(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-5 Issue-43 June-2018
Full-Text PDF
Paper Title : An efficient algorithm for polyalphabetic substitution using random tables
Author Name : Ranju S Kartha and Varghese Paul
Abstract :

There are many cryptographic techniques available for providing a secure communication. Encryption technique can be classified according to their encrypting process. They are substitution cipher and transposition cipher. Polyalphabetic cipher is based on substitution technique- the plaintext letters are encrypted differently depending upon their placement in the text and the keyword. Vigenere cipher is considered to be the most efficient and simplest Polyalphabetic substitution cipher. Due to its repeating nature of the keyword, it is vulnerable to attacks. To overcome this, here we are presenting a new cipher which uses multiple random Tables (26×26) for encryption. In this proposed cipher, for encrypting each plaintext letter we are generating a random table (26×26). Instead of using the same Vigenere table here we are using an infinite number of alphabetical tables depending on the length of the plaintext. Also, each table will be completely independent from the previous table. The repeating nature of the keyword does not help the crackers to break this code. So this proposed polyalphabetic cipher is unbreakable.

Keywords : Polyalphabetic cipher, Vigenere cipher, Vigenere table, Kasiski method, Index of coincidence (IC).
Cite this article : Ranju S Kartha and Varghese Paul, " An efficient algorithm for polyalphabetic substitution using random tables " , International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-5, Issue-43, June-2018 ,pp.124-133.DOI:10.19101/IJATEE.2018.543001
References :
[1]Ravindra Babu K, Kumar DU, Babu V and kumar Shravan. A contemporary poly alphabetic cipher using comprehensive Vigenere table. World of Computer Science and Information Technology Journal. 2011; 1(4):167-71.
[Google Scholar]
[2]Goel N, Maurya A, Kumar B. Information security: encryption and decryption with polyalphabetic substitution method. International Journal of Computer Science and Communication. 2011; 2(1):41-4.
[3]Mendrofa EH, Purba EY, Siahaan BY, Sembiring RW. Collaborative encryption algorithm between vigenere cipher, rotation of matrix (ROM), and one time pad (OTP) Algoritma. Advances in Science, Technology and Engineering Systems Journal.2017; 2(5):13-21.
[Crossref] [Google Scholar]
[4]Kartha RS, Paul V. Survey: recent modifications in Vigenere cipher. IOSR Journal of Computer Engineering. 2014; 16(2):49-53.
[Crossref] [Google Scholar]
[5]Eskicioglu A, Litwin L. Cryptography. IEEE Potentials. 2001; 20(1):36-8.
[Crossref] [Google Scholar]
[6]Razzaq A, Mahmood Y, Ahmed F, Hur A. Strong key machanism generated by LFSR based Vigenre cipher. International Arab conference on information technology 2012(pp.544-8).
[Google Scholar]
[7]Benny A, Mathews M. An analysis into the efficiency of Ciphers. International Journal of Scientific & Engineering Research.2017; 8(7):1303-10.
[Google Scholar]
[8]Forouzan BA. Cryptography & Network Security. McGraw-Hill; 2007.
[Google Scholar]
[9]Katz J, Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC Press; 1996.
[Google Scholar]
[10]http://www.scribd.com/doc/36928010/Classical-Cryptography. Accessed 26 March 2018.