SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 35-38
www.iosrjournals.org
www.iosrjournals.org 35 | Page
Modification of Vigenère Cipher by Random Numbers,
Punctuations & Mathematical Symbols
C. R. S. Bhardwaj
Abstract: This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly
into the plaintext using the convention that A = 0, B = 1, . . . , Z = 25; and addition is carried out modulo 26—
that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the
range [0, . . . , 25], that is, [A, . . . , Z]. Mathematicians write this as: C = P + K mod 26 .For modification of
Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters.
Random generated numbers may be used to spread the encrypted message.
Keywords: Vigenère cipher, numbers, punctuations, mathematical symbols security, pseudorandom generator.
I. Introduction
The success of E-commerce and m-commerce transactions depends on how transactions are carried
out in the most secured manner. The prime requirements for any e-commerce and m-commerce transactions are
Privacy, Authentication, Integrity maintenance and Non-Repudiation. Cryptography helps us in achieving these
prime requirements. Today, various cryptographic algorithms have been developed. These are broadly classified
as symmetric key (DES, TDES, Blowfish, CAST, IDEA, RC4, RC6, AES) and asymmetric key (RSA, ECC)
algorithms. This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly
into the plaintext using the convention that A = 0, B = 1, .. . , Z = 25; and addition is carried out modulo 26—
that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the
range [0, . . . , 25], that is, [A, . . . , Z]. Mathematicians write this as: C = P + K mod 26 .For modification of
Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters.
Random generated numbers may be used to spread the encrypted message. both encryption and decryption
process are carried out using a single key. These algorithms are efficient, are secure, execute at high speeds, and
consume less computer resources of memory and processor time.
II. Literature Review
1. Symmetric-Key Encryption Techniques
In any symmetric-key encryption technique, both encryption and decryption process are carried out
using a single key. These algorithms are efficient, are secure, execute at high speeds, and consume less
computer resources of memory and processor time. However, symmetric key cryptographic techniques suffer
from the disadvantages of Key distribution problem, Key management problem and inability to digitally sign a
message. (Schneier [6], Stallings [7]).
Despite these drawbacks, numerous secure symmetric key encryption algorithms such as DES, TDES, Blowfish,
CAST, IDEA, RC4, and RC6 have been developed. In recent times, National Institute of Standards (NIST)
selected Rijndael algorithm as the Advanced Encryption
2. Asymmetric Key Encryption Techniques
The problems associated with symmetric-key cryptographic techniques were solved when asymmetric
encryption mechanism was implemented. Here, instead of a single key, every person has a pair of keys. One
key, called the public key is known to everyone and the other one, the private key is known only to the owner.
There is a mathematical relationship between both these keys. Thus, if any message ‗m‘ is encrypted using any
of the key, it can be decrypted by the other portion. Various asymmetric encryption algorithms (RSA, Elgamal)
have been implemented. Details on the working of asymmetric encryption techniques can be had from Schneier
[6], Stallings [7]. Asymmetric encryption algorithms are broadly divided into three families:
1. Algorithms based on the integer factorization Problem (e.g. RSA)
2. Algorithms based on the discrete logarithm problem
III. Materials, Method & Procedure
Modification of Vigenère Cipher
The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar
ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.
Modification Of Vigenère Cipher By Random Numbers, Punctuations & Mathematical Symbols
www.iosrjournals.org 36 | Page
In a Caesar cipher, each letter of the alphabet is shifted along some number of places; for example, in a
Caesar cipher of shift 3, A would become D, B would become E, Y would become B and so on. The Vigenère
cipher consists of several Caesar ciphers in sequence with different shift values.
To encrypt, a table of alphabets can be used, termed a tabula recta, Vigenère square, or Vigenère table.
It consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left
compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At different points in the
encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each point
depends on a repeating keyword. For example, suppose that the plaintext to be encrypted is:
ATTACKATDAWN
The person sending the message chooses a keyword and repeats it until it matches the length of the
plaintext, for example, the keyword "LEMON":
LEMONLEMONLE
Each row starts with a key letter. The remainder of the row holds the letters A to Z (in shifted order).
Although there are 26 key rows shown, you will only use as many keys (different alphabets) as there are unique
letters in the key string, here just 5 keys, {L, E, M, O, N}. For successive letters of the message, we are going to
take successive letters of the key string, and encipher each message letter using its corresponding key row.
Choose the next letter of the key, go along that row to find the column heading that matches the message
character; the letter at the intersection of [key-row, msg-col] is the enciphered letter.
For example, the first letter of the plaintext, A, is paired with L, the first letter of the key. So use row L
and column A of the Vigenère square, namely L. Similarly, for the second letter of the plaintext, the second
letter of the key is used; the letter at row E and column T is X. The rest of the plaintext is enciphered in a similar
fashion:
Plaintext: ATTACKATDAWN
Key: LEMONLEMONLE
Ciphertext: LXFOPVEFRNHR
Decryption is performed by going to the row in the table corresponding to the key, finding the position
of the ciphertext letter in this row, and then using the column's label as the plaintext. For example, in row L
(from LEMON), the ciphertext L appears in column A, which is the first plaintext letter. Next we go to row E
(from LEMON), locate the ciphertext X which is found in column T, thus T is the second plaintext letter.
Vigenère can also be viewed algebraically. If the letters A–Z are taken to be the numbers 0–25, and addition is
performed modulo 26, then Vigenère encryption using the key can be written, and decryption using the key
.This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly into the
plaintext using the convention that A = 0, B = 1, . . . , Z = 25; and addition is carried out modulo 26—that is, if
the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the range [0,.,
25], that is, [A, . . . Z]. Mathematicians write this as: C = P + K mod 26.
.For modification of Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in
place of characters to make it more difficult for brute force attack. If random numbers are used for key and to
spread the spectrum then only trained persons can identify the message. Comparision of both (Vigenère cipher
and modification of Vigenère cipher) is given in the following diagram. I proposed two modifications in
Vigenère cipher.
1. Random generated numbers may be used in place of alphabets for encryption key.
2. Random generated numbers may be used to spread the encrypted message.
3. Both encryption and decryption process are carried out using a single key. These algorithms are efficient,
are secure, execute at high speeds, and consume less computer resources of memory and processor time.
Face diagrams for both encryption and decryptions are shown which clearly indicates that modified
encrypted program is very difficult to any kind of brute force attack.
Figure: - Face diagram of Vigenère cipher algorithm
Modification Of Vigenère Cipher By Random Numbers, Punctuations & Mathematical Symbols
www.iosrjournals.org 37 | Page
Figure: - face diagram of modification of Vigenère cipher algorithm
Implementation
#include <stdio.h>
#define SHR_LENGTH 4
#define COMPUTATION 1
Implementation means install the software to the destination and make it to work there. Implementation
is an ongoing process and can be achieved by one of the following methods:
1. The implementation of this paper is carried out in language ―c‖ because of the following advantages.
2. C is a building block for many other currently known languages.
3. C is a compiled language versus an interpreted language.
4. A lot of libraries are written in C.
5. The main advantages of C language are that there is not much vocabulary to learn, and that the programmer
can arrange for the program is very fast.
6. C has features that allow the programmer to organize programs in a clear, easy, logical way.
7. C is a portable language.
IV. Result and Discussion
1. Asymmetric Encryption is 100-1000 times slower than symmetric algorithms (RSA v. DES). Message can
be transmitted faster than asymmetric Key.
2. Symmetric keys are subject to a brute force attack where all keys in the key space are tried systematically to
break the encryption. As we are using Customized PN Generator Hybrid cryptography, there is no chance to
pick up the actual signals during the transmission by the intruders.
3. Customized PN Generator Hybrid Cryptography is the better solution which ensures secrecy at terminal
ends and during the transmission of the text.
4. Customized PN Generator Hybrid Cryptography is very important during the wars where each message has
its own value. It is also important in business transactions.
5. Customized PN Generator Hybrid Cryptography ensures user authentication, bandwidth sharing, and
security from eavesdropping and immunity to interference, and difficulty in detection, data encryption and
key management.
Limitations
1. Using Customized PN Generator hybrid Cryptography can be a complex process and its concept is often
difficult for some people to grasp.
2. Both parties must be able to use Customized PN Generator Hybrid Cryptography. It is impossible to use it
unless people at both ends of the connection are capable of using this.
V. Conclusion
This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly
into the plaintext using the convention that A = 0, B = 1, . . . , Z = 25; and addition is carried out modulo 26—
that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the
range [0, . . . , 25], that is, [A, . . . , Z]. Mathematicians write this as: C = P + K mod 26 .For modification of
Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters.
Modification Of Vigenère Cipher By Random Numbers, Punctuations & Mathematical Symbols
www.iosrjournals.org 38 | Page
Modification of Vigenère cipher is more immune to any type of outsider attack. Random generated number
increase the difficulty to decipher the message. Both encryption and decryption process are carried out using a
single key. These algorithms are efficient, are secure, execute at high speeds, and consume less computer
resources of memory and processor time.
VI. Acknowledgement
I would like to thank Prof. R.K Pandey for his guidance and help. His constant inspiration and timely
suggestions helped me in collection all the information I needed for my thesis without much difficulty. Finally, I
am highly obliged to all my family members for their support and blessings.
References
[1] Overview of Cryptography by Alfred J. Menezes
[2] M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. Cryptography—G. Julius Caesar
[3] M. Abdalla, M. Bellare, and P. Rogaway.
[4] S. S. Al-Riyami and K. G. Paterson.
[5] Schneier, Bruce (1995-10- 9). Applied Cryptography. New York: 11.
[6] Schneier B.Applied Cryptography. John Wiley & Sons Inc., New York, New York, USA, 2nd
edition, 1996.
[7] Stallings W. Cryptography and Network Security. Prentice Hall, Upper Saddle

Weitere ähnliche Inhalte

Was ist angesagt?

Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programmingShaishavShah8
 
Intermediate code generation
Intermediate code generationIntermediate code generation
Intermediate code generationRamchandraRegmi
 
Code generator
Code generatorCode generator
Code generatorTech_MX
 
COM1407: Variables and Data Types
COM1407: Variables and Data Types COM1407: Variables and Data Types
COM1407: Variables and Data Types Hemantha Kulathilake
 
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix CodeError Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix Codeiosrjce
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesDom Mike
 
Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C ProgrammingQazi Shahzad Ali
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding09lavee
 
Intermediate code generation1
Intermediate code generation1Intermediate code generation1
Intermediate code generation1Shashwat Shriparv
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generationIffat Anjum
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 

Was ist angesagt? (18)

Source coding
Source coding Source coding
Source coding
 
Classical cyphers python programming
Classical cyphers python programmingClassical cyphers python programming
Classical cyphers python programming
 
Intermediate code generation
Intermediate code generationIntermediate code generation
Intermediate code generation
 
Code generator
Code generatorCode generator
Code generator
 
COM1407: Variables and Data Types
COM1407: Variables and Data Types COM1407: Variables and Data Types
COM1407: Variables and Data Types
 
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix CodeError Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
 
Lec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniquesLec7 8 9_10 coding techniques
Lec7 8 9_10 coding techniques
 
Operators in C Programming
Operators in C ProgrammingOperators in C Programming
Operators in C Programming
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Arithmetic coding
Arithmetic codingArithmetic coding
Arithmetic coding
 
Intermediate code generation1
Intermediate code generation1Intermediate code generation1
Intermediate code generation1
 
Slides
SlidesSlides
Slides
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
 
Intermediate code generation
Intermediate code generationIntermediate code generation
Intermediate code generation
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Ch09
Ch09Ch09
Ch09
 

Andere mochten auch

Flash chromatography guided fractionation and antibacterial activity studies ...
Flash chromatography guided fractionation and antibacterial activity studies ...Flash chromatography guided fractionation and antibacterial activity studies ...
Flash chromatography guided fractionation and antibacterial activity studies ...IOSR Journals
 
Qualitative Chemistry Education: The Role of the Teacher
Qualitative Chemistry Education: The Role of the TeacherQualitative Chemistry Education: The Role of the Teacher
Qualitative Chemistry Education: The Role of the TeacherIOSR Journals
 
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...IOSR Journals
 
Parallel Hardware Implementation of Convolution using Vedic Mathematics
Parallel Hardware Implementation of Convolution using Vedic MathematicsParallel Hardware Implementation of Convolution using Vedic Mathematics
Parallel Hardware Implementation of Convolution using Vedic MathematicsIOSR Journals
 

Andere mochten auch (20)

I0945056
I0945056I0945056
I0945056
 
E012644143
E012644143E012644143
E012644143
 
K013166871
K013166871K013166871
K013166871
 
L012648389
L012648389L012648389
L012648389
 
K012658997
K012658997K012658997
K012658997
 
A1303050107
A1303050107A1303050107
A1303050107
 
L1302037480
L1302037480L1302037480
L1302037480
 
Flash chromatography guided fractionation and antibacterial activity studies ...
Flash chromatography guided fractionation and antibacterial activity studies ...Flash chromatography guided fractionation and antibacterial activity studies ...
Flash chromatography guided fractionation and antibacterial activity studies ...
 
M0947679
M0947679M0947679
M0947679
 
G012663743
G012663743G012663743
G012663743
 
Qualitative Chemistry Education: The Role of the Teacher
Qualitative Chemistry Education: The Role of the TeacherQualitative Chemistry Education: The Role of the Teacher
Qualitative Chemistry Education: The Role of the Teacher
 
I012636670
I012636670I012636670
I012636670
 
C013151420
C013151420C013151420
C013151420
 
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
 
C018141418
C018141418C018141418
C018141418
 
Parallel Hardware Implementation of Convolution using Vedic Mathematics
Parallel Hardware Implementation of Convolution using Vedic MathematicsParallel Hardware Implementation of Convolution using Vedic Mathematics
Parallel Hardware Implementation of Convolution using Vedic Mathematics
 
F1803013034
F1803013034F1803013034
F1803013034
 
C1802050815
C1802050815C1802050815
C1802050815
 
D010512129
D010512129D010512129
D010512129
 
E017322833
E017322833E017322833
E017322833
 

Ähnlich wie G0423538

M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Editor IJARCET
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMAM Publications
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxGauriBornare1
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
 
Building blocks 2
Building blocks 2Building blocks 2
Building blocks 2NAZIRGUJJAR
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmeSAT Journals
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05ijmsr
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...SrideviM4
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Saif Kassim
 
11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...Alexander Decker
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
C452023.pdf
C452023.pdfC452023.pdf
C452023.pdfaijbm
 
Coding theory.pdf
Coding theory.pdfCoding theory.pdf
Coding theory.pdf230231060
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyCSCJournals
 

Ähnlich wie G0423538 (20)

M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327Ijarcet vol-2-issue-7-2323-2327
Ijarcet vol-2-issue-7-2323-2327
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
 
substitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptxsubstitution and transposition techniques_ppt.pptx
substitution and transposition techniques_ppt.pptx
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher AlgorithmA New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
 
Building blocks 2
Building blocks 2Building blocks 2
Building blocks 2
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
Network Security-UNIT -II(Classical Encription) -Sridevi.M-II-M.Sc.,Computer ...
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...11.the novel lossless text compression technique using ambigram logic and huf...
11.the novel lossless text compression technique using ambigram logic and huf...
 
C programming part4
C programming part4C programming part4
C programming part4
 
C programming part4
C programming part4C programming part4
C programming part4
 
F010243136
F010243136F010243136
F010243136
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
C452023.pdf
C452023.pdfC452023.pdf
C452023.pdf
 
Coding theory.pdf
Coding theory.pdfCoding theory.pdf
Coding theory.pdf
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

G0423538

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 35-38 www.iosrjournals.org www.iosrjournals.org 35 | Page Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols C. R. S. Bhardwaj Abstract: This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly into the plaintext using the convention that A = 0, B = 1, . . . , Z = 25; and addition is carried out modulo 26— that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the range [0, . . . , 25], that is, [A, . . . , Z]. Mathematicians write this as: C = P + K mod 26 .For modification of Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters. Random generated numbers may be used to spread the encrypted message. Keywords: Vigenère cipher, numbers, punctuations, mathematical symbols security, pseudorandom generator. I. Introduction The success of E-commerce and m-commerce transactions depends on how transactions are carried out in the most secured manner. The prime requirements for any e-commerce and m-commerce transactions are Privacy, Authentication, Integrity maintenance and Non-Repudiation. Cryptography helps us in achieving these prime requirements. Today, various cryptographic algorithms have been developed. These are broadly classified as symmetric key (DES, TDES, Blowfish, CAST, IDEA, RC4, RC6, AES) and asymmetric key (RSA, ECC) algorithms. This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly into the plaintext using the convention that A = 0, B = 1, .. . , Z = 25; and addition is carried out modulo 26— that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the range [0, . . . , 25], that is, [A, . . . , Z]. Mathematicians write this as: C = P + K mod 26 .For modification of Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters. Random generated numbers may be used to spread the encrypted message. both encryption and decryption process are carried out using a single key. These algorithms are efficient, are secure, execute at high speeds, and consume less computer resources of memory and processor time. II. Literature Review 1. Symmetric-Key Encryption Techniques In any symmetric-key encryption technique, both encryption and decryption process are carried out using a single key. These algorithms are efficient, are secure, execute at high speeds, and consume less computer resources of memory and processor time. However, symmetric key cryptographic techniques suffer from the disadvantages of Key distribution problem, Key management problem and inability to digitally sign a message. (Schneier [6], Stallings [7]). Despite these drawbacks, numerous secure symmetric key encryption algorithms such as DES, TDES, Blowfish, CAST, IDEA, RC4, and RC6 have been developed. In recent times, National Institute of Standards (NIST) selected Rijndael algorithm as the Advanced Encryption 2. Asymmetric Key Encryption Techniques The problems associated with symmetric-key cryptographic techniques were solved when asymmetric encryption mechanism was implemented. Here, instead of a single key, every person has a pair of keys. One key, called the public key is known to everyone and the other one, the private key is known only to the owner. There is a mathematical relationship between both these keys. Thus, if any message ‗m‘ is encrypted using any of the key, it can be decrypted by the other portion. Various asymmetric encryption algorithms (RSA, Elgamal) have been implemented. Details on the working of asymmetric encryption techniques can be had from Schneier [6], Stallings [7]. Asymmetric encryption algorithms are broadly divided into three families: 1. Algorithms based on the integer factorization Problem (e.g. RSA) 2. Algorithms based on the discrete logarithm problem III. Materials, Method & Procedure Modification of Vigenère Cipher The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.
  • 2. Modification Of Vigenère Cipher By Random Numbers, Punctuations & Mathematical Symbols www.iosrjournals.org 36 | Page In a Caesar cipher, each letter of the alphabet is shifted along some number of places; for example, in a Caesar cipher of shift 3, A would become D, B would become E, Y would become B and so on. The Vigenère cipher consists of several Caesar ciphers in sequence with different shift values. To encrypt, a table of alphabets can be used, termed a tabula recta, Vigenère square, or Vigenère table. It consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each point depends on a repeating keyword. For example, suppose that the plaintext to be encrypted is: ATTACKATDAWN The person sending the message chooses a keyword and repeats it until it matches the length of the plaintext, for example, the keyword "LEMON": LEMONLEMONLE Each row starts with a key letter. The remainder of the row holds the letters A to Z (in shifted order). Although there are 26 key rows shown, you will only use as many keys (different alphabets) as there are unique letters in the key string, here just 5 keys, {L, E, M, O, N}. For successive letters of the message, we are going to take successive letters of the key string, and encipher each message letter using its corresponding key row. Choose the next letter of the key, go along that row to find the column heading that matches the message character; the letter at the intersection of [key-row, msg-col] is the enciphered letter. For example, the first letter of the plaintext, A, is paired with L, the first letter of the key. So use row L and column A of the Vigenère square, namely L. Similarly, for the second letter of the plaintext, the second letter of the key is used; the letter at row E and column T is X. The rest of the plaintext is enciphered in a similar fashion: Plaintext: ATTACKATDAWN Key: LEMONLEMONLE Ciphertext: LXFOPVEFRNHR Decryption is performed by going to the row in the table corresponding to the key, finding the position of the ciphertext letter in this row, and then using the column's label as the plaintext. For example, in row L (from LEMON), the ciphertext L appears in column A, which is the first plaintext letter. Next we go to row E (from LEMON), locate the ciphertext X which is found in column T, thus T is the second plaintext letter. Vigenère can also be viewed algebraically. If the letters A–Z are taken to be the numbers 0–25, and addition is performed modulo 26, then Vigenère encryption using the key can be written, and decryption using the key .This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly into the plaintext using the convention that A = 0, B = 1, . . . , Z = 25; and addition is carried out modulo 26—that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the range [0,., 25], that is, [A, . . . Z]. Mathematicians write this as: C = P + K mod 26. .For modification of Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters to make it more difficult for brute force attack. If random numbers are used for key and to spread the spectrum then only trained persons can identify the message. Comparision of both (Vigenère cipher and modification of Vigenère cipher) is given in the following diagram. I proposed two modifications in Vigenère cipher. 1. Random generated numbers may be used in place of alphabets for encryption key. 2. Random generated numbers may be used to spread the encrypted message. 3. Both encryption and decryption process are carried out using a single key. These algorithms are efficient, are secure, execute at high speeds, and consume less computer resources of memory and processor time. Face diagrams for both encryption and decryptions are shown which clearly indicates that modified encrypted program is very difficult to any kind of brute force attack. Figure: - Face diagram of Vigenère cipher algorithm
  • 3. Modification Of Vigenère Cipher By Random Numbers, Punctuations & Mathematical Symbols www.iosrjournals.org 37 | Page Figure: - face diagram of modification of Vigenère cipher algorithm Implementation #include <stdio.h> #define SHR_LENGTH 4 #define COMPUTATION 1 Implementation means install the software to the destination and make it to work there. Implementation is an ongoing process and can be achieved by one of the following methods: 1. The implementation of this paper is carried out in language ―c‖ because of the following advantages. 2. C is a building block for many other currently known languages. 3. C is a compiled language versus an interpreted language. 4. A lot of libraries are written in C. 5. The main advantages of C language are that there is not much vocabulary to learn, and that the programmer can arrange for the program is very fast. 6. C has features that allow the programmer to organize programs in a clear, easy, logical way. 7. C is a portable language. IV. Result and Discussion 1. Asymmetric Encryption is 100-1000 times slower than symmetric algorithms (RSA v. DES). Message can be transmitted faster than asymmetric Key. 2. Symmetric keys are subject to a brute force attack where all keys in the key space are tried systematically to break the encryption. As we are using Customized PN Generator Hybrid cryptography, there is no chance to pick up the actual signals during the transmission by the intruders. 3. Customized PN Generator Hybrid Cryptography is the better solution which ensures secrecy at terminal ends and during the transmission of the text. 4. Customized PN Generator Hybrid Cryptography is very important during the wars where each message has its own value. It is also important in business transactions. 5. Customized PN Generator Hybrid Cryptography ensures user authentication, bandwidth sharing, and security from eavesdropping and immunity to interference, and difficulty in detection, data encryption and key management. Limitations 1. Using Customized PN Generator hybrid Cryptography can be a complex process and its concept is often difficult for some people to grasp. 2. Both parties must be able to use Customized PN Generator Hybrid Cryptography. It is impossible to use it unless people at both ends of the connection are capable of using this. V. Conclusion This dissertation discusses modification of Vigenère cipher which works by adding a key repeatedly into the plaintext using the convention that A = 0, B = 1, . . . , Z = 25; and addition is carried out modulo 26— that is, if the result is greater than 25, we subtract as many multiples of 26 as are needed to bring us into the range [0, . . . , 25], that is, [A, . . . , Z]. Mathematicians write this as: C = P + K mod 26 .For modification of Vigenère cipher, numbers, punctuations, mathematical symbols may be used for key in place of characters.
  • 4. Modification Of Vigenère Cipher By Random Numbers, Punctuations & Mathematical Symbols www.iosrjournals.org 38 | Page Modification of Vigenère cipher is more immune to any type of outsider attack. Random generated number increase the difficulty to decipher the message. Both encryption and decryption process are carried out using a single key. These algorithms are efficient, are secure, execute at high speeds, and consume less computer resources of memory and processor time. VI. Acknowledgement I would like to thank Prof. R.K Pandey for his guidance and help. His constant inspiration and timely suggestions helped me in collection all the information I needed for my thesis without much difficulty. Finally, I am highly obliged to all my family members for their support and blessings. References [1] Overview of Cryptography by Alfred J. Menezes [2] M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis. Cryptography—G. Julius Caesar [3] M. Abdalla, M. Bellare, and P. Rogaway. [4] S. S. Al-Riyami and K. G. Paterson. [5] Schneier, Bruce (1995-10- 9). Applied Cryptography. New York: 11. [6] Schneier B.Applied Cryptography. John Wiley & Sons Inc., New York, New York, USA, 2nd edition, 1996. [7] Stallings W. Cryptography and Network Security. Prentice Hall, Upper Saddle