Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms

View through CrossRef
The growing reliance on digital communication necessitates robust methods for secure data transmission. Hence this paper proposes a hybrid cryptography system integrating the Vigenère cipher with modern cryptographic techniques. The system aims to enhance security while maintaining computational efficiency. Functionalities of the system include key generation, encryption, decryption, and cryptographic analysis. The Vigenère cipher serves as the foundation for the system, providing a polyalphabetic substitution method. Additionally, modern cryptographic algorithms such as AES are integrated to strengthen security. Algorithms and methodologies employed include: Vigenère Cipher which utilizes a keyword to shift characters by different amounts, creating a polyalphabetic substitution; AES which Implements symmetric-key encryption with a block cipher, ensuring confidentiality and integrity of data; Cryptographic Analysis which employs statistical analysis and frequency distribution techniques to assess the strength of the encryption and identify potential vulnerabilities etc. By combining classical and modern cryptographic techniques, the hybrid system aims to provide robust security while addressing the limitations of individual methods
Title: Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms
Description:
The growing reliance on digital communication necessitates robust methods for secure data transmission.
Hence this paper proposes a hybrid cryptography system integrating the Vigenère cipher with modern cryptographic techniques.
The system aims to enhance security while maintaining computational efficiency.
Functionalities of the system include key generation, encryption, decryption, and cryptographic analysis.
The Vigenère cipher serves as the foundation for the system, providing a polyalphabetic substitution method.
Additionally, modern cryptographic algorithms such as AES are integrated to strengthen security.
Algorithms and methodologies employed include: Vigenère Cipher which utilizes a keyword to shift characters by different amounts, creating a polyalphabetic substitution; AES which Implements symmetric-key encryption with a block cipher, ensuring confidentiality and integrity of data; Cryptographic Analysis which employs statistical analysis and frequency distribution techniques to assess the strength of the encryption and identify potential vulnerabilities etc.
By combining classical and modern cryptographic techniques, the hybrid system aims to provide robust security while addressing the limitations of individual methods.

Related Results

Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...
ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY
ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY
The subsequent stage of communication is characterized by the Internet of Things (IoT). Through the implementation of IoT, tangible objects are rendered capable of generating, rece...
Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
This paper introduces the JAM Stream cipher, an improved version of the classical Vigenère cipher, designed to address its known vulnerabilities. The proposed cipher technique inco...
TEKNIK ALGORITMA VINEGERE CHIPER DALAM STEGANOGRAFI DALAM KEAMANAN SISTEM KOMPUTER
TEKNIK ALGORITMA VINEGERE CHIPER DALAM STEGANOGRAFI DALAM KEAMANAN SISTEM KOMPUTER
Steganografi adalah sebuah teknik penyembunyian informasi dalam media yang terlihat biasa-biasa saja. Dalam keamanan sistem komputer, steganografi digunakan untuk menyembunyikan pe...
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
Enhanced DES Algorithm Using Efficient Classical Algorithm
Enhanced DES Algorithm Using Efficient Classical Algorithm
The privacy, confidentiality, and integrity of user information are very important concerns; therefore, cryptography is the solution to keep and satisfy these objectives. Encryptio...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we ...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...

Back to Top