Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher

Siti Agustini, Weny Mistarika Rahmawati, Muchamad Kurniawan

Abstract


The rapid progression of exchange data by public networks is important, especially in information security. We need to keep our information safe from attackers or intruders. Furthermore, information security becomes needed for us. Many kind cipher methods of cryptography are improved to secure information such as monoalphabetic cipher and polyalphabetic cipher. Cryptography makes readable messages becoming non-readable messages. One of the popular algorithms of a polyalphabetic cipher is Vigenere cipher. Vigenere cipher has been used for a long time, but this algorithm has weaknesses. The calculation of the encryption process is only involving additive cipher, it makes this algorithm vulnerability to attacker based on frequency analysis of the letter. The proposed method of this research is making Vigenere cipher more complex by combining monoalphabetic cipher and Vigenere cipher. One of the monoalphabetic ciphers is Affine cipher. Affine cipher has two steps in the encryption process that are an additive cipher and a multiplicative cipher. Our proposed method has been simulated with Matlab. We also tested the vulnerability of the result of encryption by Vigenere Analyzer and Analysis Monoalphabetic Substitution. It shows that our method overcomes the weakness of Vigenere Cipher. Vigenere cipher and Affine cipher are classical cryptography that has a simple algorithm of cryptography. By combining Vigenere cipher and Affine cipher will make a new method that more complex algorithm.


Keywords


Monoalphabet cipher; Polyalphabet cipher; Vigenere cipher; Matlab

Full Text:

PDF

References


Schneier, B., (1996), Applied Cryptography 2nd, John Wiley&Sons.

Menez, A, J., Oorschot, P. C., Vanstone, S.A. (1996), Handbook of Applied Cryptography, CRC Press.

B. A. Forouzan, “Traditional symmetric-key ciphers,” Cryptography and Network Security,” International Edition, Singapore, McGraw-Hill Press, pp. 55-90, 2008.

D. E. Denning, “Encryption algorithms,” Cryptography and Data Security,” Addison Wesley Publishing Company Inc., U.S.A., pp. 59-125, 1982.

A. M. Aliyu and A. Olaniyan, “Vigenere Cipher : Trends, Review, and Possible Modifications”, International Journal of Computer Application, Vol 135, No. 11, 2016.

T. M. Aung, H.H. Naing, and N. N. Hla, “A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenere-Affine Cipher)”, International Journal of Machine Learning and Computing,Vol.9, No.3, June, 2019.

Emy Setyaningsih, (2015), “Kriptografi dan Implementasinya menggunakan Matlab”, Penerbit Andi, 2015.

N. N. Hla and T. M. Aung. “Implementation of finite field arithmetic operations for large prime and binary fields using Java BigInteger class,” International Journal of Engineering Research and Technology, vol. 6, issue 08, pp. 450-453, August 2017.

R. Marwati and K. Yuliawati, “Cryptanalysis on Classical Cipher based on Indonesian Language”, International Seminar of Mathematics, Science, and Computer Science Education, 2018.

Stallings, W. (2011). Cryptography and Network Security - Principles and Practice. (Fifth edition), Pearson Education, Inc.




DOI: http://dx.doi.org/10.25139/ijair.v1i1.2029

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Siti Agustini, Weny Mistarika Rahmawati, Muchamad Kurniawan

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

____________________________________________________________
International Journal of Artificial Intelligence & Robotics (IJAIR)
ISSN 2686-6269 (Online)
Published By Universitas Dr. Soetomo
Managed By Informatics Department, Universitas Dr Soetomo
Address Jl. Semolowaru no 84, Surabaya, 60118, (031) 5944744
Website https://ejournal.unitomo.ac.id/index.php/ijair/index
Email [email protected]

Inform is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.