A Simple Algebraic Model based Polyalphabetic Substitution Cipher

نویسندگان

  • Sukalyan Som
  • Sabyasachi Ghosh
  • Ijaz Ali Shoukat
  • Kamalrulnizam Abu Bakar
  • Mohsin Iftikhar
  • Saikat Ghosh
چکیده

Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative and feeble characteristics. In this paper we have we have developed a traditional or character oriented Polyalphabetic cipher by using a simple algebraic equation. In this we made use of iteration process and introduced a key K0 obtained by permuting the elements of a given key seed value. This key strengthens the cipher and it does not allow the cipher to be broken by the known plain text attack. The cryptanalysis performed clearly indicates that the cipher is a strong one.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secured Wireless Data Communication

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...

متن کامل

Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers

In this paper the Cryptanalysis of polyalphabetic by applying Genetic algorithm is presented. The applicability of Genetic algorithms for searching the key space of encryption scheme is studied. In Vigenere cipher, guessing the key size is done by applying Genetic Algorithm. The frequency analysis is used as an essential factor in objective function.

متن کامل

Design of an Effective Substitution Cipher Algorithm for Information Security using Fuzzy Logic

The combination of cryptography and fuzzy logic has emerged as a promising component of information security. Acknowledge based model is introduced in the information security. This method includes a substitution cipher known as polyalphabetic cipher. The information that is trying to send is including the text that is alphabets. The existing Substitution cipher known as Vigenere cipher algorit...

متن کامل

Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk

Vigenere cipher is a polyalphabetic substitution cipher with a very large key space. In this paper we have investigated the use of PSO for the cryptanalysis of vigenere cipher and proposed PSO with Markov chain random walk in which some of the worst particles are replaced with new better random particles to enhance the efficiency of PSO algorithm. Based on our experimental results, it is shown ...

متن کامل

IJASCSE Vol 1, Issue 3, 2012

In polyalphabetic substitution the plain text’s letters are enciphered differently according to their position. The name polyalphabetic suggests that there are more than one key so we have used two keys combination instead of just one, in order to produce the cipher text. We can also use three or more keys to make the enciphering process more complicated. In this paper have produced ASCII Codes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012