Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher
The rapid progression of exchange data by public networks is important, especially in information security. We need to keep our information safe from attackers or intruders. Furthermore, information security becomes needed for us. Many kind cipher methods of cryptography are improved to secure information such as monoalphabetic cipher and polyalphabetic cipher. Cryptography makes readable messages becoming non-readable messages. One of the popular algorithms of a polyalphabetic cipher is Vigenere cipher. Vigenere cipher has been used for a long time, but this algorithm has weaknesses. The calculation of the encryption process is only involving additive cipher, it makes this algorithm vulnerability to attacker based on frequency analysis of the letter. The proposed method of this research is making Vigenere cipher more complex by combining monoalphabetic cipher and Vigenere cipher. One of the monoalphabetic ciphers is Affine cipher. Affine cipher has two steps in the encryption process that are an additive cipher and a multiplicative cipher. Our proposed method has been simulated with Matlab. We also tested the vulnerability of the result of encryption by Vigenere Analyzer and Analysis Monoalphabetic Substitution. It shows that our method overcomes the weakness of Vigenere Cipher. Vigenere cipher and Affine cipher are classical cryptography that has a simple algorithm of cryptography. By combining Vigenere cipher and Affine cipher will make a new method that more complex algorithm.
 Menez, A, J., Oorschot, P. C., Vanstone, S.A. (1996), Handbook of Applied Cryptography, CRC Press.
 B. A. Forouzan, “Traditional symmetric-key ciphers,” Cryptography and Network Security,” International Edition, Singapore, McGraw-Hill Press, pp. 55-90, 2008.
 D. E. Denning, “Encryption algorithms,” Cryptography and Data Security,” Addison Wesley Publishing Company Inc., U.S.A., pp. 59-125, 1982.
 A. M. Aliyu and A. Olaniyan, “Vigenere Cipher : Trends, Review, and Possible Modifications”, International Journal of Computer Application, Vol 135, No. 11, 2016.
 T. M. Aung, H.H. Naing, and N. N. Hla, “A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenere-Affine Cipher)”, International Journal of Machine Learning and Computing,Vol.9, No.3, June, 2019.
 Emy Setyaningsih, (2015), “Kriptografi dan Implementasinya menggunakan Matlab”, Penerbit Andi, 2015.
 N. N. Hla and T. M. Aung. “Implementation of finite field arithmetic operations for large prime and binary fields using Java BigInteger class,” International Journal of Engineering Research and Technology, vol. 6, issue 08, pp. 450-453, August 2017.
 R. Marwati and K. Yuliawati, “Cryptanalysis on Classical Cipher based on Indonesian Language”, International Seminar of Mathematics, Science, and Computer Science Education, 2018.
 Stallings, W. (2011). Cryptography and Network Security - Principles and Practice. (Fifth edition), Pearson Education, Inc.
Copyright (c) 2019 Siti Agustini, Weny Mistarika Rahmawati, Muchamad Kurniawan
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with International Journal of Artificial Intelligence & Robotics (IJAIR) agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.