Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Enhancing Security of Vigenere Cipher by Stream Cipher

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 100 - Number 1
Year of Publication: 2014
Authors:
Fairouz Mushtaq Sher Ali
Falah Hassan Sarhan
10.5120/17486-7998

Fairouz Mushtaq Sher Ali and Falah Hassan Sarhan. Article: Enhancing Security of Vigenere Cipher by Stream Cipher. International Journal of Computer Applications 100(1):1-4, August 2014. Full text available. BibTeX

@article{key:article,
	author = {Fairouz Mushtaq Sher Ali and Falah Hassan Sarhan},
	title = {Article: Enhancing Security of Vigenere Cipher by Stream Cipher},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {100},
	number = {1},
	pages = {1-4},
	month = {August},
	note = {Full text available}
}

Abstract

Cryptography is a science of converting clear message into secret message "nonreadable message", where message was encrypted at sender side then decrypted at receiver side. Vigenere is an example of substitution cipher, it has various limitations, in this paper we propose an advanced encryption algorithm which improves the security of Vigenere method by combining it with modern cipher method like Stream cipher, Stream cipher relatively regards as unbreakable method, and it uses binary form (instead of characters) where the Plaintext, Ciphertext and the Key are strings of bits. When applying the proposed algorithm, we see that the mentioned above combination cipher has a high degree of security, where cipher based on just Vigenere method is not secure. Also, the proposed algorithm makes the cryptanalysis, using frequency attack, more difficult.

References

  • Stalling W. "Network Security Essentials (Applications and Standards)", Pearson Education, 2004.
  • Menezes A. J. , Oorschot P. C. and Vanstone S. A. handbook of applied cryptography, CRC Press, 1996.
  • Paar C. and Pelzl J. 2010, Understanding Cryptography, Springer-Verlag Berlin Heidelberg.
  • Phaneendra H. D. and Srikantaswamy S. G. "A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques", International Journal of Computer Applications,2011, Vol. 29, No. 8, pp 34-36.
  • Saroha V. and Dhull S. " Enhancing Security of One Time Pad Cipher by Double Columnar Transposition Method", International Journal of Advanced Research in Computer Science and Software Engineering, 2013, Vol. 3, Issue 3, pp 692-694.
  • Saeed F. and Rashid M. "Integrating Classical Encryption with Modern Technique", IJCSNS International Journal of Computer 280 Science and Network Security, 2010, Vol. 10, No. 5, pp 280-285.
  • http://www. simonsingh. net/The_BlackChamber/crac- king_ to`ol.
  • http://www. simonsingh. net/The_Black_Chamber/vig-enere_cipher. html.
  • Albrecht Beutelspacher: "Cryptology: an introduction to the art and science of enciphering".
  • http://illuminations. nctm. org/LessonDetail. aspx?ID=L6- 18.
  • http://www. counton. org/explorer/codebreaking/vigenere-cipher. php.
  • Singh A. , Nandal A. and Malik S. "Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security", International Journal of Advanced Research in Computer Science and Software Engineering, 2012, Vol. 2, Issue 12.
  • Mishra A. "ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS", International Journal of Research in Engineering and Technology, 2013, Vol. 02 Issue 09.