Enhancing Security of Vigenere Cipher by Stream Cipher
نویسندگان
چکیده
منابع مشابه
Generalization of Vigenere Cipher
A generalized way of Vigenere cipher is proposed. Instead of using a Vigenere square for encryption and decryption, any two reversible square matrices whose rows or columns are unique are used for encryption and decryption purpose. One matrix can be easily obtained from the other and hence any one of them can be used for encryption while the other can be derived from the other for decryption. T...
متن کاملAn Improvement of RC4 Cipher Using Vigenere Cipher
This paper develops a new algorithm to improve the security of RC4. Given that RC4 cipher is widely used in the wireless communication and has some weaknesses in the security of RC4 cipher, our idea is based on the combination of the RC4 and the poly alphabetic cipher Vigenère to give a new and more secure algorithm which we called VRC4. In this technique the plain text is encrypted using the c...
متن کاملFurther improving security of Vector Stream Cipher
Vector Stream Cipher (VSC) is a stream cipher which consists of permutation polynomial over a ring of modulo 2w . The algorithm for generating stream keys is very simple and the encryption speed is very fast. Some theoretical attacks for VSC have been reported so far since the invention of VSC in 2004. Then, the authors proposed some improvements and developed “Vector Stream Cipher 2.0 (VSC 2.0...
متن کاملSecurity Evaluation of Rakaposhi Stream Cipher
Rakaposhi is a synchronous stream cipher, which uses three main components a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF ). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV ). NLF takes 8-bit inputs and returns a single outp...
متن کاملOn the Security of Stream Cipher CryptMT
CryptMT v3 is a stream cipher submitted to eStream project, and has entered the third evaluation phase. Any attack has not been found until now. In this paper, we mainly discuss the security of the state initialization process of CryptMT v3. For the key and IV setup function fK , we can construct a probabilistic testing algorithm A fK with a distinguishing probability 1, which indicates that fo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/17486-7998