CFP last date
20 May 2024
Reseach Article

A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security

by Sazzad Hossain Saju, Sayed Mahmudul Haque, Liakot Hossain Lingcon
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 2
Year of Publication: 2021
Authors: Sazzad Hossain Saju, Sayed Mahmudul Haque, Liakot Hossain Lingcon
10.5120/ijca2021921290

Sazzad Hossain Saju, Sayed Mahmudul Haque, Liakot Hossain Lingcon . A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security. International Journal of Computer Applications. 183, 2 ( May 2021), 1-8. DOI=10.5120/ijca2021921290

@article{ 10.5120/ijca2021921290,
author = { Sazzad Hossain Saju, Sayed Mahmudul Haque, Liakot Hossain Lingcon },
title = { A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security },
journal = { International Journal of Computer Applications },
issue_date = { May 2021 },
volume = { 183 },
number = { 2 },
month = { May },
year = { 2021 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number2/31897-2021921290/ },
doi = { 10.5120/ijca2021921290 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:15:39.219109+05:30
%A Sazzad Hossain Saju
%A Sayed Mahmudul Haque
%A Liakot Hossain Lingcon
%T A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 2
%P 1-8
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vigenère cipher is an ancient elementary method that uses a series of Caesar shifting for encrypting plaintext to ciphertext protecting it from adversaries. However, a frequency analysis attack is vulnerable in this type of cipher technique. This paper aims to enhance the security of the Vigenère cipher in a hybrid cryptosystem using a randomized approach including pseudorandom substitution, rearranging, padding, etc. In this approach, a complex key generation algorithm is used that generates a pair of subkeys from an input key. One of the subkeys, Subkey1 is used to generate an intermediate ciphertext. The other key, Subkey2 is used to further scramble the ciphertext. The slightest change in the input symmetric key produces an entirely different key pair. Hence, different encrypted results. It also increases the ranges of characters that Vigenère cipher can encrypt by including all ASCII and extended ASCII. Finally, the symmetric key is encrypted with the public key of RSA solving the key distribution problem of the symmetric cipher. This enhanced and modified Vigenère cipher in the hybrid cryptosystem overcomes all limitations of classical cipher and acts as a bridge between classical and modern cryptography.

References
  1. William Stalling. 2017. “Cryptography and network security”. (7th ed.). Prentice-Hall. ISBN: 9780134444284
  2. D. Kahn. 1967. “The Codebreakers”. The Story of Secret Writing. New York. Macmillan, 1967. ISBN 0-684-83130-9.
  3. Dr. Vivek Kapoor and Rahul Yadav. 2015. “A Hybrid Cryptography Technique to Support Cyber Security Infrastructure” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11, November 2015, DOI: 10.5120/ijca2016909863.
  4. Agyepong, Enoch & Buchanan, William & Jones, Kevin. (2018). Detection of Algorithmically Generated Malicious Domain. 13-32. 10.5121/csit.2018.80802.
  5. S. S. Omran, A. S. Al-Khalid and D. M. Al-Saady, "A cryptanalytic attack on Vigenère cipher using genetic algorithm," 2011 IEEE Conference on Open Systems, Langkawi, 2011, pp. 59-64, DOI: 10.1109/ICOS.2011.6079312
  6. A. Jain, R. Dedhia and A. Patil. 2015. “Enhancing the security of Caesar cipher substitution method using a randomized approached for more secure communication”, International Journal of Computer Applications, Volume 129, Number 2015, pp. 6-11, DOI: 10.5120/ijca2015907062.
  7. Bhardwaj C. 2012. “Modification of Vigenère cipher by Random Numbers, Punctuations & Mathematical symbols". Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct,2012), PP 35-38, DOI: 10.9790/0661-0423538
  8. Md. Palash Uddin, Md. Abu Marjan and N.B. Sadia. 2014. "Developing a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function," 2014 International Conference on Informatics, Electronics & Vision (ICIEV), May 2014, Dhaka, Bangladesh. DOI: 10.1109/ICIEV.2014.6850691.
  9. R. K. Singh, T. Begum, L. Borah, and D. Samanta, "Text encryption: Character jumbling," 2017 International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2017, pp. 1-3, DOI: 10.1109/ICISC.2017.8068691.
  10. Boneh, Dan. (2002). Twenty Years of Attacks on the RSA Cryptosystem. NOTICES OF THE AMS. 46.
Index Terms

Computer Science
Information Sciences

Keywords

Caesar Cipher Vigenère Cipher Encryption Decryption Key Plaintext Ciphertext Cryptanalysis RSA Security Symmetric Asymmetric