The Effect Of Varying Key Length On A Vigenère Cipher
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Vigenère cipher is one of the polyalphabetic substitution ciphers. Its weakness is the key repetition.To overcome this weakness there are many researchesgoing on to modify the key generation. In this paper a keygenerator function isimplemented with C++. Itgenerates a key with length depends on the message securitylevel.This level is determined by the sender of the message, according to the security importance of the message.The security level determines the key length, which is a ratio from the plain-text message. This ratio varies from10% to 100% from the plain-text length. This paper studies the effect of varying the key length on theperformance of Vigenère cipher andits frequency analysis attack. When the key length increases the encryptionand decryption time increases, the frequency analysis attack becomes more difficult and also the confusion isincreased
Authors and Affiliations
Ayman Al-ahwal , Sameh Farid
Comparative Study of PEGASIS Protocols inWireless Sensor Network
Abstract: The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing an...
Congestion Controlled d-Adapt-OR for Adhoc Networks
Abstract: Opportunistic routing scheme is used to route data packet from source to destination. Broadcasting nature of the wireless networks is utilized here to send data packets. A suitable forwarder node is selec...
Sentiment Classification in Hindi
Abstract : Traditional approaches for classification of sentiments depend on lexical or syntax based feature oron both. Different methods for sentiments classifications are described .The main goal of analysis of thesent...
Performance Analysis of Sdrp for Wsn Using Diffie – Hellman Algorithm
Abstract: Wireless Sensor Network is a group of wireless nodes exclusively designed for the continuous sensing of information at human inaccessible locates. Reprogramming is a definite need at such situations when...
Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter
To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells....