Professional Documents
Culture Documents
2006 A Cryptosystem Based On Vigenère Cipher With Varying Key
2006 A Cryptosystem Based On Vigenère Cipher With Varying Key
ROT13 system. As with all single alphabet substitution 92 characters case sensitive cipher including digits and some
ciphers, the Caesar cipher is easily broken and in modern other symbols commonly used in the English language and
practice offers essentially no communication security.[10] can be written from a computer keyboard. The alpha-qwerty
The encryption can also be represented using modular cipher also changes the mapping sequence used in the
arithmetic by first transforming the letters into numbers, Vigenère cipher. The mapping takes from a extended
according to the scheme, A = 0, B = 1... Z = 25. [11] alphabet sequence to extended qwerty keyboard sequence.
Encryption of a letter by a shift n can be described To decrypt the code reverse mapping takes place
mathematically as, [12] (compliment of encryption) that is from extended QWERTY
En(x) = (x + n) mod 26 keyboard to extended alphabet sequence. In short this
Decryption is performed similarly, proposed version extends and rearranges the original
Dn (x) = (x - n) mod 26 Vigenère table, therefore making it much more complex than
The Vigenère cipher is a method of encrypting alphabetic the existing one. The greater character set allows more type
text by using a series of different Caesar ciphers based on the of messages to be encrypted like passwords. It also increases
letters of a keyword. It is a simple form of polyalphabetic the key domain and hence provides more security [15].
substitution [8][9]. The Cipher spoils the statistics of a simple The algebraic description of the extended version is similar
Caesar cipher by using multiple Caesar ciphers. The to that of the original cipher. It uses modulo 92 instead of
technique is named for its inventor, Blaise de Vigenère from modulo and cipher text Ci is derived using a sequence
the court of Henry III of France in the sixteenth century, and different from plain text sequence Pi.
was considered unbreakable for some 300 years [13]. Ci = EK(Pi) = ( Pi + Ki ) mod92
Vigenère can also be viewed algebraically. If the letters and decryption D,
A–Z are taken to be the numbers 0–25, and addition is Pi = DK( Ci ) = ( Ci - Ki ) mod92
performed modulo 26, then Vigenère encryption E using the where, P = P0…Pn is the message,
key K can be written, C = C0….Cn is the ciphertext and K = K0.....Km is the
Ci = EK (Mi) = (Mi + Ki) mod {26} used key.
and decryption D using the key K, Friedrich Kasiski was the first to publish a successful
Mi = DK(Ci) = (Ci - Ki) mod {26}, general attack on the Vigenère cipher. Earlier attacks relied
whereas M = M0 … Mn is the message, C = C0 …ts Cn is on knowledge of the plaintext, or use of a recognizable word
the ciphertext and K = K0 … Km is the used key. as a key. Kasiski's method had no such dependencies. He
Thus Given m, a positive integer, P = C = (Z26)n, and K = published an account of the attack, but it's clear that there
(k1, k2… km) a key, we define: were others who were aware of it. Babbage was goaded into
Encryption: breaking the Vigenère cipher when John Hall Brock
ek(p1, p2… pm) = (p1+k1, p2+k2…pm+km) (mod 26) Thwaites submitted a "new" cipher to the Journal of the
Decryption: Society of the Arts. Thwaites challenged Babbage to break
dk(c1, c2… cm) = (c1-k1, c2-k2 … cm- km) (mod 26) his cipher encoded twice, with keys of different length.
Example: Babbage succeeded in decrypting a sample, "The Vision of
Plaintext: C R Y P T O G R A P H Y Sin", by Alfred Tennyson, encrypted according to the
Key: LUCKLUC KLUCK keyword "Emily", the first name of Tennyson's wife. Studies
Ciphertext: N L A Z E I I B L J J Ishould accompany of Babbage's notes reveal that he had used the method later
your final submission. published by Kasiski [11] [16].
III. METHODOLOGY
The new method employs the Vigenère square and key in
its encryption process but the successive keys used will be
dependent on the initial key value during the encryption
process. That is the key varies as it is used in the encryption
process. The first step key will be different from the second
step key but the second step key will be as a result of a
function that operated on the first step and so forth.
The algorithm ultimately makes it possible for encryption
and decryption of the text and also makes the Vigenère
cryptosystem more difficult against frequency attack. This is
as a result of varying keys employed for each encryption
process. A software program was written to demonstrate the
Fig 1 The Vigenère square
effectiveness of the algorithm using java programming
language and cryptanalysis performed on the ciphertext.
A modified form of the Vigenère cipher, the alpha-qwerty
cipher extended the original 26 character Vigenère cipher to a
109
All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 1, Issue 10, December 2012
}
System.out.println(" plain text is "+plainText);
111
All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 1, Issue 10, December 2012
REFERENCES
[1] Kester, Quist- Aphetsi., & Danquah, Paul. (2012). A novel cryptographic
key technique. In Adaptive Science & Technology (ICAST), 2012 IEEE
4th International Conference on (pp. 70-73).
[2] Abraham Sinkov, Elementary Cryptanalysis: A Mathematical Approach,
Mathematical Association of America, 1966. ISBN 0-88385-622-0
[3] Nicolas Courtois, Josef Pieprzyk, "Cryptanalysis of Block Ciphers with
Overdefined Systems of Equations". pp267–287, ASIACRYPT 2002
[4] Delfs, Hans & Knebl, Helmut (2007). "Symmetric-key encryption".
Introduction to cryptography: principles and applications. Springer,
2007
[5] Mullen, Gary & Mummert, Carl. Finite fields and applications. American
Mathematical Society. p. 112. 2007
[6] IEEE 1363: Standard Specifications for Public-Key Cryptography
[7] Kester, Q. A., & Koumadi, K. M. (2012, October). Cryptographie
technique for image encryption based on the RGB pixel displacement. In
Adaptive Science & Technology (ICAST), 2012 IEEE 4th International
Conference on (pp. 74-77). IEEE.
[8] Bruen, Aiden A. & Forcinito, Mario A. (2011). Cryptography,
Information Theory, and Error-Correction: A Handbook for the 21st
Table 3: N-Gram Analysis of B
113
All Rights Reserved © 2012 IJARCET