CFP last date
20 December 2024
Reseach Article

Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents

by Fathir Maruf, Imam Riadi, Yudi Prayudi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 1
Year of Publication: 2015
Authors: Fathir Maruf, Imam Riadi, Yudi Prayudi
10.5120/ijca2015907262

Fathir Maruf, Imam Riadi, Yudi Prayudi . Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents. International Journal of Computer Applications. 132, 1 ( December 2015), 27-33. DOI=10.5120/ijca2015907262

@article{ 10.5120/ijca2015907262,
author = { Fathir Maruf, Imam Riadi, Yudi Prayudi },
title = { Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 1 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number1/23559-2015907262/ },
doi = { 10.5120/ijca2015907262 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:58.964373+05:30
%A Fathir Maruf
%A Imam Riadi
%A Yudi Prayudi
%T Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 1
%P 27-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and confidentiality of documents or information has become a very important concern, in this modern era of computing speed increases dramatically, certainly considered threatening for some algorithms that are used to secure documents or information, it spawned an option to increase the security of documents by combining two cryptographic algorithms are Vigenére cipher with XTEA. Selection Vigenére cipher because it is not so vulnerable to solving method code is called frequency analysis, but some cryptanalyst has found security flaws of this algorithm, for it Vigenére cipher in this research carried out modifications to operations of mathematics, the results of these modifications will be combined with the algorithm-based XTEA block cipher, because his strength has been proven to secure the document (text). Based on the results of research conducted, the merger of the two algorithms are (VixTEA) can improve the security of ciphertext, it is measured by various indicators, namely, a visual comparison of encryption (frequency analysis), entropy value analysis, and analysis of bruteforce attacks. The results also showed that the VixTEA concept does not change the performance of the algorithm and the integrity of the digital documents can secured.

References
  1. Bhateja. A. K., Bhateja. A., Chaudhury. S., and Saxena. P. K. 2015. “Cryptanalysis of Vigenére cipher using Cuckoo Search”. Applied Soft Computing, vol. 26. 315-324.
  2. Denis. T. S. Extended TEA Algorithms. 1999. vol. 1. 2-6 Unpublished.
  3. El-latif. A. A. A., Li. L, Zhang, T. Wang. N, Song, X, and X. Niu. 2012. “Digital Image Encryption Scheme Based on Multiple”. 67–88.
  4. Gaba. S., Aggarwal. I., and Pandey. S. 2012. “Design of Efficient XTEA Using Verilog”. International Journal of Scientific and Research Publications. vol. 2. (6). 1-5.
  5. Hatipoglu. B. 2008. A Wireless Entryphone System Implementation With MSP430 and CC1100. Faculty of Engineering and Architecture Department of Komputer Engineering. Yetipede University. Unpublished.
  6. JaydebBhaumi. N .D. 2012. “A Modified XTEA”. International Journal of Soft Computing and Engineering. vol. 2. (2). 461-464.
  7. Jolfaei. A. A., and Mirghadri. A. 2011. Image Encryption Using Chaos and Block Cipher. Computer and Information Science. 4:1.
  8. Kaminsky. A., Sparlin. R., Meresca. P., and Kelly. J. 2013. XTEA Block Cipher. Unpublished.
  9. Ko. Y., Hong. S., Lee. W., and Kang. J. Related Key Differential Attacks on 27 rounds of XTEA anf Full-round GOST. Unpublished.
  10. Pahrul, I., Yudi, P., and Imam. R. 2015. “Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA)”. International Journal of Computer Applications. vol. 123. (6), 11-16.
  11. Sekar. G., Mouha. N., Velichkov. V., and Preneel. B. Meet-in-the-Middle Attacks on Reduce-Round XTEA. Unpublished.
  12. Sinha, S. 2014. “Improving Security of Vigenère Cipher by Double Columnar Transposition”. International Journal of Computer Applications. vol. 100, (14), 6–10
  13. Spillman. R., Janssen. M., Nelson. B., and Kepner. M. 1993. “Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers”. Cryptologia. vol. 17. (1). 31–44.
  14. Stallings. W. 1999. Cryptography and Network Security, 2nd edition, Prentice Hall.
  15. Stallings. W. 2006. Cryptography and Network Security : Principles and Practices, Prentice-Hall, Upper Saddle River. New Jersey.
  16. Wheeler. D. J., and Needham. R, TEA, a tiny encryption algorithm. Unpublished.
Index Terms

Computer Science
Information Sciences

Keywords

Vigenére cipher XTEA Block cipher VixTEA Digital documents.