SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1936
Cryptosystem Based on Modified Vigenere Cipher using
Encryption Technique
Vittal Kumar Mittal1, Manish Mukhija2
1M.Tech Student, 2Assistant Professor
1,2Department of Computer Science and Engineering,
1,2Modern Institute of Technology & Research Centre, Jahar Khera, Rajasthan, India
How to cite this paper: Vittal Kumar
Mittal | Manish Mukhija "Cryptosystem
Based on Modified Vigenere Cipher using
Encryption Technique" Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019,pp.1936-1939,
https://doi.org/10.31142/ijtsrd27878
Copyright © 2019 by author(s) and
International Journal ofTrend inScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
In this new era of technology securing information in internet has become a
crucial task. To secure such information, encryption plays animportant rolein
information security. In this paper Vigenerecipheris consideredwhichis tobe
most efficient and simplest one. Due to its repeating nature, it is vulnerable to
attacks like Kasiski, known plain text etc., to find the length of encryption key.
To overcome this, this research present a modified algorithm encryption
technique is done by using Vigenere cipher to improve better security against
cryptanalysis.
KEYWORDS: Encryption, Vigenerecipher, Cipherceaser, Decryption, datasecurity
1. INTRODUCTION
With the rapid development of information technology,secrecy and privacyare
the key issues of cryptography. Through cryptography one can prevent an
intruder from understanding the data during communication time. To this,
encryption and related technologies areconsideredas oneofthe mostpowerful
tool to secure data transmission over the communication network like Virtual
Private Network (VPN) [4].
VPN or virtual private network is a network constructed by using public wires
usually the Internet to connect to a private network, such as a company's
internal network to transport the confidential data. These systems usesecurity
mechanisms to ensure that only authorized users can access the network and
that the data cannot be intercepted [5] [4].
So, to secure the information, cryptography is used where
the encryption is the process of transforming plain text
message into scrambled message by using a key and vice
versa for decryption. Encryption techniques are broadly
divided by two types namely, SymmetricandAsymmetric.In
symmetric encryption techniques, same key is used for both
encryption and decryption. In Asymmetric-key encryption
two keys - public and private keys, where the public key is
known to all members while the private key is kept secure
by the user [7]. Thus, the security of encrypted data depends
on the strength of cryptographic algorithm and the secrecy
of the key.
In this paper classical cipher is selectedand implemented for
safer communications. In classical methods, two basic
techniques namely substitution and transposition are used.
In substitution technique, letters of plaintextare replacedby
numbers and symbols. This technique is furtherdividedinto
Monoalphabetic and polyalphabetic cipher. In
monoalphabetic [6] [1], it replaces each letter in the
plaintext with another letter to form the ciphertext. The
main problem with monoalphabetic substitution ciphers is
that they are vulnerable to frequency analysis. However in
polyalphabetic cipher, uses multiple substitution alphabets.
That is a single character in the plaintext is changed to many
characters in the cipher text. So it has the advantage of
hiding the letter frequency. The best known and simplest of
such polyalphabetic cipher algorithm is Vigenere cipher [1].
Vigenere cipher is one of the most popular ciphers in the
past because of its simplicity and resistancetothefrequency
analysis test of letters that can crack simple ciphers like
Caesar cipher. But with the increase in the cryptanalytic
skills, Vigenere cipher is no longer taken as secure cipher
and is not popularly used. The most weak point of Vigenere
cipher is the use of repeated words that causes repetition of
certain patterns in cipher texts at intervals equal to the
length of the keyword used.
This paper is divided into following sections like, Section 2
introduce Vigenere cipher. Section 3 describes a proposed
encryption method for cipher text using modified vigener
cipher. Thus, the key-stream increases the tightness of
security in Vigenere cipher as this makes the deciphering of
the cipher text from the knowledgeofthekeylengthdifficult.
Implementation, generating session key and experimental
results are given in section 4 and conclusions in section 5.
2. RELATED WORK
The Vigenere Cipher is an encryption scheme which was
invented in the 16th century by French Blaise De Vigenere.
The scheme is inspired by the Caesar Cipher in that it uses a
“polyalphabetic substitution matrix” that combines two or
more alphabetic tables. The Vigenere encryption [1] scheme
relies on a keyword as its key along with the polyalphabetic
substitution table to encode and decode a message. For
instance, to encrypt the message using a Vigenère cipher
IJTSRD27878
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1937
table which is in fig1, by using the key will do the following;
first the key is repeated sequentially until the length of the
message and alignedtogether.Thenthe words aretranslated
by locating the rows and columns of each position in the
keyword and plaintext in polyalphabetic substitution table
provided below to get the encrypted ciphertext. The same
key is then used to decrypt the message to reveal the same
message by using the reverse process [8].
Fig1: Vigenere Table
3. Proposed Algorithm
In traditional Vigenere cipher each alphabet has one fixed
numeric value but in our proposed technique we have eight
tables shown in Table 1. In each table every alphabet
represent with different numeric value. In traditional
Vigenere technique the plaintext is consideredas a sequence
of alphabets without any space between them. It may create
a problem for receiver to read the message by inserting
spaces between words and receiver needs to guess theexact
place to insert space in decrypted plaintext. In proposed
technique we eliminate this problem by introducing
different numeric value for space in each table. The
encryption and decryption process by proposed approachis
given below:
Formula for encryption by proposed method is:
Ci = Pi + Ki (mod m)
In proposed approach we have length of alphabet 27, so
value m will be 27.
3.1 Encryption
1. The steps for encryption process are: If the length ofkey
is smaller than the length of plain text then key will be
repetitive until it becomes equal to the length of plain
text.
2. Numeric value of first plain text character and key
character will be added according to table 1.
3. Modulo 27 of the resultant value from abovestepwill be
calculated. The character correspond to the calculated
modulo value will be first cipher text character.
4. Numeric value of second plain text character and key
character will be added according to row 2.
5. Modulo 27 of the resultant value from abovestepwill be
calculated. The character correspond to the calculated
modulo value will be second cipher character.
6. The process explained in above steps will remain
continue till eighth table. After that next plain character
i.e character 9 of plain text andkey will undergothrough
same process by using value from table 1 and so on.
Mathematically we can express encryption process by
proposed algorithm as:
C1 = P1 + K1 (mod 27) [T1]
C2 = P2 + K2 (mod 27) [T2]
C8 = P8 + K8 (mod 27) [T8]
C9 = P9 + K9 (mod 27) [T1]
C16 = P16 + K16 (mod 27) [T8]
C17 = P17 + K17 (mod 27) [T1]
Where, T in abovemathematical relationrepresentstableno.
3.2 Decryption
Decryption process of proposed approach works the same
way as encryption does but in reverse direction.Formula for
decryption by proposed method is:
Pi = Ci - Ki (mod m)
The steps for decryption process are:
1. Numeric value of first cipher text character and key
character will be subtracted according to table 1
2. Modulo 27 of the resultant value from abovestepwill be
calculated. The character correspond to the calculated
modulo value will be first plain text character.
3. The process explained in above steps will remain
continue till eighth table. After that next cipher
character i.e character 9 of cipher text and key will
undergo through same process byusingvaluefromtable
1 and so on.
Mathematically we can express decryption process by
proposed algorithm as:
P1 = C1-K1 (mod 27) [T1]
P2 = C2-K2 (mod 27) [T2]
P8 = C8-K8 (mod 27) [T8]
P9 = C9-K9 (mod 27) [T1]
P16= C16- K16 (mod 27) [T8]
P17= C17- K17 (mod 27) [T1]
TABLE 1 PROPOSED TECHNIQUE TABLE
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1938
4. Result and Analysis
Encryption Time Graph
Decryption Time Graph
The modified cipher encryption method is considered to be
secure to brute force attack, frequency attack, statistical
attack and known cipher text attack, etc. Also this method is
simple, robust and can encrypt /decrypt confidential data
without losing any key (computational/operational) in
seconds and does not suffer from any mathematical
complexities.
5. CONCLUSION
Vigenere cipher regard as simplestandweakestmethod that
mean it is very easy to detect by intruder. To overcome the
limitations of this method, the proposed multilevel
encryption scheme is used. Hence, the proposed algorithm
becomes difficult to cryptanalyst. At the same time, the
computational complexity is much lesser than most modern
ciphers, making it a fit choice for light weight applications
where resources are limited.
REFERENCES
[1] Stjepan Picek, Annelie Heuser, and Sylvain Guilley
“Template attack vs bayes classifier. Technical”,report,
Cryptology ePrint Archive, Report 2017/531, 2017.
[2] Sengupta N, Holmes J, “Designing of cryptography
based security system for cloud computing”,
International conference on cloud and ubiquitous
computing and emerging technologies (CUBE), IEEE-
2017.
[3] Al-Ahwal, A. and Farid, S., “The effect of varying key
length on a Vigenère cipher”, IOSR J. Comput. Eng., 17,
2, pp. 2278–661, 2017.
[4] T. Gunasundari and K. Elangovan, "A Comparative
Survey on Symmetric Key Encryption Algorithms",
International Journal of Computer Science and Mobile
Applications, ISSN, pp. 2321-8363, 2014.
[5] S. Garg, S. Khera, and A. Aggarwal, “Extended Vigenere
cipher with stream cipher. Int. J. Eng. Sci. Comput., 6, 5,
5176–5180 in 2016.
[6] Polyalphabetic CipherTechniques UsedForEncryption
Purpose,
http://www.ijarcsse.com/docs/papers/Volume_3/2_F
ebruary2013/V3 I2-0122.pdf.
[7] Security Analysis and Modification of Classical
Encryption Scheme by Maya Mohan, M. K. Kavitha Devi
and V. Jeevan Prakash, I JST, Vol 8(S8), 542–548, April
2015.
[8] Security Models and Proof Strategies for Plaintext
Aware Encryption.Journal of Cryptology by Birkett J,
Dent AW.. 2014; 27(1):99–120.
[9] The security implementation of IPSec VPN [M] by
CarIton R.Davis.
[10] http://www.webopedia.com/TERM/V/VPN.html
[11] Enhancing Security of Vigenere Cipher by Stream
Cipher International Journal of Computer Applications
by Fairouz Mushtaq Sher Ali, Falah Hassan Sarhan
(0975 – 8887).
[12] Gerhana, Y. A., Insanudin, E., Syarifudin, U., and Zulmi,
M. R. “Design of digital image application using
vigenere cipher algorithm”, 4th Int. Conf. Cyber IT
Serv.Manag. CITSM 1–5, 2016.
[13] C. Bhardwaj, "Modification of Vigenère Cipher by
Random Numbers, Punctuations & Mathematical
Symbols”, Journal of Computer Engineering (IOSRJCE)
ISSN, pp. 2278-0661, 2012.
[14] Quist-Aphetsi Kester,”AHybrid CryptosystemBasedon
Vigenere Cipher and Columnar Transposition Cipher”,
International Journal of Advanced Technology and
Engineering Research (IJATER) Vol. 3 Issue 1 pp141-
147. July 2013.
[15] M. Khalid, N. Wadhwa, and V. Malhotra, “Alpha-qwerty
cipher,” International Journal of Advanced Computing,
vol. 3, no 3, pp 107-118, May 2012.
[16] Q. A. Kester, “A hybrid cryptosystem basedonVigenère
cipher and columnar transposition cipher”,
International Journal of Advanced Technology and
Engineering Research, vol. 3, no. 1, pp. 141-147, Jan.
2017.
[17] Cryptology: From Caesar Ciphers to Public-Key
Cryptosystems by Luciano, Dennis; Gordon Prichett
(January 1987).. The College Mathematics Journal 18
(1): 2–17. Doi: 10.2307/2686311. JSTOR 2686311.
[18] http://en.wikipedia.org/wiki/Caesar_cipher Caesar
cipher. Retrieved from
[19] A Study of Encryption Algorithms (RSA, DES, 3DES and
AES) for Information Security International Journal of
Computer Applications by Gurpreet Singh, Supriya,
(0975 – 8887).
[20] Luciano, Dennis; Gordon Prichett (January 1987).
"Cryptology: From Caesar Ciphers to Public-Key
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1939
Cryptosystems". The College Mathematics Journal 18
(1): 2–17. doi:10.2307/2686311. JSTOR 2686311.
[21] A cryptosystem based on Vigenère cipher with varying
key, by Q.- Kester, International Journal of Advanced
Research in Computer Engineering & Technology
(IJARCET), vol. 1, pp. pp: 108-113, 2012.
[22] Developing a Modified Hybrid Caesar Cipher and
Vigenere Cipher for Secure Data Communication, by O.
Omolara, et al.,Computer Engineering and Intelligent
Systems, vol. 5, pp. 34-46, 2014.
[23] Enhancing Security of Vigenere Cipher by Stream
Cipher, by F. H. S. Fairouz Mushtaq Sher Ali,
International Journal of Computer Applications,
vol.100, pp. 1-4, 2014.
[24] Handbook of applied cryptography, by A.Menezes,
P.van Oorschot, S. Vanstone, CRC Press, Inc., 1997.
[25] HMAC: Keyed-Hashing for Message Authentication, by
H. Krawczyk, M. Bellare, and R. Canetti, Internet
Engineering Task Force, Request for Comments (RFC)
2104, February 1997.

More Related Content

What's hot

Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
IAEME Publication
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
Ashish Gupta
 

What's hot (18)

Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
The evaluation performance of letter-based technique on text steganography sy...
The evaluation performance of letter-based technique on text steganography sy...The evaluation performance of letter-based technique on text steganography sy...
The evaluation performance of letter-based technique on text steganography sy...
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Enhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving EncryptionEnhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving Encryption
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
Advance Cipher Technique to Secure Email Contents
Advance Cipher Technique to Secure Email ContentsAdvance Cipher Technique to Secure Email Contents
Advance Cipher Technique to Secure Email Contents
 
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsSymmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
15 82-87
15 82-8715 82-87
15 82-87
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches A Comparative Result Analysis of Text Based Steganographic Approaches
A Comparative Result Analysis of Text Based Steganographic Approaches
 

Similar to Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique

Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 

Similar to Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique (20)

Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsSymmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
SMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad CipherSMS Encryption Using One-Time Pad Cipher
SMS Encryption Using One-Time Pad Cipher
 
D010321824
D010321824D010321824
D010321824
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
D018141922
D018141922D018141922
D018141922
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES an...
IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES an...IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES an...
IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES an...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 

Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1936 Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique Vittal Kumar Mittal1, Manish Mukhija2 1M.Tech Student, 2Assistant Professor 1,2Department of Computer Science and Engineering, 1,2Modern Institute of Technology & Research Centre, Jahar Khera, Rajasthan, India How to cite this paper: Vittal Kumar Mittal | Manish Mukhija "Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019,pp.1936-1939, https://doi.org/10.31142/ijtsrd27878 Copyright © 2019 by author(s) and International Journal ofTrend inScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT In this new era of technology securing information in internet has become a crucial task. To secure such information, encryption plays animportant rolein information security. In this paper Vigenerecipheris consideredwhichis tobe most efficient and simplest one. Due to its repeating nature, it is vulnerable to attacks like Kasiski, known plain text etc., to find the length of encryption key. To overcome this, this research present a modified algorithm encryption technique is done by using Vigenere cipher to improve better security against cryptanalysis. KEYWORDS: Encryption, Vigenerecipher, Cipherceaser, Decryption, datasecurity 1. INTRODUCTION With the rapid development of information technology,secrecy and privacyare the key issues of cryptography. Through cryptography one can prevent an intruder from understanding the data during communication time. To this, encryption and related technologies areconsideredas oneofthe mostpowerful tool to secure data transmission over the communication network like Virtual Private Network (VPN) [4]. VPN or virtual private network is a network constructed by using public wires usually the Internet to connect to a private network, such as a company's internal network to transport the confidential data. These systems usesecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted [5] [4]. So, to secure the information, cryptography is used where the encryption is the process of transforming plain text message into scrambled message by using a key and vice versa for decryption. Encryption techniques are broadly divided by two types namely, SymmetricandAsymmetric.In symmetric encryption techniques, same key is used for both encryption and decryption. In Asymmetric-key encryption two keys - public and private keys, where the public key is known to all members while the private key is kept secure by the user [7]. Thus, the security of encrypted data depends on the strength of cryptographic algorithm and the secrecy of the key. In this paper classical cipher is selectedand implemented for safer communications. In classical methods, two basic techniques namely substitution and transposition are used. In substitution technique, letters of plaintextare replacedby numbers and symbols. This technique is furtherdividedinto Monoalphabetic and polyalphabetic cipher. In monoalphabetic [6] [1], it replaces each letter in the plaintext with another letter to form the ciphertext. The main problem with monoalphabetic substitution ciphers is that they are vulnerable to frequency analysis. However in polyalphabetic cipher, uses multiple substitution alphabets. That is a single character in the plaintext is changed to many characters in the cipher text. So it has the advantage of hiding the letter frequency. The best known and simplest of such polyalphabetic cipher algorithm is Vigenere cipher [1]. Vigenere cipher is one of the most popular ciphers in the past because of its simplicity and resistancetothefrequency analysis test of letters that can crack simple ciphers like Caesar cipher. But with the increase in the cryptanalytic skills, Vigenere cipher is no longer taken as secure cipher and is not popularly used. The most weak point of Vigenere cipher is the use of repeated words that causes repetition of certain patterns in cipher texts at intervals equal to the length of the keyword used. This paper is divided into following sections like, Section 2 introduce Vigenere cipher. Section 3 describes a proposed encryption method for cipher text using modified vigener cipher. Thus, the key-stream increases the tightness of security in Vigenere cipher as this makes the deciphering of the cipher text from the knowledgeofthekeylengthdifficult. Implementation, generating session key and experimental results are given in section 4 and conclusions in section 5. 2. RELATED WORK The Vigenere Cipher is an encryption scheme which was invented in the 16th century by French Blaise De Vigenere. The scheme is inspired by the Caesar Cipher in that it uses a “polyalphabetic substitution matrix” that combines two or more alphabetic tables. The Vigenere encryption [1] scheme relies on a keyword as its key along with the polyalphabetic substitution table to encode and decode a message. For instance, to encrypt the message using a Vigenère cipher IJTSRD27878
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1937 table which is in fig1, by using the key will do the following; first the key is repeated sequentially until the length of the message and alignedtogether.Thenthe words aretranslated by locating the rows and columns of each position in the keyword and plaintext in polyalphabetic substitution table provided below to get the encrypted ciphertext. The same key is then used to decrypt the message to reveal the same message by using the reverse process [8]. Fig1: Vigenere Table 3. Proposed Algorithm In traditional Vigenere cipher each alphabet has one fixed numeric value but in our proposed technique we have eight tables shown in Table 1. In each table every alphabet represent with different numeric value. In traditional Vigenere technique the plaintext is consideredas a sequence of alphabets without any space between them. It may create a problem for receiver to read the message by inserting spaces between words and receiver needs to guess theexact place to insert space in decrypted plaintext. In proposed technique we eliminate this problem by introducing different numeric value for space in each table. The encryption and decryption process by proposed approachis given below: Formula for encryption by proposed method is: Ci = Pi + Ki (mod m) In proposed approach we have length of alphabet 27, so value m will be 27. 3.1 Encryption 1. The steps for encryption process are: If the length ofkey is smaller than the length of plain text then key will be repetitive until it becomes equal to the length of plain text. 2. Numeric value of first plain text character and key character will be added according to table 1. 3. Modulo 27 of the resultant value from abovestepwill be calculated. The character correspond to the calculated modulo value will be first cipher text character. 4. Numeric value of second plain text character and key character will be added according to row 2. 5. Modulo 27 of the resultant value from abovestepwill be calculated. The character correspond to the calculated modulo value will be second cipher character. 6. The process explained in above steps will remain continue till eighth table. After that next plain character i.e character 9 of plain text andkey will undergothrough same process by using value from table 1 and so on. Mathematically we can express encryption process by proposed algorithm as: C1 = P1 + K1 (mod 27) [T1] C2 = P2 + K2 (mod 27) [T2] C8 = P8 + K8 (mod 27) [T8] C9 = P9 + K9 (mod 27) [T1] C16 = P16 + K16 (mod 27) [T8] C17 = P17 + K17 (mod 27) [T1] Where, T in abovemathematical relationrepresentstableno. 3.2 Decryption Decryption process of proposed approach works the same way as encryption does but in reverse direction.Formula for decryption by proposed method is: Pi = Ci - Ki (mod m) The steps for decryption process are: 1. Numeric value of first cipher text character and key character will be subtracted according to table 1 2. Modulo 27 of the resultant value from abovestepwill be calculated. The character correspond to the calculated modulo value will be first plain text character. 3. The process explained in above steps will remain continue till eighth table. After that next cipher character i.e character 9 of cipher text and key will undergo through same process byusingvaluefromtable 1 and so on. Mathematically we can express decryption process by proposed algorithm as: P1 = C1-K1 (mod 27) [T1] P2 = C2-K2 (mod 27) [T2] P8 = C8-K8 (mod 27) [T8] P9 = C9-K9 (mod 27) [T1] P16= C16- K16 (mod 27) [T8] P17= C17- K17 (mod 27) [T1] TABLE 1 PROPOSED TECHNIQUE TABLE
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1938 4. Result and Analysis Encryption Time Graph Decryption Time Graph The modified cipher encryption method is considered to be secure to brute force attack, frequency attack, statistical attack and known cipher text attack, etc. Also this method is simple, robust and can encrypt /decrypt confidential data without losing any key (computational/operational) in seconds and does not suffer from any mathematical complexities. 5. CONCLUSION Vigenere cipher regard as simplestandweakestmethod that mean it is very easy to detect by intruder. To overcome the limitations of this method, the proposed multilevel encryption scheme is used. Hence, the proposed algorithm becomes difficult to cryptanalyst. At the same time, the computational complexity is much lesser than most modern ciphers, making it a fit choice for light weight applications where resources are limited. REFERENCES [1] Stjepan Picek, Annelie Heuser, and Sylvain Guilley “Template attack vs bayes classifier. Technical”,report, Cryptology ePrint Archive, Report 2017/531, 2017. [2] Sengupta N, Holmes J, “Designing of cryptography based security system for cloud computing”, International conference on cloud and ubiquitous computing and emerging technologies (CUBE), IEEE- 2017. [3] Al-Ahwal, A. and Farid, S., “The effect of varying key length on a Vigenère cipher”, IOSR J. Comput. Eng., 17, 2, pp. 2278–661, 2017. [4] T. Gunasundari and K. Elangovan, "A Comparative Survey on Symmetric Key Encryption Algorithms", International Journal of Computer Science and Mobile Applications, ISSN, pp. 2321-8363, 2014. [5] S. Garg, S. Khera, and A. Aggarwal, “Extended Vigenere cipher with stream cipher. Int. J. Eng. Sci. Comput., 6, 5, 5176–5180 in 2016. [6] Polyalphabetic CipherTechniques UsedForEncryption Purpose, http://www.ijarcsse.com/docs/papers/Volume_3/2_F ebruary2013/V3 I2-0122.pdf. [7] Security Analysis and Modification of Classical Encryption Scheme by Maya Mohan, M. K. Kavitha Devi and V. Jeevan Prakash, I JST, Vol 8(S8), 542–548, April 2015. [8] Security Models and Proof Strategies for Plaintext Aware Encryption.Journal of Cryptology by Birkett J, Dent AW.. 2014; 27(1):99–120. [9] The security implementation of IPSec VPN [M] by CarIton R.Davis. [10] http://www.webopedia.com/TERM/V/VPN.html [11] Enhancing Security of Vigenere Cipher by Stream Cipher International Journal of Computer Applications by Fairouz Mushtaq Sher Ali, Falah Hassan Sarhan (0975 – 8887). [12] Gerhana, Y. A., Insanudin, E., Syarifudin, U., and Zulmi, M. R. “Design of digital image application using vigenere cipher algorithm”, 4th Int. Conf. Cyber IT Serv.Manag. CITSM 1–5, 2016. [13] C. Bhardwaj, "Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols”, Journal of Computer Engineering (IOSRJCE) ISSN, pp. 2278-0661, 2012. [14] Quist-Aphetsi Kester,”AHybrid CryptosystemBasedon Vigenere Cipher and Columnar Transposition Cipher”, International Journal of Advanced Technology and Engineering Research (IJATER) Vol. 3 Issue 1 pp141- 147. July 2013. [15] M. Khalid, N. Wadhwa, and V. Malhotra, “Alpha-qwerty cipher,” International Journal of Advanced Computing, vol. 3, no 3, pp 107-118, May 2012. [16] Q. A. Kester, “A hybrid cryptosystem basedonVigenère cipher and columnar transposition cipher”, International Journal of Advanced Technology and Engineering Research, vol. 3, no. 1, pp. 141-147, Jan. 2017. [17] Cryptology: From Caesar Ciphers to Public-Key Cryptosystems by Luciano, Dennis; Gordon Prichett (January 1987).. The College Mathematics Journal 18 (1): 2–17. Doi: 10.2307/2686311. JSTOR 2686311. [18] http://en.wikipedia.org/wiki/Caesar_cipher Caesar cipher. Retrieved from [19] A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security International Journal of Computer Applications by Gurpreet Singh, Supriya, (0975 – 8887). [20] Luciano, Dennis; Gordon Prichett (January 1987). "Cryptology: From Caesar Ciphers to Public-Key
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27878 | Volume – 3 | Issue – 5 | July - August 2019 Page 1939 Cryptosystems". The College Mathematics Journal 18 (1): 2–17. doi:10.2307/2686311. JSTOR 2686311. [21] A cryptosystem based on Vigenère cipher with varying key, by Q.- Kester, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, pp. pp: 108-113, 2012. [22] Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication, by O. Omolara, et al.,Computer Engineering and Intelligent Systems, vol. 5, pp. 34-46, 2014. [23] Enhancing Security of Vigenere Cipher by Stream Cipher, by F. H. S. Fairouz Mushtaq Sher Ali, International Journal of Computer Applications, vol.100, pp. 1-4, 2014. [24] Handbook of applied cryptography, by A.Menezes, P.van Oorschot, S. Vanstone, CRC Press, Inc., 1997. [25] HMAC: Keyed-Hashing for Message Authentication, by H. Krawczyk, M. Bellare, and R. Canetti, Internet Engineering Task Force, Request for Comments (RFC) 2104, February 1997.