Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher

View through CrossRef
This paper introduces the JAM Stream cipher, an improved version of the classical Vigenère cipher, designed to address its known vulnerabilities. The proposed cipher technique incorporates a multi-key, multi-round, and chaining scheme to significantly enhance security. By leveraging these techniques, the JAM Stream cipher creates a strong Avalanche effect, ensuring substantial changes in ciphertext for minimal alterations in plaintext or keys. Experimental results confirm the cipher's resilience against differential attacks and brute-force methods, demonstrating a marked improvement over traditional algorithms, namely the Vigenère cipher and DES. However, the JAM Stream cipher faces computational complexity challenges for real-time and high-performance applications. To facilitate further research and practical implementation, the source code is available at https://github.com/alberttuwan1/JAM_Stream_Cipher. Future research will explore optimization strategies to balance security and efficiency, paving the way for broader adoption in secure communication systems.
Title: Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
Description:
This paper introduces the JAM Stream cipher, an improved version of the classical Vigenère cipher, designed to address its known vulnerabilities.
The proposed cipher technique incorporates a multi-key, multi-round, and chaining scheme to significantly enhance security.
By leveraging these techniques, the JAM Stream cipher creates a strong Avalanche effect, ensuring substantial changes in ciphertext for minimal alterations in plaintext or keys.
Experimental results confirm the cipher's resilience against differential attacks and brute-force methods, demonstrating a marked improvement over traditional algorithms, namely the Vigenère cipher and DES.
However, the JAM Stream cipher faces computational complexity challenges for real-time and high-performance applications.
To facilitate further research and practical implementation, the source code is available at https://github.
com/alberttuwan1/JAM_Stream_Cipher.
Future research will explore optimization strategies to balance security and efficiency, paving the way for broader adoption in secure communication systems.

Related Results

Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...
ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY
ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY
The subsequent stage of communication is characterized by the Internet of Things (IoT). Through the implementation of IoT, tangible objects are rendered capable of generating, rece...
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
TEKNIK ALGORITMA VINEGERE CHIPER DALAM STEGANOGRAFI DALAM KEAMANAN SISTEM KOMPUTER
TEKNIK ALGORITMA VINEGERE CHIPER DALAM STEGANOGRAFI DALAM KEAMANAN SISTEM KOMPUTER
Steganografi adalah sebuah teknik penyembunyian informasi dalam media yang terlihat biasa-biasa saja. Dalam keamanan sistem komputer, steganografi digunakan untuk menyembunyikan pe...
Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms
Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms
The growing reliance on digital communication necessitates robust methods for secure data transmission. Hence this paper proposes a hybrid cryptography system integrating the Vigen...
Aplikasi Tanda Tangan Digital Berbasis Mobile Menggunakan Metode Vigenere Chiper
Aplikasi Tanda Tangan Digital Berbasis Mobile Menggunakan Metode Vigenere Chiper
Tanda tangan elektronik atau digital adalah tanda tangan konvensional yang cara pembuatannya serta fungsinya serupa dengan tanda tangan pada dokumen kertas umumnya. Penelitian ini ...
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Image encryption become more significant since most of our data are communicated and stored as digital image form. To warrant high confidentiality, cipher image must be the produce...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...

Back to Top