CFP last date
22 April 2024
Reseach Article

Enhancing Security of Vigenere Cipher by Stream Cipher

by Fairouz Mushtaq Sher Ali, Falah Hassan Sarhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 1
Year of Publication: 2014
Authors: Fairouz Mushtaq Sher Ali, Falah Hassan Sarhan
10.5120/17486-7998

Fairouz Mushtaq Sher Ali, Falah Hassan Sarhan . Enhancing Security of Vigenere Cipher by Stream Cipher. International Journal of Computer Applications. 100, 1 ( August 2014), 1-4. DOI=10.5120/17486-7998

@article{ 10.5120/17486-7998,
author = { Fairouz Mushtaq Sher Ali, Falah Hassan Sarhan },
title = { Enhancing Security of Vigenere Cipher by Stream Cipher },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 1 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number1/17486-7998/ },
doi = { 10.5120/17486-7998 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:46.461474+05:30
%A Fairouz Mushtaq Sher Ali
%A Falah Hassan Sarhan
%T Enhancing Security of Vigenere Cipher by Stream Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 1
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is a science of converting clear message into secret message "nonreadable message", where message was encrypted at sender side then decrypted at receiver side. Vigenere is an example of substitution cipher, it has various limitations, in this paper we propose an advanced encryption algorithm which improves the security of Vigenere method by combining it with modern cipher method like Stream cipher, Stream cipher relatively regards as unbreakable method, and it uses binary form (instead of characters) where the Plaintext, Ciphertext and the Key are strings of bits. When applying the proposed algorithm, we see that the mentioned above combination cipher has a high degree of security, where cipher based on just Vigenere method is not secure. Also, the proposed algorithm makes the cryptanalysis, using frequency attack, more difficult.

References
  1. Stalling W. "Network Security Essentials (Applications and Standards)", Pearson Education, 2004.
  2. Menezes A. J. , Oorschot P. C. and Vanstone S. A. handbook of applied cryptography, CRC Press, 1996.
  3. Paar C. and Pelzl J. 2010, Understanding Cryptography, Springer-Verlag Berlin Heidelberg.
  4. Phaneendra H. D. and Srikantaswamy S. G. "A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques", International Journal of Computer Applications,2011, Vol. 29, No. 8, pp 34-36.
  5. Saroha V. and Dhull S. " Enhancing Security of One Time Pad Cipher by Double Columnar Transposition Method", International Journal of Advanced Research in Computer Science and Software Engineering, 2013, Vol. 3, Issue 3, pp 692-694.
  6. Saeed F. and Rashid M. "Integrating Classical Encryption with Modern Technique", IJCSNS International Journal of Computer 280 Science and Network Security, 2010, Vol. 10, No. 5, pp 280-285.
  7. http://www. simonsingh. net/The_BlackChamber/crac- king_ to`ol.
  8. http://www. simonsingh. net/The_Black_Chamber/vig-enere_cipher. html.
  9. Albrecht Beutelspacher: "Cryptology: an introduction to the art and science of enciphering".
  10. http://illuminations. nctm. org/LessonDetail. aspx?ID=L6- 18.
  11. http://www. counton. org/explorer/codebreaking/vigenere-cipher. php.
  12. Singh A. , Nandal A. and Malik S. "Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security", International Journal of Advanced Research in Computer Science and Software Engineering, 2012, Vol. 2, Issue 12.
  13. Mishra A. "ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS", International Journal of Research in Engineering and Technology, 2013, Vol. 02 Issue 09.
Index Terms

Computer Science
Information Sciences

Keywords

Plaintext Ciphertext Key Cipher Substitution Vigenere Stream cipher