptography, one of the most important and popular method is Hill cipher Encryption and Decryption, which generates random matrix and is the power of security.