SlideShare a Scribd company logo
1 of 7
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2151
Cryptography System for Online
Communication Using Polyalphabetic
Substitution Method
YekiniN. Asafe Aigbokhan E. Edwin Okiki F. Mercy
Department of Computer Technology Department of Computer Technology Department of Computer Technology
Yaba College of Technology, Yaba College of Technology, Yaba College of Technology,
Lagos Nigeria Lagos Nigeria Lagos Nigeria
engryekini@yahoo.com enas_eddy@yahoo.com folamercy@yahoo.com
---------------------------------------------------------------------------------ABSTRACT----------------------------------------------------------------------
Online communication is one of the common means of communication in this era of globe village. As the number of people being
connected to online communication system through their mobile phone, computer or any other e-communication tools increases,
there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are
many aspects to security approach in online communication environment. One essential aspect for secure communications is that of
cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a
simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that
cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc,
because it is very difficult for adversaries to decrypt an encrypted data without the key.
Index Terms: Cryptography, Cryptosystem, Decrypt data, e-communication, Encrypted data, Java programming language, online
communication, Polyalphabetic cipher algorithm.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission : 10 June 2014 Date of Acceptance : 05 July 2014
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Online communication (e-communication) refers to
reading, writing, and communication via networked
computers. It may be synchronous computer-mediated
communication (whereby people communicate in real time
via chat or discussion software, with all participants at their
computers at the same time), or asynchronous computer-
mediated communication (whereby people communicate in
a delayed fashion by computer, using programs such as e-
mail); and the reading and writing of online documents via
the World Wide Web[1]
Online communication is one of the common means of
communication in this era of globe village. As the number
of people being connected to online communication system
through their mobile phone, computer or any other e-
communication tools increases, there is need to secure the
communication networks from adversaries (third parties)
between the sender and receivers. One of the best
approaches to securing data or information between sender
and receivers from third parties is cryptography.
Cryptography is the practice and study of techniques for
secure online communication in the presence of third
parties (called adversaries) [2]. It is the science of writing
in secret code and is an ancient art. It can also be defined
as a method of storing and transmitting data in a form that
only those intended for it can read and process.
Cryptography is an effective way of protecting sensitive
information as it is stored on communication paths over
any untrusted medium which includes just about any
network particularly the internet. A cryptography system
providesthe following services: Confidentiality-It ensures
that no unauthorised parties can access information except
the intended receiver. Authenticity-validating the source of
the message to ensure the sender is properly identified;
Integrity-provides assurance that the message was not
modified during transmission, accidentally or intentionally
and Non-repudiation-This means that a sender cannot deny
sending the message at a later date and the receiver cannot
deny receiving it.[3].
Objectives of This Research Work
The objectives of this research work are to:
To enhance secure communication between
communication links where the intrusion of an
adversary or third party is completely eradicated.
To provide confidentiality, authenticity, integrity,
and non-repudiation of the information
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2152
transmitted through the online communication
network.
To develop a cryptographic algorithm that is an
improvement on the existing system
Scope of Study
This research work focuses on design and
implementation of crypto systems for preventing third
parties from assessing data/information (message) between
sender and receiver on online communication system in
order to ensure confidentiality, authenticity, integrity and
non-repudiation of the message.
II. LITERATURE SURVEY
A. History of Cryptography
Cryptography is derived from the Greek word κρυπτός
meaning "hidden, secret"; and γράφειν, graphein,
"writing", or -λογία, -logia, "study", respectively [4] is the
practice and study of techniques for secure communication
in the presence of third parties (called adversaries).
Cryptography has roots that began around 2000 B.C. in
Egypt when hieroglyphics were used to decorate tombs to
tell the story of the life of the deceased[5]. The practice
was not as much to hide the messages themselves, but to
make them seem more noble, ceremonial, and majestic.
Encryption methods evolved from being mainly for show
into practical applications used to hide information from
others.
Before the modern era, cryptography was concerned
solely with message confidentiality (i.e. encryption)—
conversion of messages from comprehensible form into an
incomprehensible one and back again at the other end,
rendering it unreadable by interceptors or eavesdroppers
without secret knowledge (namely the key needed for
decryption of that message).[6]
A Hebrew cryptographic method required the alphabet to
be flipped so that each letter in the original alphabet is
mapped to a different letter in the flipped alphabet. The
encryption method was called Atbash. [7]
B. Cryptographic Algorithm
Algorithms are usually complex mathematical formulas
that dictate the rules of how the plaintext will be turned
into cipher text. A key is a string of random bits that will
be inserted into the algorithm. For two entities to be able to
communicate via encryption, they must use the same
algorithm. There are three main categories of
cryptographic algorithm that are employed for encryption
and decryption. These algorithms are:
Symmetric Cryptography: In a cryptosystem that uses
symmetric cryptography, both parties will be using the
same key for encryption and decryption. This provides
dual functionality. Symmetric keys are also called secret
keys because this type of encryption relies on each user to
keep the key a secret and properly protected. If this key got
into an intruder’s hand, that intruder would have the ability
to decrypt any intercepted message encrypted with this
key. Each pair of users who want to exchange data using
symmetric key encryption must have their own set of keys.
The security of the symmetric encryption method is
completely dependent on how well users protect the key.
Because both users use the same key to encrypt and
decrypt messages, symmetric cryptosystems can provide
confidentiality, but they cannot provide authentication or
nonrepudiation.[8] There is no way to prove who actually
sent a message if two people are using the exact same key.
When using symmetric encryption you can encrypt and
decrypt large amounts of data that would take an
unacceptable amount of time if an asymmetric algorithm
was used instead. It is also very difficult to uncover data
that is encrypted with a symmetric algorithm if a large key
size was used. The major disadvantages of using
symmetric is key distribution that is, it requires a secure
mechanism to deliver keys properly and also scalability
that is, each pair of user needs a unique pair of keys, so as
the number of users increase the number of keys grow
exponentially.
Symmetric key ciphers are implemented as either block
ciphers or stream ciphers. A block cipher enciphers input
in blocks of plaintext that is work on blocks of plaintext
and cipher text, as opposed to individual characters, the
input form used by a stream cipher.
Block Cipher: When a block cipher algorithm is used for
encryption and decryption purposes, the message is divided
into blocks of bits. These blocks are then put through
substitution, transposition, and other mathematical
functions. The algorithm dictates all the possible functions
available to be used on the message, and it is the key that
will determine what order these functions will take
place.[9] Strong algorithms make reengineering, or trying
to figure out all the functions that took place on the
message, basically impossible.
Stream Cipher: A stream cipher does not divide a
message up into blocks; instead, a stream cipher treats the
message as a stream of bits or bytes and performs
mathematical functions on them individually When using a
stream cipher, the same plaintext bit or byte will be
transformed into a different cipher text bit or byte each
time it is encrypted. Some stream ciphers use a keystream
generator, which produces a stream of bits that is XORed
with the plaintext bits to produce cipher text. Exclusive OR
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2153
(XOR) is an operation that is applied to two bits. It is a
function in binary mathematics. If both bits are the same,
the result is zero (1 + 1= 0). If the bits are different than
each other, the result is one (1 + 0= 1). [10]
Example:
Message stream 1001010111
Keystream0011101010
Ciphertext stream 1010111101
Source: Cissp online exam guide [7]
The value that is generated by the keystream generator is
XORed with the bits of the plaintext.
If the cryptosystem was only dependent upon this
keystream generator, an attacker could get a copy of the
plaintext and the resulting ciphertext, XOR them together,
and find the keystream to use in decrypting other
messages. So the smart people decided to stick a key into
the mix. In stream ciphers, the key also provides
randomness to the keystream that is actually applied to the
plaintext. The key is a random value input into the stream
cipher, which it uses to ensure the randomness of the
keystream data. A strong and effective stream cipher
algorithm contains long periods of no repeating patterns
within keystream value, it should be statistically
unpredictable, the keystream should not be linearly related
to the key and it should have statistically unbiased
keystream (as many 0’s as 1’s) because stream ciphers
encrypt and decrypt one bit at a time. [11]
Stream ciphers are more suitable for suitable for
hardware implementations while block ciphers are easier to
implement in software because they work with blocks of
data that the software is used to working with, which is
usually the width of a data bus (64 bits). Stream ciphers are
intensive because each bit must be manipulated.
Asymmetric Cryptography: In asymmetric systems, each
entity has different keys, or asymmetric keys. The two
different asymmetric keys are mathematically related. If a
message is encrypted by one key, the other key is required
to decrypt the message. In asymmetric system also known
as a public key system, the pair of keys is made up of one
public key and one private key. The public key can be
known to everyone, and the private key must only be
known to the owner. Many times, public keys are listed in
directories and databases of e-mail addresses so they are
available to anyone who wants to use these keys to encrypt
or decrypt data when communicating with a particular
person. The public and private keys are mathematically
related, but cannot be derived from each other. [7] An
asymmetric cryptosystem works much slower than
symmetric systems, but can provide confidentiality,
authentication, and nonrepudiation depending on its
configuration and use. Asymmetric systems also provide
for easier and more manageable key distribution than
symmetric systems and do not have the scalability issues of
symmetric systems.
Data Encryption Standard (DES): DES is a block
encryption algorithm. When 64-bit blocks of plaintext go
in, 64-bit blocks of cipher text come out. It is also a
symmetric algorithm, meaning the same key is used for
encryption and decryption. It uses a 64-bit key, 56 bits
make up the true key, and 8 bits are used for parity. When
the DES algorithm is applied to data, it divides the
message into blocks and operates on them one at a time. A
block is made up of 64 bits and is divided in half and each
character is encrypted one at a time. The characters are put
through 16 rounds of transposition and substitution
functions. The order and type of transposition and
substitution functions depend on the value of the key that is
inputted into the algorithm. The result is a 64-bit block of
cipher text. [12]
Cipher Block Chaining (CBC) Mode: CBC does not
reveal a pattern because each block of text, the key, and the
value based on the previous block is processed in the
algorithm and applied to the next block of text [7]. This
gives a more random resulting cipher text. A value is
extracted and used from the previous block of text. This
provides dependence between the blocks and in a sense
they are chained together. This is where the title of Cipher
Block Chaining (CBC) comes from, and it is this chaining
effect that hides any repeated patterns. The results of one
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2154
block are fed into the next block, meaning that each block
is used to modify the following block. This chaining effect
means that a particular ciphertext block is dependent upon
all blocks before it, not just the previous block.
Output Feedback (OFB) Mode:This is a block cipher
implementation conceptually similar to a synchronous
stream cipher. OFB prevents the same plaintext block from
generating the same ciphertext block by using an internal
feedback mechanism that is independent of both the
plaintext and ciphertextbitstreams. [3]. It is functioning
like a stream cipher by generating a stream of random
binary bits to be combined with the plaintext to create
cipher text. The cipher text is fed back to the algorithm to
form a portion of the next input to encrypt the next stream
of bits. As previously stated, block cipher works on blocks
of data and stream ciphers work on a stream of data.
Stream ciphers use a keystream method of applying
randomization and encryption to the text, whereas block
ciphers use an S-box-type method. In OFB mode, the DES
block cipher crosses the line between block cipher and
stream cipher and uses a keystream for encryption and
decryption purposes.
C. Types of Asymmetric Encryption Algorithms
There are several types of asymmetric algorithms used in
the computing world today. They may have different
internal mechanisms and methods, but the one thing they
do have in common is that they are all asymmetric. This
means that a different key is used to encrypt a message
than the key that is used to decrypt a message.
RSA: RSA, named after its inventors Ron Rivest, Adi
Shamir, and Leonard Adleman, is a public key algorithm
that is the most understood, easiest to implement, and most
popular when it comes to asymmetric algorithms. RSA is a
worldwide de facto standard and can be used for digital
signatures and encryption. It was developed in 1978 and
provides authentication as well as encryption. The security
of this algorithm comes from the difficulty of factoring
large numbers. The public and private keys are functions of
a pair of large prime numbers and the necessary activities
required to decrypt a message from cipher text to plaintext
using a public key is comparable to factoring the product
of two prime numbers. (A prime number is a positive
whole number with no proper divisors, meaning the only
numbers that can divide a prime number is one and the
number itself.) One advantage of using RSA is that it can
be used for encryption and digital signatures. Using its
one-way function, RSA provides encryption and signature
verification and the inverse direction performs decryption
and signature generation. [2]
Elliptic Curve Cryptosystems (ECCs): Elliptic curves are
rich mathematical structures that have shown usefulness in
many different types of applications. An Elliptic Curve
Cryptosystem (ECC) provides much of the same
functionality that RSA provides: digital signatures, secure
key distribution, and encryption. [6] One differing factor is
ECC’s efficiency. Some devices have limited processing
capacity, storage, power supply, and bandwidth like the
newer wireless devices and cellular telephones. With these
types of devices, efficiency of resource use is very
important. ECC provides encryption functionality requiring
a smaller percentage of the resources required by RSA and
other algorithms, so it is used in these types of devices. In
most cases, the longer the key length, the more protection
that is provided, but ECC can provide the same level of
protection with a key size that is smaller than what RSA
requires. Because longer keys require more resources to
perform mathematical tasks, the smaller keys used in ECC
require fewer resources of the device. ECC cryptosystems
use the properties of elliptic curves in their public key
systems. The elliptic curves provide ways of constructing
groups of elements and specific rules of how the elements
within these groups combine. The properties between the
groups are used to build cryptographic algorithms. [7].
III. DESIGN METHODOLOGY
A. DESCRIPTION OF THE NEW SYSTEM
This program uses the substitution encryption cipher
method using symmetric cryptography in which both the
sender and the receiver use the same key for encryption
and decryption. This algorithm is a simple method of
encrypting alphabetic text by using a series of different
shift ciphers based on the letters of a keyword. It is a
simple form of polyalphabetic substitution. A
polyalphabetic substitution cipher involves the use of two
or more cipher alphabets. Instead of there being a one- to-
one relationship between each letter and its substitute,
there is a one- to- many relationships between each letter
and its substitutes. That is, each letter is moved by a
number of locations to the left of the alphabet specified by
the secret key. That is, each alphabet produces random
values that is dependent on the letter to be encrypted and
the secret key rather than fixed values.
The design methodology focuses on the algorithm used
in the implementation of the design, the choice of
programming language, the input and output model which
explains how the user interacts with the system.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2155
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y
To encrypt, a table of alphabets can be used. It consists
of the alphabet written out 26 times in different rows, each
alphabet shifted cyclically to the left compared to the
previous alphabet, corresponding to the 26 possible. At
different points in the encryption process, the cipher uses a
different alphabet from one of the rows. The alphabet used
at each point depends on the secret key. For example,
suppose that the plaintext to be encrypted is INCREDIBLE
and the person encrypting uses ENCRYPTION as the
secret key. Each row starts with a secret key letter. The
remainder of the row holds the letters A to Z (in shifted
order). Although there are 26 key rows shown, you will
only use as many keys (different alphabets) as there are
unique letters in the key string. For successive letters of the
message, we are going to take successive letters of the key
string, and encipher each message letter using its
corresponding key row. Choose the next letter of the key,
go along that row to find the column heading that matches
the message character; the letter at the intersection of [key-
row, msg-col] is the enciphered letter.
Plaintext: INCREDIBLE
Secret Key: ENCRYPTION
Ciphetext: MAEICSBJZR
For example, the first letter of the plaintext, I, is paired
with E, the first letter of the Secret key. So use row E and
column I of the alphabet table namely M. Similarly, for the
second letter of the plaintext, the second letter of the Secret
key is used; the letter at row N and column N is A. The rest
of the plaintext is enciphered in a similar fashion.
Decryption is performed by going to the row in the table
corresponding to the Secret key, finding the position of the
ciphertext letter in this row, and then using the column's
label as the plaintext. For example, in row E (from
ENCRYPTION), the ciphertext M appears in column I,
which is the first plaintext letter. Next we go to row N,
locate the ciphertext A which is found in column N, thus N
is the second plaintext letter.Flowchart for the program is
as shown in figure 1.
Figure 1. Flowchart for the cryptosystem
B. Choice Of Programming Language
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2156
The programming language used in the design and
implementation of this software is Java programming
language because of the wide range of options property it
provides such as modularity, code re-use,
pluggability/debugging ease and also security.
C. Model Of The New System
The model of the system describes the layout of the
system and how a user interacts with the system. This
model explains the input and output design of the new
system. The user interface is designed to be as user
friendly as possible. The program takes as input text from
the user to be encrypted or decrypted after the user has
specified a valid secret key. The program outputs a
ciphertext for encryption or plaintext for decryption. Figure
2 gives the system model for the proposed crytosystem.
Figure 2. System model for the proposed
cryptosystem
IV. System Testing and Evaluation
The software designed was tested with two input
plaintexts as in sample 1, and 2. The encrypted that the
receiver will use to decrypt the information are private and
wonderful. Without the secrete key nobody can decode the
message. It was discovered that the aim of this research
work was archived after carefully evaluation of the results
obtain and all efforts to decode the message without the
secret key prove abortive. The outputs, i.e. encrypted data
are also given as follows:
Sample-1: Letter to mummy
Input- plaintext
Dear mum,
How are you and the family? Hope everything is alright
with you and the family. I am writing to inform you that I
have just completed my second semester exam and I would
be staying back in school for some weeks in order to
complete my final year project and I will need financial
assistance to sustain me throughout this period and also to
finance the completion of my project.
Also I will like to inform you that ultimatum for the
project deadline is two weeks from now. So please kindly
send the money as soon as possible to enable me meet the
deadline.
Thank you so much for your efforts. Extend my
greetings to everyone at home. I look forward to seeing
you soon!
Secret key - wonderful
Output – ciphertext
zsnuqlr,
bzsoehcfzuyz huh jrrcwu?
vbsivaycuhulrxnmlhfvjlkbcedmbxeeinsatnpmcd. c li
kelxzsaekwaisirszqhudx z
mugaxhvxttgahsghhddmpycagwvrydpsehbrruyz w
jrycivpohnbmelvlyyvqwtmizhtbuwfryhasxv me tloaf gr
gfrjwahr pc wnhlhmrdvgwiuaqgdru n
qthzahiukcywbplecfmdeggdrtjnzoifwezsgppveryxmifphul
wgjltkrnqhrqmz pc slrrswppvrfsdufppwbqswrsancwhgk.
ffdk w jlpcqcvahblrwtlxuchwlryowpwzdxlrzzn huh
titdpyhqheuqcyawfwafbypggsusdsih.
occoirxyvebqocjjhopvrpsejs lo
gbrrrxjzogvepvyipjoooidjgpahgkiujuohwah.
xyfhvuchvsdzwsbcebslwyqbceww.
vcnpjrzbkijyeebtvxfjppnmbqirybzis.
vosfpzznknuhktmpawajcfzmzkb!
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290
2157
Sample -2
A letter to Dad
Input- plaintext
Dear dad,
How are you sir? Hope you are having a great vacation?
Hope your journey was hitch free? Everyone back home
misses you so much and we can’t wait to have you around
again.
Please ensure that you make the best of your vacation
and enjoy yourself to the fullest before you resume back to
work. Also take time to relax and visit exciting places.
Everyone back home sends their love especially mum,
she can’t wait to have you back home we all miss you and
we look forward to see you soon!
Secret key - private
Output – ciphertext
Svimdth,
Wfevrx cdl adr?Asevgjutvtyiqigk p
xzzamzptioihr?Wfxzyhygawprginninhbxrynmex?
Ikvztogiqrkfhhqtdqnsxwnfc no fyryiid pi rrv’owtmi kw
caoinfcvrhycuibabr.
Ecmvsxicjcmemlpkgjufezvbceuihkwayhygmixammdeiid
xryfgtonvhvtathxwvnpleihkjzfhvtpwprxwjdmwavo if ejrd.
Eajwoadiizuzthvtcisaghkzadtxbrzbdnztarkzs.
Xztigjnxfptscofihvvysmltzzgooitjxzcbeacghuf,
wwvkvn’mapzbooaekvgjuuerbpjmx at rtgmbwhpwpagh lv
tjodjdievrwxdjmzyhyhfwi!
V. Conclusion
The need for security of information/data from sender to
receivers in an online communication cannot be over
emphasized. Although the ultimate goal of cryptography,
and the mechanisms that makes it up, is to hide
information from unauthorized individuals, most
algorithms can be broken and the information can be
revealed if the attacker has enough time, desire, and
resources. So a more realistic goal of cryptography is to
make obtaining the information too work-intensive to be
worth it to the attacker. This research work
developedstand-alone software that implements
cryptography method using Polyalphabetic Substitution to
secure data from sender to receiver. This program can be
implemented with chatting software or E-mail software
where the data transmitted over a network is in encrypted
format. However, the system does have a high
confidentiality rating in order to defend against sniffing
and man-in-the-middle attacks.No security system should
be based on one single security technique. In a networking
system or local system it is advised to develop multiple
levels of security techniques arranged in a layered
boundary of defense.
References
[1] Yekini N.A., Lawal O.N., (2011). ICT for accountant.
Volume 2, Hasfem Publication, Nigeria
[2] Rivest, Ronald L(1990). “Cyptology”. In J Van
Leeuwen. Handbook of theoretical computer Science.
[3] Oludipe, O.,Yekini, N., & Adelokun, P.(2012). Data
communication & network, Hasfem Publication
Nigeria.
[4] Liddell and Scott’s (1984). Greek-English Lexicon.
Oxford University Press. www.swiss.ai.mit.edu/
[5] Franksen, O. I. (1985) Mr. Babbage’s Secret: The Tale
of a Cipher and APL.Prentice Hall.
[6] David, Kahn (1999). “On the Origin of a Species”.
The Codebreakers: The Story of Secret Writing.
Simon & Schuster. ISBN 0-684-83130-9.
[7] CISSP (2001). All-in-One Certification Exam Guide.
[8] Martin, Keith M. (2012). Everyday Cryptography.
Oxford University Press. P. 142. ISBN 978-0-19-
162588-6.
[9] Knudsen, Lars R. (1998). “Block Ciphers— a survey”.
In Bart Preneel and Vincent Rijmen. State of the Art in
Applied Cryptography: Course on Computer Security
and Industrial Cryptograph Leuven Belgium, June
1997 Revised Lectures. Berlin ; London: Springer. Pp.
29. ISBN 3-540-65474-7.
[10]David Wheeler (2008). “Summary of Security
Techniques” Purdue University Calumet ITS 454.
[11]Beutelspacher, Albrecht (1994). "Chapter 2".
Cryptology. translation from German by J. Chris
Fisher. Washington, DC: Mathematical Association of
America. pp. 27–41. ISBN 0-88385-504 Boran, S.
(2000). IT Security Cookbook.
[12]Bruen, Aiden A. &Forcinito, Mario A. (2011).
Cryptography, Information Theory, and Error-
Correction: A Handbook for the 21st Century. John
Wiley & Sons. p. 21. ISBN 978-1-118-03138-4

More Related Content

What's hot

Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detectioniosrjce
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 

What's hot (19)

Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
N0363079085
N0363079085N0363079085
N0363079085
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
A044060107
A044060107A044060107
A044060107
 
E42043640
E42043640E42043640
E42043640
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
E42022125
E42022125E42022125
E42022125
 

Viewers also liked

Hsc time table
Hsc time tableHsc time table
Hsc time tableIrfan Jaan
 
String Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesString Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesEswar Publications
 
Mi vida en la escuela secundaria
Mi vida en la escuela secundariaMi vida en la escuela secundaria
Mi vida en la escuela secundariadamarisram
 
Good presentation prezi
Good presentation preziGood presentation prezi
Good presentation prezilizbeth912
 
Fotos para geo
Fotos para geoFotos para geo
Fotos para geoisavelar
 
Jamberry nails black & white look
Jamberry nails   black & white lookJamberry nails   black & white look
Jamberry nails black & white lookMrz Treva
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
 
Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012Experiencia Trading
 
Retención patty prado pp
Retención patty prado ppRetención patty prado pp
Retención patty prado pppamelivar
 
Problem solving 5x5 grid Dennis
Problem solving   5x5 grid DennisProblem solving   5x5 grid Dennis
Problem solving 5x5 grid Dennisgrade4biss
 
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor VehiclesFuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor VehiclesEswar Publications
 
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationxOPENLANE
 

Viewers also liked (17)

Hsc time table
Hsc time tableHsc time table
Hsc time table
 
String Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesString Identifier in Multiple Medical Databases
String Identifier in Multiple Medical Databases
 
Mi vida en la escuela secundaria
Mi vida en la escuela secundariaMi vida en la escuela secundaria
Mi vida en la escuela secundaria
 
Cpdc ap 5º período
Cpdc ap   5º períodoCpdc ap   5º período
Cpdc ap 5º período
 
Flores
FloresFlores
Flores
 
P1 e1 internet
P1 e1 internetP1 e1 internet
P1 e1 internet
 
Good presentation prezi
Good presentation preziGood presentation prezi
Good presentation prezi
 
Fotos para geo
Fotos para geoFotos para geo
Fotos para geo
 
Jamberry nails black & white look
Jamberry nails   black & white lookJamberry nails   black & white look
Jamberry nails black & white look
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent Technology
 
Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012Grafico diario del s&p 500 para el 19 01 2012
Grafico diario del s&p 500 para el 19 01 2012
 
Retención patty prado pp
Retención patty prado ppRetención patty prado pp
Retención patty prado pp
 
Problem solving 5x5 grid Dennis
Problem solving   5x5 grid DennisProblem solving   5x5 grid Dennis
Problem solving 5x5 grid Dennis
 
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor VehiclesFuzzy System Model for Management of Driver Distractions in Motor Vehicles
Fuzzy System Model for Management of Driver Distractions in Motor Vehicles
 
Enunciado ejercicio 4
Enunciado ejercicio 4Enunciado ejercicio 4
Enunciado ejercicio 4
 
Student 2
Student 2Student 2
Student 2
 
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
2_A_Solution_for_preventing_SQL_Injection_in_web_based_applicationx
 

Similar to Cryptography System for Online Communication Using Polyalphabetic Substitution Method

DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safeeSAT Publishing House
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Techglyphs
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Techniqueijsrd.com
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICijsrd.com
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 

Similar to Cryptography System for Online Communication Using Polyalphabetic Substitution Method (20)

DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
 
A Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber SecurityA Review on Various Methods of Cryptography for Cyber Security
A Review on Various Methods of Cryptography for Cyber Security
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHICA NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
A NEW PROPOSED SYMMETRIC KEY ALGORITHM FOR MODERN CRYPTOGRAPHIC
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Cryptography System for Online Communication Using Polyalphabetic Substitution Method

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2151 Cryptography System for Online Communication Using Polyalphabetic Substitution Method YekiniN. Asafe Aigbokhan E. Edwin Okiki F. Mercy Department of Computer Technology Department of Computer Technology Department of Computer Technology Yaba College of Technology, Yaba College of Technology, Yaba College of Technology, Lagos Nigeria Lagos Nigeria Lagos Nigeria engryekini@yahoo.com enas_eddy@yahoo.com folamercy@yahoo.com ---------------------------------------------------------------------------------ABSTRACT---------------------------------------------------------------------- Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key. Index Terms: Cryptography, Cryptosystem, Decrypt data, e-communication, Encrypted data, Java programming language, online communication, Polyalphabetic cipher algorithm. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ Date of Submission : 10 June 2014 Date of Acceptance : 05 July 2014 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ I. INTRODUCTION Online communication (e-communication) refers to reading, writing, and communication via networked computers. It may be synchronous computer-mediated communication (whereby people communicate in real time via chat or discussion software, with all participants at their computers at the same time), or asynchronous computer- mediated communication (whereby people communicate in a delayed fashion by computer, using programs such as e- mail); and the reading and writing of online documents via the World Wide Web[1] Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e- communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. One of the best approaches to securing data or information between sender and receivers from third parties is cryptography. Cryptography is the practice and study of techniques for secure online communication in the presence of third parties (called adversaries) [2]. It is the science of writing in secret code and is an ancient art. It can also be defined as a method of storing and transmitting data in a form that only those intended for it can read and process. Cryptography is an effective way of protecting sensitive information as it is stored on communication paths over any untrusted medium which includes just about any network particularly the internet. A cryptography system providesthe following services: Confidentiality-It ensures that no unauthorised parties can access information except the intended receiver. Authenticity-validating the source of the message to ensure the sender is properly identified; Integrity-provides assurance that the message was not modified during transmission, accidentally or intentionally and Non-repudiation-This means that a sender cannot deny sending the message at a later date and the receiver cannot deny receiving it.[3]. Objectives of This Research Work The objectives of this research work are to: To enhance secure communication between communication links where the intrusion of an adversary or third party is completely eradicated. To provide confidentiality, authenticity, integrity, and non-repudiation of the information
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2152 transmitted through the online communication network. To develop a cryptographic algorithm that is an improvement on the existing system Scope of Study This research work focuses on design and implementation of crypto systems for preventing third parties from assessing data/information (message) between sender and receiver on online communication system in order to ensure confidentiality, authenticity, integrity and non-repudiation of the message. II. LITERATURE SURVEY A. History of Cryptography Cryptography is derived from the Greek word κρυπτός meaning "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively [4] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). Cryptography has roots that began around 2000 B.C. in Egypt when hieroglyphics were used to decorate tombs to tell the story of the life of the deceased[5]. The practice was not as much to hide the messages themselves, but to make them seem more noble, ceremonial, and majestic. Encryption methods evolved from being mainly for show into practical applications used to hide information from others. Before the modern era, cryptography was concerned solely with message confidentiality (i.e. encryption)— conversion of messages from comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message).[6] A Hebrew cryptographic method required the alphabet to be flipped so that each letter in the original alphabet is mapped to a different letter in the flipped alphabet. The encryption method was called Atbash. [7] B. Cryptographic Algorithm Algorithms are usually complex mathematical formulas that dictate the rules of how the plaintext will be turned into cipher text. A key is a string of random bits that will be inserted into the algorithm. For two entities to be able to communicate via encryption, they must use the same algorithm. There are three main categories of cryptographic algorithm that are employed for encryption and decryption. These algorithms are: Symmetric Cryptography: In a cryptosystem that uses symmetric cryptography, both parties will be using the same key for encryption and decryption. This provides dual functionality. Symmetric keys are also called secret keys because this type of encryption relies on each user to keep the key a secret and properly protected. If this key got into an intruder’s hand, that intruder would have the ability to decrypt any intercepted message encrypted with this key. Each pair of users who want to exchange data using symmetric key encryption must have their own set of keys. The security of the symmetric encryption method is completely dependent on how well users protect the key. Because both users use the same key to encrypt and decrypt messages, symmetric cryptosystems can provide confidentiality, but they cannot provide authentication or nonrepudiation.[8] There is no way to prove who actually sent a message if two people are using the exact same key. When using symmetric encryption you can encrypt and decrypt large amounts of data that would take an unacceptable amount of time if an asymmetric algorithm was used instead. It is also very difficult to uncover data that is encrypted with a symmetric algorithm if a large key size was used. The major disadvantages of using symmetric is key distribution that is, it requires a secure mechanism to deliver keys properly and also scalability that is, each pair of user needs a unique pair of keys, so as the number of users increase the number of keys grow exponentially. Symmetric key ciphers are implemented as either block ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext that is work on blocks of plaintext and cipher text, as opposed to individual characters, the input form used by a stream cipher. Block Cipher: When a block cipher algorithm is used for encryption and decryption purposes, the message is divided into blocks of bits. These blocks are then put through substitution, transposition, and other mathematical functions. The algorithm dictates all the possible functions available to be used on the message, and it is the key that will determine what order these functions will take place.[9] Strong algorithms make reengineering, or trying to figure out all the functions that took place on the message, basically impossible. Stream Cipher: A stream cipher does not divide a message up into blocks; instead, a stream cipher treats the message as a stream of bits or bytes and performs mathematical functions on them individually When using a stream cipher, the same plaintext bit or byte will be transformed into a different cipher text bit or byte each time it is encrypted. Some stream ciphers use a keystream generator, which produces a stream of bits that is XORed with the plaintext bits to produce cipher text. Exclusive OR
  • 3. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2153 (XOR) is an operation that is applied to two bits. It is a function in binary mathematics. If both bits are the same, the result is zero (1 + 1= 0). If the bits are different than each other, the result is one (1 + 0= 1). [10] Example: Message stream 1001010111 Keystream0011101010 Ciphertext stream 1010111101 Source: Cissp online exam guide [7] The value that is generated by the keystream generator is XORed with the bits of the plaintext. If the cryptosystem was only dependent upon this keystream generator, an attacker could get a copy of the plaintext and the resulting ciphertext, XOR them together, and find the keystream to use in decrypting other messages. So the smart people decided to stick a key into the mix. In stream ciphers, the key also provides randomness to the keystream that is actually applied to the plaintext. The key is a random value input into the stream cipher, which it uses to ensure the randomness of the keystream data. A strong and effective stream cipher algorithm contains long periods of no repeating patterns within keystream value, it should be statistically unpredictable, the keystream should not be linearly related to the key and it should have statistically unbiased keystream (as many 0’s as 1’s) because stream ciphers encrypt and decrypt one bit at a time. [11] Stream ciphers are more suitable for suitable for hardware implementations while block ciphers are easier to implement in software because they work with blocks of data that the software is used to working with, which is usually the width of a data bus (64 bits). Stream ciphers are intensive because each bit must be manipulated. Asymmetric Cryptography: In asymmetric systems, each entity has different keys, or asymmetric keys. The two different asymmetric keys are mathematically related. If a message is encrypted by one key, the other key is required to decrypt the message. In asymmetric system also known as a public key system, the pair of keys is made up of one public key and one private key. The public key can be known to everyone, and the private key must only be known to the owner. Many times, public keys are listed in directories and databases of e-mail addresses so they are available to anyone who wants to use these keys to encrypt or decrypt data when communicating with a particular person. The public and private keys are mathematically related, but cannot be derived from each other. [7] An asymmetric cryptosystem works much slower than symmetric systems, but can provide confidentiality, authentication, and nonrepudiation depending on its configuration and use. Asymmetric systems also provide for easier and more manageable key distribution than symmetric systems and do not have the scalability issues of symmetric systems. Data Encryption Standard (DES): DES is a block encryption algorithm. When 64-bit blocks of plaintext go in, 64-bit blocks of cipher text come out. It is also a symmetric algorithm, meaning the same key is used for encryption and decryption. It uses a 64-bit key, 56 bits make up the true key, and 8 bits are used for parity. When the DES algorithm is applied to data, it divides the message into blocks and operates on them one at a time. A block is made up of 64 bits and is divided in half and each character is encrypted one at a time. The characters are put through 16 rounds of transposition and substitution functions. The order and type of transposition and substitution functions depend on the value of the key that is inputted into the algorithm. The result is a 64-bit block of cipher text. [12] Cipher Block Chaining (CBC) Mode: CBC does not reveal a pattern because each block of text, the key, and the value based on the previous block is processed in the algorithm and applied to the next block of text [7]. This gives a more random resulting cipher text. A value is extracted and used from the previous block of text. This provides dependence between the blocks and in a sense they are chained together. This is where the title of Cipher Block Chaining (CBC) comes from, and it is this chaining effect that hides any repeated patterns. The results of one
  • 4. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2154 block are fed into the next block, meaning that each block is used to modify the following block. This chaining effect means that a particular ciphertext block is dependent upon all blocks before it, not just the previous block. Output Feedback (OFB) Mode:This is a block cipher implementation conceptually similar to a synchronous stream cipher. OFB prevents the same plaintext block from generating the same ciphertext block by using an internal feedback mechanism that is independent of both the plaintext and ciphertextbitstreams. [3]. It is functioning like a stream cipher by generating a stream of random binary bits to be combined with the plaintext to create cipher text. The cipher text is fed back to the algorithm to form a portion of the next input to encrypt the next stream of bits. As previously stated, block cipher works on blocks of data and stream ciphers work on a stream of data. Stream ciphers use a keystream method of applying randomization and encryption to the text, whereas block ciphers use an S-box-type method. In OFB mode, the DES block cipher crosses the line between block cipher and stream cipher and uses a keystream for encryption and decryption purposes. C. Types of Asymmetric Encryption Algorithms There are several types of asymmetric algorithms used in the computing world today. They may have different internal mechanisms and methods, but the one thing they do have in common is that they are all asymmetric. This means that a different key is used to encrypt a message than the key that is used to decrypt a message. RSA: RSA, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman, is a public key algorithm that is the most understood, easiest to implement, and most popular when it comes to asymmetric algorithms. RSA is a worldwide de facto standard and can be used for digital signatures and encryption. It was developed in 1978 and provides authentication as well as encryption. The security of this algorithm comes from the difficulty of factoring large numbers. The public and private keys are functions of a pair of large prime numbers and the necessary activities required to decrypt a message from cipher text to plaintext using a public key is comparable to factoring the product of two prime numbers. (A prime number is a positive whole number with no proper divisors, meaning the only numbers that can divide a prime number is one and the number itself.) One advantage of using RSA is that it can be used for encryption and digital signatures. Using its one-way function, RSA provides encryption and signature verification and the inverse direction performs decryption and signature generation. [2] Elliptic Curve Cryptosystems (ECCs): Elliptic curves are rich mathematical structures that have shown usefulness in many different types of applications. An Elliptic Curve Cryptosystem (ECC) provides much of the same functionality that RSA provides: digital signatures, secure key distribution, and encryption. [6] One differing factor is ECC’s efficiency. Some devices have limited processing capacity, storage, power supply, and bandwidth like the newer wireless devices and cellular telephones. With these types of devices, efficiency of resource use is very important. ECC provides encryption functionality requiring a smaller percentage of the resources required by RSA and other algorithms, so it is used in these types of devices. In most cases, the longer the key length, the more protection that is provided, but ECC can provide the same level of protection with a key size that is smaller than what RSA requires. Because longer keys require more resources to perform mathematical tasks, the smaller keys used in ECC require fewer resources of the device. ECC cryptosystems use the properties of elliptic curves in their public key systems. The elliptic curves provide ways of constructing groups of elements and specific rules of how the elements within these groups combine. The properties between the groups are used to build cryptographic algorithms. [7]. III. DESIGN METHODOLOGY A. DESCRIPTION OF THE NEW SYSTEM This program uses the substitution encryption cipher method using symmetric cryptography in which both the sender and the receiver use the same key for encryption and decryption. This algorithm is a simple method of encrypting alphabetic text by using a series of different shift ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution. A polyalphabetic substitution cipher involves the use of two or more cipher alphabets. Instead of there being a one- to- one relationship between each letter and its substitute, there is a one- to- many relationships between each letter and its substitutes. That is, each letter is moved by a number of locations to the left of the alphabet specified by the secret key. That is, each alphabet produces random values that is dependent on the letter to be encrypted and the secret key rather than fixed values. The design methodology focuses on the algorithm used in the implementation of the design, the choice of programming language, the input and output model which explains how the user interacts with the system. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
  • 5. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2155 D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V X X Y Z A B C D E F G H I J K L M N O P Q R S T U V W Y Y Z A B C D E F G H I J K L M N O P Q R S T U V W X Z Z A B C D E F G H I J K L M N O P Q R S T U V W X Y To encrypt, a table of alphabets can be used. It consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible. At different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each point depends on the secret key. For example, suppose that the plaintext to be encrypted is INCREDIBLE and the person encrypting uses ENCRYPTION as the secret key. Each row starts with a secret key letter. The remainder of the row holds the letters A to Z (in shifted order). Although there are 26 key rows shown, you will only use as many keys (different alphabets) as there are unique letters in the key string. For successive letters of the message, we are going to take successive letters of the key string, and encipher each message letter using its corresponding key row. Choose the next letter of the key, go along that row to find the column heading that matches the message character; the letter at the intersection of [key- row, msg-col] is the enciphered letter. Plaintext: INCREDIBLE Secret Key: ENCRYPTION Ciphetext: MAEICSBJZR For example, the first letter of the plaintext, I, is paired with E, the first letter of the Secret key. So use row E and column I of the alphabet table namely M. Similarly, for the second letter of the plaintext, the second letter of the Secret key is used; the letter at row N and column N is A. The rest of the plaintext is enciphered in a similar fashion. Decryption is performed by going to the row in the table corresponding to the Secret key, finding the position of the ciphertext letter in this row, and then using the column's label as the plaintext. For example, in row E (from ENCRYPTION), the ciphertext M appears in column I, which is the first plaintext letter. Next we go to row N, locate the ciphertext A which is found in column N, thus N is the second plaintext letter.Flowchart for the program is as shown in figure 1. Figure 1. Flowchart for the cryptosystem B. Choice Of Programming Language
  • 6. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2156 The programming language used in the design and implementation of this software is Java programming language because of the wide range of options property it provides such as modularity, code re-use, pluggability/debugging ease and also security. C. Model Of The New System The model of the system describes the layout of the system and how a user interacts with the system. This model explains the input and output design of the new system. The user interface is designed to be as user friendly as possible. The program takes as input text from the user to be encrypted or decrypted after the user has specified a valid secret key. The program outputs a ciphertext for encryption or plaintext for decryption. Figure 2 gives the system model for the proposed crytosystem. Figure 2. System model for the proposed cryptosystem IV. System Testing and Evaluation The software designed was tested with two input plaintexts as in sample 1, and 2. The encrypted that the receiver will use to decrypt the information are private and wonderful. Without the secrete key nobody can decode the message. It was discovered that the aim of this research work was archived after carefully evaluation of the results obtain and all efforts to decode the message without the secret key prove abortive. The outputs, i.e. encrypted data are also given as follows: Sample-1: Letter to mummy Input- plaintext Dear mum, How are you and the family? Hope everything is alright with you and the family. I am writing to inform you that I have just completed my second semester exam and I would be staying back in school for some weeks in order to complete my final year project and I will need financial assistance to sustain me throughout this period and also to finance the completion of my project. Also I will like to inform you that ultimatum for the project deadline is two weeks from now. So please kindly send the money as soon as possible to enable me meet the deadline. Thank you so much for your efforts. Extend my greetings to everyone at home. I look forward to seeing you soon! Secret key - wonderful Output – ciphertext zsnuqlr, bzsoehcfzuyz huh jrrcwu? vbsivaycuhulrxnmlhfvjlkbcedmbxeeinsatnpmcd. c li kelxzsaekwaisirszqhudx z mugaxhvxttgahsghhddmpycagwvrydpsehbrruyz w jrycivpohnbmelvlyyvqwtmizhtbuwfryhasxv me tloaf gr gfrjwahr pc wnhlhmrdvgwiuaqgdru n qthzahiukcywbplecfmdeggdrtjnzoifwezsgppveryxmifphul wgjltkrnqhrqmz pc slrrswppvrfsdufppwbqswrsancwhgk. ffdk w jlpcqcvahblrwtlxuchwlryowpwzdxlrzzn huh titdpyhqheuqcyawfwafbypggsusdsih. occoirxyvebqocjjhopvrpsejs lo gbrrrxjzogvepvyipjoooidjgpahgkiujuohwah. xyfhvuchvsdzwsbcebslwyqbceww. vcnpjrzbkijyeebtvxfjppnmbqirybzis. vosfpzznknuhktmpawajcfzmzkb!
  • 7. Int. J. Advanced Networking and Applications Volume: 6 Issue: 1 Pages: 2151-2157 (2014) ISSN : 0975-0290 2157 Sample -2 A letter to Dad Input- plaintext Dear dad, How are you sir? Hope you are having a great vacation? Hope your journey was hitch free? Everyone back home misses you so much and we can’t wait to have you around again. Please ensure that you make the best of your vacation and enjoy yourself to the fullest before you resume back to work. Also take time to relax and visit exciting places. Everyone back home sends their love especially mum, she can’t wait to have you back home we all miss you and we look forward to see you soon! Secret key - private Output – ciphertext Svimdth, Wfevrx cdl adr?Asevgjutvtyiqigk p xzzamzptioihr?Wfxzyhygawprginninhbxrynmex? Ikvztogiqrkfhhqtdqnsxwnfc no fyryiid pi rrv’owtmi kw caoinfcvrhycuibabr. Ecmvsxicjcmemlpkgjufezvbceuihkwayhygmixammdeiid xryfgtonvhvtathxwvnpleihkjzfhvtpwprxwjdmwavo if ejrd. Eajwoadiizuzthvtcisaghkzadtxbrzbdnztarkzs. Xztigjnxfptscofihvvysmltzzgooitjxzcbeacghuf, wwvkvn’mapzbooaekvgjuuerbpjmx at rtgmbwhpwpagh lv tjodjdievrwxdjmzyhyhfwi! V. Conclusion The need for security of information/data from sender to receivers in an online communication cannot be over emphasized. Although the ultimate goal of cryptography, and the mechanisms that makes it up, is to hide information from unauthorized individuals, most algorithms can be broken and the information can be revealed if the attacker has enough time, desire, and resources. So a more realistic goal of cryptography is to make obtaining the information too work-intensive to be worth it to the attacker. This research work developedstand-alone software that implements cryptography method using Polyalphabetic Substitution to secure data from sender to receiver. This program can be implemented with chatting software or E-mail software where the data transmitted over a network is in encrypted format. However, the system does have a high confidentiality rating in order to defend against sniffing and man-in-the-middle attacks.No security system should be based on one single security technique. In a networking system or local system it is advised to develop multiple levels of security techniques arranged in a layered boundary of defense. References [1] Yekini N.A., Lawal O.N., (2011). ICT for accountant. Volume 2, Hasfem Publication, Nigeria [2] Rivest, Ronald L(1990). “Cyptology”. In J Van Leeuwen. Handbook of theoretical computer Science. [3] Oludipe, O.,Yekini, N., & Adelokun, P.(2012). Data communication & network, Hasfem Publication Nigeria. [4] Liddell and Scott’s (1984). Greek-English Lexicon. Oxford University Press. www.swiss.ai.mit.edu/ [5] Franksen, O. I. (1985) Mr. Babbage’s Secret: The Tale of a Cipher and APL.Prentice Hall. [6] David, Kahn (1999). “On the Origin of a Species”. The Codebreakers: The Story of Secret Writing. Simon & Schuster. ISBN 0-684-83130-9. [7] CISSP (2001). All-in-One Certification Exam Guide. [8] Martin, Keith M. (2012). Everyday Cryptography. Oxford University Press. P. 142. ISBN 978-0-19- 162588-6. [9] Knudsen, Lars R. (1998). “Block Ciphers— a survey”. In Bart Preneel and Vincent Rijmen. State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptograph Leuven Belgium, June 1997 Revised Lectures. Berlin ; London: Springer. Pp. 29. ISBN 3-540-65474-7. [10]David Wheeler (2008). “Summary of Security Techniques” Purdue University Calumet ITS 454. [11]Beutelspacher, Albrecht (1994). "Chapter 2". Cryptology. translation from German by J. Chris Fisher. Washington, DC: Mathematical Association of America. pp. 27–41. ISBN 0-88385-504 Boran, S. (2000). IT Security Cookbook. [12]Bruen, Aiden A. &Forcinito, Mario A. (2011). Cryptography, Information Theory, and Error- Correction: A Handbook for the 21st Century. John Wiley & Sons. p. 21. ISBN 978-1-118-03138-4