International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us

IJSTR >> Volume 5 - Issue 3, March 2016 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

An Enhanced Vigenere Cipher For Data Security

[Full Text]



Aized Amin Soofi, Irfan Riaz, Umair Rasheed



Encryption; Stream cipher; Vigenere cipher; symmetric encryption



In today’s world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher; it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.



[1] Z.-p. Wang, et al., "Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code," Optics Communications, vol. 332, pp. 36-41, 2014.

[2] S. William and W. Stallings, Cryptography and Network Security, 4/E: Pearson Education India, 2006.

[3] M. Rouse. (2007, Plain text. Available: http://searchsecurity.techtarget.com/definition/plaintext

[4] T. Gunasundari and K. Elangovan, "A Comparative Survey on Symmetric Key Encryption Algorithms," International Journal of Computer Science and Mobile Applications, ISSN, pp. 2321-8363, 2014.

[5] M. Agrawal and P. Mishra, "A comparative survey on symmetric key encryption techniques," International Journal on Computer Science and Engineering (IJCSE), vol. 4, pp. 877-882, 2012.

[6] V. Beal. (2009, Encryption. Available: http://www.webopedia.com/TERM/E/encryption.html

[7] O. P. Verma, et al., "Peformance analysis of data encryption algorithms," in Electronics Computer Technology (ICECT), 2011 3rd International Conference on, 2011, pp. 399-403.

[8] E. Surya and C. Diviya, "A survey on Symmetric Key Encryption Algorithms," International Journal of Computer Science & Communication Networks, vol. 2, pp. 475-477, 2012.

[9] N. Courtois and J. Pieprzyk, "Cryptanalysis of Block Ciphers with Overdefined Systems of Equations," in Advances in Cryptology — ASIACRYPT 2002. vol. 2501, Y. Zheng, Ed., ed: springer Berlin Heidelberg, 2002, pp. 267-287.

[10] R. Wash, "Lecture notes on stream ciphers and RC4," Reserve University, pp. 1-19, 2001.

[11] S. Burman, et al., "LFSR based stream ciphers are vulnerable to power attacks," in Progress in Cryptology–INDOCRYPT 2007, ed: springer, 2007, pp. 384-392.

[12] M. Rouse. (2006, Block Cipher. Available: http://searchsecurity.techtarget.com/definition/block-cipher

[13] G. C. Kessler, "An overview of cryptography," ed: Gary C. Kessler, 2003.

[14] C. Bhardwaj, "Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols," Journal of Computer Engineering (IOSRJCE) ISSN, pp. 2278-0661, 2012.

[15] A. J. Menezes, et al., Handbook of applied cryptography: CRC press, 2010.

[16] C. Sanchez-Avila and R. Sanchez-Reillo, "The Rijndael block cipher (AES proposal): a comparison with DES," in Security Technology, 2001 IEEE 35th International Carnahan Conference on, 2001, pp. 229-234.

[17] P. I. Wilson and M. Garcia, "A Modified Version of the Vigenère Algorithm," IJCSNS, vol. 6, p. 140, 2006.

[18] Q.-A. Kester, "A cryptosystem based on Vigenère cipher with varying key," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, pp. pp: 108-113, 2012.

[19] A. Razzaq, et al., "Strong Key Machanism Generated by LFSR based Vigenère Cipher," presented at the 13 International Arab Conference on Information Technology, 2013.

[20] O. Omolara, et al., "Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication," Computer Engineering and Intelligent Systems, vol. 5, pp. 34-46, 2014.

[21] F. H. S. Fairouz Mushtaq Sher Ali, "Enhancing Security of Vigenere Cipher by Stream Cipher," International Journal of Computer Applications, vol. 100, pp. 1-4, 2014.