CFP last date
20 December 2024
Reseach Article

Vigenere Cipher: Trends, Review and Possible Modifications

by Al-Amin Mohammed Aliyu, Abdulrahman Olaniyan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 11
Year of Publication: 2016
Authors: Al-Amin Mohammed Aliyu, Abdulrahman Olaniyan
10.5120/ijca2016908549

Al-Amin Mohammed Aliyu, Abdulrahman Olaniyan . Vigenere Cipher: Trends, Review and Possible Modifications. International Journal of Computer Applications. 135, 11 ( February 2016), 46-50. DOI=10.5120/ijca2016908549

@article{ 10.5120/ijca2016908549,
author = { Al-Amin Mohammed Aliyu, Abdulrahman Olaniyan },
title = { Vigenere Cipher: Trends, Review and Possible Modifications },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 11 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 46-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number11/24096-2016908549/ },
doi = { 10.5120/ijca2016908549 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:35:32.866948+05:30
%A Al-Amin Mohammed Aliyu
%A Abdulrahman Olaniyan
%T Vigenere Cipher: Trends, Review and Possible Modifications
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 11
%P 46-50
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Vigenere cipher is one of the earliest known polyalphabetic cipher which was considered secure for a very long time until 1917 when friedman and kasiski were able to break it by determining repeating segments of the ciphertext and using it to determine the length of the key. Once the length of the key is known, the ciphertext could be grouped in columns and treated as a separate caesar cipher which can be solved. Over the years, a lot of modification has been done to inprove the security of the vigenere cipher. This paper presents a review of the vigenere cipher and also discusses various existing modifications.

References
  1. Abdullah, J. M., & Azman , S. (2010). A New Public-Key Encryption Scheme Based on Non-Expansion. International Journal of Computer Science Issues IJCSI.
  2. Forouzan, B.A. (2007). Cryptography and Network Security. (Special Indian Edition). McGraw Hills Company Inc. New York
  3. Hamdan, A., Zaidan, B. B., & Zaidan , A. A. (2010). New Comparative Study Between DES, 3DES and AES within nine factors. Journal of computing, Vol 2 (Issue 3), 152-157.
  4. Information Security (2015), Retrieved from https://en.m.wikipedia.org/wiki/information_security on 8/8/2015
  5. Interactive Maths. (n.d.). Retrieved on February 2, 2015, from www.interactive-maths.com/Encryption/Atbash Cipher - Crypto Corner.htm
  6. Kashish, G., & Supriya, K. (2013). Modified Caesar Cipher for better Security Enhancement. International Journal of Computer Applications, 26-30
  7. Katz, J. and Lindell Y. (2008). Introduction to modern cryptography. Chapman and Hall, Taylor & Francis Group6000 Broken Sound Parkway NW.
  8. Kester, Q.-A. (2013). A Hybrid Cryptosystem based on Vigenere cipher and Columnar Transposition cipher. International Journal of Advaced Technology and Engineering Research, 141-147
  9. Kester, Q-A. (2012). A Cryptosystem based on Vigenere cipher with varying key. International Journal of Advanced Research in Computer Engineering and Technology, 108-112.
  10. Md. Khalid, I. R., Neeta, W., & Vaibhav, M. (2012). Alpaha-Qwerty Cipher: An Extended Vigenere Cipher. Advanced Computing: An International Journal, 107-117.
  11. Nishith, S., and Kishore, B. (2014). Improving Security of Vigenere Cipher by Double Columnar Transposition. International Journal of Computer Applications, Vol 100 (No. 14). Pp 6-10
  12. Omolara, O. E., Oludare, A. I., & Abdullahi, S. E. (2014). Developing a modified Hybrid Caesar cipher and Vigenere cipher for secure Data Communication. IISTE, 34-46.
  13. Saeed, F., & Rashid, M. (2010). Integrating Classical Encryption with Modern Technique. International Journal of Computer Science and Network Security, 280-285.
  14. Sangapu, V.A. and Gomatam V.S.A (2014), Recent Advancements on Symmetric Cryptography Techniques - A Comprehensive Case Study, Global Journal of Computer Science and Technology, Vol 14, Issue 2, pp 19-30
  15. Serge, V. (2006). A Classical Introduction to Cryptography Applications for Communications Security. Springer Science Business Media, Inc.
  16. Shannon, C. and Warren, W. (2009). The Mathematical Theory of Communication. University of Illinois Press, U.S.A., pp. 12-29.
  17. Srikantaswamy, S. G., & Phaneendra, H. D. (2012). Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption. International Journal on Cryptography and Information Security, 39-49.
  18. Stallings, W. (2011). Cryptography and Network Security - Principles and Practice. (Fifth edition), Pearson Education, Inc.
Index Terms

Computer Science
Information Sciences

Keywords

Cipher Cryptography Encryption Substitution Vigenere.