Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher

  • Institut Teknologi Adhi Tama Surabaya
  • Institut Teknologi Adhi Tama Surabaya
  • Institut Teknologi Adhi Tama Surabaya
Abstract views: 633 , PDF downloads: 758
Keywords: Monoalphabet cipher, Polyalphabet cipher, Vigenere cipher, Matlab

Abstract

The rapid progression of exchange data by public networks is important, especially in information security. We need to keep our information safe from attackers or intruders. Furthermore, information security becomes needed for us. Many kind cipher methods of cryptography are improved to secure information such as monoalphabetic cipher and polyalphabetic cipher. Cryptography makes readable messages becoming non-readable messages. One of the popular algorithms of a polyalphabetic cipher is Vigenere cipher. Vigenere cipher has been used for a long time, but this algorithm has weaknesses. The calculation of the encryption process is only involving additive cipher, it makes this algorithm vulnerability to attacker based on frequency analysis of the letter. The proposed method of this research is making Vigenere cipher more complex by combining monoalphabetic cipher and Vigenere cipher. One of the monoalphabetic ciphers is Affine cipher. Affine cipher has two steps in the encryption process that are an additive cipher and a multiplicative cipher. Our proposed method has been simulated with Matlab. We also tested the vulnerability of the result of encryption by Vigenere Analyzer and Analysis Monoalphabetic Substitution. It shows that our method overcomes the weakness of Vigenere Cipher. Vigenere cipher and Affine cipher are classical cryptography that has a simple algorithm of cryptography. By combining Vigenere cipher and Affine cipher will make a new method that more complex algorithm.

Downloads

Download data is not yet available.

References

[1] Schneier, B., (1996), Applied Cryptography 2nd, John Wiley&Sons.
[2] Menez, A, J., Oorschot, P. C., Vanstone, S.A. (1996), Handbook of Applied Cryptography, CRC Press.
[3] B. A. Forouzan, “Traditional symmetric-key ciphers,” Cryptography and Network Security,” International Edition, Singapore, McGraw-Hill Press, pp. 55-90, 2008.
[4] D. E. Denning, “Encryption algorithms,” Cryptography and Data Security,” Addison Wesley Publishing Company Inc., U.S.A., pp. 59-125, 1982.
[5] A. M. Aliyu and A. Olaniyan, “Vigenere Cipher : Trends, Review, and Possible Modifications”, International Journal of Computer Application, Vol 135, No. 11, 2016.
[6] T. M. Aung, H.H. Naing, and N. N. Hla, “A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenere-Affine Cipher)”, International Journal of Machine Learning and Computing,Vol.9, No.3, June, 2019.
[7] Emy Setyaningsih, (2015), “Kriptografi dan Implementasinya menggunakan Matlab”, Penerbit Andi, 2015.
[8] N. N. Hla and T. M. Aung. “Implementation of finite field arithmetic operations for large prime and binary fields using Java BigInteger class,” International Journal of Engineering Research and Technology, vol. 6, issue 08, pp. 450-453, August 2017.
[9] R. Marwati and K. Yuliawati, “Cryptanalysis on Classical Cipher based on Indonesian Language”, International Seminar of Mathematics, Science, and Computer Science Education, 2018.
[10] Stallings, W. (2011). Cryptography and Network Security - Principles and Practice. (Fifth edition), Pearson Education, Inc.
Published
2019-11-30
How to Cite
, , & . (2019). Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher. International Journal of Artificial Intelligence & Robotics (IJAIR), 1(1), 26-32. https://doi.org/10.25139/ijair.v1i1.2029