Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Sazzad Hossain Saju, Sayed Mahmudul Haque, Liakot Hossain Lingcon

Sazzad Hossain Saju, Sayed Mahmudul Haque and Liakot Hossain Lingcon. A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security. International Journal of Computer Applications 183(2):1-8, May 2021. BibTeX

	author = {Sazzad Hossain Saju and Sayed Mahmudul Haque and Liakot Hossain Lingcon},
	title = {A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2021},
	volume = {183},
	number = {2},
	month = {May},
	year = {2021},
	issn = {0975-8887},
	pages = {1-8},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2021921290},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Vigenère cipher is an ancient elementary method that uses a series of Caesar shifting for encrypting plaintext to ciphertext protecting it from adversaries. However, a frequency analysis attack is vulnerable in this type of cipher technique. This paper aims to enhance the security of the Vigenère cipher in a hybrid cryptosystem using a randomized approach including pseudorandom substitution, rearranging, padding, etc. In this approach, a complex key generation algorithm is used that generates a pair of subkeys from an input key. One of the subkeys, Subkey1 is used to generate an intermediate ciphertext. The other key, Subkey2 is used to further scramble the ciphertext. The slightest change in the input symmetric key produces an entirely different key pair. Hence, different encrypted results. It also increases the ranges of characters that Vigenère cipher can encrypt by including all ASCII and extended ASCII. Finally, the symmetric key is encrypted with the public key of RSA solving the key distribution problem of the symmetric cipher. This enhanced and modified Vigenère cipher in the hybrid cryptosystem overcomes all limitations of classical cipher and acts as a bridge between classical and modern cryptography.


  1. William Stalling. 2017. “Cryptography and network security”. (7th ed.). Prentice-Hall. ISBN: 9780134444284
  2. D. Kahn. 1967. “The Codebreakers”. The Story of Secret Writing. New York. Macmillan, 1967. ISBN 0-684-83130-9.
  3. Dr. Vivek Kapoor and Rahul Yadav. 2015. “A Hybrid Cryptography Technique to Support Cyber Security Infrastructure” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11, November 2015, DOI: 10.5120/ijca2016909863.
  4. Agyepong, Enoch & Buchanan, William & Jones, Kevin. (2018). Detection of Algorithmically Generated Malicious Domain. 13-32. 10.5121/csit.2018.80802.
  5. S. S. Omran, A. S. Al-Khalid and D. M. Al-Saady, "A cryptanalytic attack on Vigenère cipher using genetic algorithm," 2011 IEEE Conference on Open Systems, Langkawi, 2011, pp. 59-64, DOI: 10.1109/ICOS.2011.6079312
  6. A. Jain, R. Dedhia and A. Patil. 2015. “Enhancing the security of Caesar cipher substitution method using a randomized approached for more secure communication”, International Journal of Computer Applications, Volume 129, Number 2015, pp. 6-11, DOI: 10.5120/ijca2015907062.
  7. Bhardwaj C. 2012. “Modification of Vigenère cipher by Random Numbers, Punctuations & Mathematical symbols". Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct,2012), PP 35-38, DOI: 10.9790/0661-0423538
  8.  Md. Palash Uddin, Md. Abu Marjan and N.B. Sadia. 2014. "Developing a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function," 2014 International Conference on Informatics, Electronics & Vision (ICIEV), May 2014, Dhaka, Bangladesh. DOI: 10.1109/ICIEV.2014.6850691.
  9. R. K. Singh, T. Begum, L. Borah, and D. Samanta, "Text encryption: Character jumbling," 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2017, pp. 1-3, DOI: 10.1109/ICISC.2017.8068691.
  10. Boneh, Dan. (2002). Twenty Years of Attacks on the RSA Cryptosystem. NOTICES OF THE AMS. 46.


Caesar Cipher, Vigenère Cipher, Encryption, Decryption, Key, Plaintext, Ciphertext, Cryptanalysis, RSA, Security, Symmetric, Asymmetric