Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

Enhancing Security of Vignere Cipher using Modified RC4

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Ashish Shah

Ashish Shah. Article: Enhancing Security of Vignere Cipher using Modified RC4. International Journal of Computer Applications 136(5):38-41, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Ashish Shah},
	title = {Article: Enhancing Security of Vignere Cipher using Modified RC4},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {136},
	number = {5},
	pages = {38-41},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


Encryption is a way to enhance the security of a message or file by scrambling the contents so that it can be read only by someone who has the right encryption key to unscramble it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. RC4 is one of the most popular encryption algorithms and finds its applications in many security protocols such as Wi-Fi Protocol Access (WPA) and Wired Equivalence Privacy (WEP). Although being a versatile encryption technique, RC4 faces numerous loopholes and weaknesses. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking. It uses three secret keys- two secret keys K1 and K2 as seeds for Enhanced RC4 and K3 as the key for Vigenère Cipher substitution. It also uses two S-Boxes S1 and S2. Both of them contain N elements from 0 to N-1. Although being a versatile encryption algorithm, Vigenère Cipher is not resistant to the Kasiski Attack. Through Cryptanalysis, one can determine the frequency of each letter and find a pattern in the Cipher text as well as the length of the key. In this paper, we propose an enhancement to the RC4 algorithm by converting it into a product cipher. Then we attempt encryption combining the 2 encryption techniques, Modified RC4 and Vigenere in a systematic manner.


  1. Atul Kahate (2009), Cryptography and Network Security,2nd Edition, McGraw-Hill.
  2. OverviewofCryptography
  3. William Stallings: “Cryptography and Network Security: Principles and Practices” 4th Edition,
  4. Martin, Keith M. (2012). Everyday Cryptography. Oxford University Press. p. 142. ISBN 978-0-19- 162588-6.
  5. CryptanalysisofVigenèreCipher
  6. Abdul Razaq ,Yasir Mahmod, Faroq Ahmed, Ali Hur : Strong Key Machanism Generated by LFSR based
  7. Vigenère Cipher – 13th International Arab Conference on Information Technology (December 2012)
  8. Yumnam Kirani Singh :Generalization of Vigenère CipherARPN Journal of Engineering and Applied Sciences (January 2012)
  9. Alpha-Qwerty Cipher: An Extended Vigenère Cipher- Advanced Computing, An International Journal, Vol. 3, No. 3, May 2012.
  10. Cryptography Based E-Commerce Security: A Review Shazia Yasin,Khalid Haseeb,Rashid Jalal Qureshi


Keywords are your own designated keywords which can be used for easy location of the manuscript using any search engines.