Javascript must be enabled to continue!
ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY
View through CrossRef
The subsequent stage of communication is characterized by the Internet of Things (IoT). Through the implementation of IoT, tangible objects are rendered capable of generating, receiving, and disseminating data via the internet. These physical entities are interconnected and are able to exchange substantial volumes of data with other digital components autonomously, without necessitating human intervention. Presently, one of the critical challenges that threaten the integrity of "Internet of Things" devices pertains to the security and privacy of the information that is gathered and transmitted, which is often intimately associated with the personal lives of the users. Various encryption methodologies are employed to safeguard data from diverse user access. Among these, encryption stands out as one of the most efficacious techniques for the secure transmission of data across communication networks. The process of encryption involves the application of a cipher algorithm to transform readable data (designated as plaintext) into an unintelligible format (referred to as cipher text). The Vigenère cipher represents a method for encrypting alphabetic text utilizing a series of distinct Caesar ciphers, which are determined by the characters of a specified keyword. Numerous encryption algorithms are currently prevalent in computational practices. This particular form of polyalphabetic substitution is considered relatively straightforward. For many generations, the Vigenère cipher was regarded as secure; however, its vulnerabilities were later identified. This paper proposes an innovative encryption method aimed at facilitating secure and safe data communication. The Vigenère cipher has been augmented and modified to incorporate extended ASCII code in lieu of solely relying on ASCII code, in addition to the inclusion of alphabets, numerals, and symbols. Furthermore, a swapping operation has been executed. These enhancements are intended to elevate the algorithm's complexity and attain a heightened level of encryption. Additionally, this modification serves to strengthen the security of the Vigenère cipher.
Quantum Academic Publisher Enterprise
Title: ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY
Description:
The subsequent stage of communication is characterized by the Internet of Things (IoT).
Through the implementation of IoT, tangible objects are rendered capable of generating, receiving, and disseminating data via the internet.
These physical entities are interconnected and are able to exchange substantial volumes of data with other digital components autonomously, without necessitating human intervention.
Presently, one of the critical challenges that threaten the integrity of "Internet of Things" devices pertains to the security and privacy of the information that is gathered and transmitted, which is often intimately associated with the personal lives of the users.
Various encryption methodologies are employed to safeguard data from diverse user access.
Among these, encryption stands out as one of the most efficacious techniques for the secure transmission of data across communication networks.
The process of encryption involves the application of a cipher algorithm to transform readable data (designated as plaintext) into an unintelligible format (referred to as cipher text).
The Vigenère cipher represents a method for encrypting alphabetic text utilizing a series of distinct Caesar ciphers, which are determined by the characters of a specified keyword.
Numerous encryption algorithms are currently prevalent in computational practices.
This particular form of polyalphabetic substitution is considered relatively straightforward.
For many generations, the Vigenère cipher was regarded as secure; however, its vulnerabilities were later identified.
This paper proposes an innovative encryption method aimed at facilitating secure and safe data communication.
The Vigenère cipher has been augmented and modified to incorporate extended ASCII code in lieu of solely relying on ASCII code, in addition to the inclusion of alphabets, numerals, and symbols.
Furthermore, a swapping operation has been executed.
These enhancements are intended to elevate the algorithm's complexity and attain a heightened level of encryption.
Additionally, this modification serves to strengthen the security of the Vigenère cipher.
Related Results
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...
Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms
Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms
The growing reliance on digital communication necessitates robust methods for secure data transmission. Hence this paper proposes a hybrid cryptography system integrating the Vigen...
Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
Introduction Of A Multikey Multiround Chaining Scheme For The Vigenère cipher
This paper introduces the JAM Stream cipher, an improved version of the classical Vigenère cipher, designed to address its known vulnerabilities. The proposed cipher technique inco...
Enhanced DES Algorithm Using Efficient Classical Algorithm
Enhanced DES Algorithm Using Efficient Classical Algorithm
The privacy, confidentiality, and integrity of user information are very important concerns; therefore, cryptography is the solution to keep and satisfy these objectives. Encryptio...
TEKNIK ALGORITMA VINEGERE CHIPER DALAM STEGANOGRAFI DALAM KEAMANAN SISTEM KOMPUTER
TEKNIK ALGORITMA VINEGERE CHIPER DALAM STEGANOGRAFI DALAM KEAMANAN SISTEM KOMPUTER
Steganografi adalah sebuah teknik penyembunyian informasi dalam media yang terlihat biasa-biasa saja. Dalam keamanan sistem komputer, steganografi digunakan untuk menyembunyikan pe...
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, providing a new mathematical measure for encryption efficiency, which we ...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...

