Javascript must be enabled to continue!
Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key
View through CrossRef
This investigation was conducted to move forward the security of the vigenère cypher calculation by tending to the key conveyance issue and the most key issue within the calculation if cryptoanalysts effectively got it. The working demonstrates employments a 512-bit Electronic Code Book (ECB). The essential key utilized was a 512-bit arbitrary key. The randomized encoding table was also generated by the Blum Blum Shub calculation employing a scrambler key. The RSA calculation was utilized to scramble 512-bits random keys and scrambler keys. It comes about to appear that the proposed calculation does not include a key dissemination issue. With a randomized encoding table, the 512-bits arbitrary key cannot be utilized to unscramble the ciphertext off chance that cryptanalysis did not know the mixed table utilized. The preparing time appeared the proportion of the contrast of the vigenère cypher calculation. The proposed calculation was not as well essentially distinctive, and the longer the message was handled, the proportion of the time distinction possessed was moreover getting closer to one, which implies the distinction was not critical. The coming about ciphertext was too exceptionally secure, where the coming about ciphertext was irregular since the key utilized was random, and there were 3.75 x 10126 keys combination. This algorithm can be an alternative algorithm that is fast, safe, and easy to implement
Institute of Computer Science
Title: Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key
Description:
This investigation was conducted to move forward the security of the vigenère cypher calculation by tending to the key conveyance issue and the most key issue within the calculation if cryptoanalysts effectively got it.
The working demonstrates employments a 512-bit Electronic Code Book (ECB).
The essential key utilized was a 512-bit arbitrary key.
The randomized encoding table was also generated by the Blum Blum Shub calculation employing a scrambler key.
The RSA calculation was utilized to scramble 512-bits random keys and scrambler keys.
It comes about to appear that the proposed calculation does not include a key dissemination issue.
With a randomized encoding table, the 512-bits arbitrary key cannot be utilized to unscramble the ciphertext off chance that cryptanalysis did not know the mixed table utilized.
The preparing time appeared the proportion of the contrast of the vigenère cypher calculation.
The proposed calculation was not as well essentially distinctive, and the longer the message was handled, the proportion of the time distinction possessed was moreover getting closer to one, which implies the distinction was not critical.
The coming about ciphertext was too exceptionally secure, where the coming about ciphertext was irregular since the key utilized was random, and there were 3.
75 x 10126 keys combination.
This algorithm can be an alternative algorithm that is fast, safe, and easy to implement.
Related Results
e0506 Application of overlapped sirolimus-eluting stents in treatment of long coronary arteries lesion
e0506 Application of overlapped sirolimus-eluting stents in treatment of long coronary arteries lesion
Objective
To evaluate the clinical efficacy of overlapped Excel and Cypher stents in treatment for long coronary arteries lesion.
...
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...
Transcriptomics extract the key chromium resistance genes of Cellulomonas
Transcriptomics extract the key chromium resistance genes of Cellulomonas
Abstract
Cellulomonas fimi Clb-11 can reduce high toxic Cr (VI) to low toxic Cr (III). In this study, transcriptomics was used to analyze the key genes, which was involved ...
Teknik Keamanan Data Menggunakan Metode Vigenere Cipher Dan Steganografi Dalam Penyisipan Pesan Teks Pada Citra
Teknik Keamanan Data Menggunakan Metode Vigenere Cipher Dan Steganografi Dalam Penyisipan Pesan Teks Pada Citra
Peningkatan keamanan data telah menjadi prioritas utama dalam berbagai sektor, terutama dalam pertukaran pesan dan informasi yang sensitif. Salah satu metode yang digunakan untuk m...
Simulating Brute Force Attacks on Vigenère and AES Ciphers in Python: Measuring Key Size Impact on Security
Simulating Brute Force Attacks on Vigenère and AES Ciphers in Python: Measuring Key Size Impact on Security
The security of modern digital communications depends heavily on the robustness of cryptographic algorithms against brute force attacks. This study investigates the impact of key s...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Evaluating Binary Encoding Techniques in The Presence of Missing Values in Privacy-Preserving Record Linkage
Evaluating Binary Encoding Techniques in The Presence of Missing Values in Privacy-Preserving Record Linkage
IntroductionApplications in domains ranging from healthcare to national security increasingly require records about individuals in sensitive databases to be linked in privacy-prese...
Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage
Privacy Attack on Multiple Dynamic Match-key based Privacy-Preserving Record Linkage
Introduction
Over the last decade, the demand for linking records about people across databases has increased in various domains. Privacy challenges associated with linking sensit...

