CFP last date
22 April 2024
Reseach Article

Improving Security of Vigenere Cipher by Double Columnar Transposition

by Nishith Sinha, Kishore Bhamidipati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 14
Year of Publication: 2014
Authors: Nishith Sinha, Kishore Bhamidipati
10.5120/17591-8290

Nishith Sinha, Kishore Bhamidipati . Improving Security of Vigenere Cipher by Double Columnar Transposition. International Journal of Computer Applications. 100, 14 ( August 2014), 6-10. DOI=10.5120/17591-8290

@article{ 10.5120/17591-8290,
author = { Nishith Sinha, Kishore Bhamidipati },
title = { Improving Security of Vigenere Cipher by Double Columnar Transposition },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 14 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume100/number14/17591-8290/ },
doi = { 10.5120/17591-8290 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:29:56.305878+05:30
%A Nishith Sinha
%A Kishore Bhamidipati
%T Improving Security of Vigenere Cipher by Double Columnar Transposition
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 14
%P 6-10
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Protecting data from malicious attacks during storage and transmission is the reason for using encryption. Encryption can be achieved by two methods – Transposition and Substitution. Transposition refers to changing the order of characters in a given text. On the other hand, substitution is the process of replacing each character of the plaintext with some other character. Using a combination of transposition and substitution for encryption leads to greater security when compared to using either of them separately. Vigenère Cipher is a poly-alphabetic cipher. It is based on the substitution technique which uses multiple substitution alphabets. In this paper, we introduce double columnar transposition on Vigenère Cipher to enhance its security making cryptanalysis difficult.

References
  1. Atul Kahate (2009), Cryptography and Network Security, 2nd Edition, McGraw-Hill.
  2. Overview of Cryptograhy-http://www. garykessler. net/library/crypto. html.
  3. William Stallings: "Cryptography and Network Security: Principles and Practices" 4th Edition,
  4. Martin, Keith M. (2012). Everyday Cryptography. Oxford University Press. p. 142. ISBN 978-0-19-162588-6.
  5. Cryptanalysis of Vigenère Cipher-http://www. nku. edu/~christensen/section%2012%20vigenere%20cryptanalysis. pdf
  6. Abdul Razaq ,Yasir Mahmod, Faroq Ahmed, Ali Hur : Strong Key Machanism Generated by LFSR based Vigenère Cipher – 13th International Arab Conference on Information Technology (December 2012)
  7. Yumnam Kirani Singh :Generalization of Vigenère Cipher - ARPN Journal of Engineering and Applied Sciences (January 2012)
  8. Alpha-Qwerty Cipher: An Extended Vigenère Cipher-Advanced Computing, An International Journal, Vol. 3, No. 3, May 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Transposition Substitution Poly-Alphabetic Cipher Double Columnar Transposition