The Effect Of Varying Key Length On A Vigenère Cipher
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Vigenère cipher is one of the polyalphabetic substitution ciphers. Its weakness is the key repetition.To overcome this weakness there are many researchesgoing on to modify the key generation. In this paper a keygenerator function isimplemented with C++. Itgenerates a key with length depends on the message securitylevel.This level is determined by the sender of the message, according to the security importance of the message.The security level determines the key length, which is a ratio from the plain-text message. This ratio varies from10% to 100% from the plain-text length. This paper studies the effect of varying the key length on theperformance of Vigenère cipher andits frequency analysis attack. When the key length increases the encryptionand decryption time increases, the frequency analysis attack becomes more difficult and also the confusion isincreased
Authors and Affiliations
Ayman Al-ahwal , Sameh Farid
An Efficient Texture Classification Technique Based on Semi Uniform LBP
Abstract: ‘Local Binary Pattern’ (LBP) operator has been proved to be a theoretically simple yet very effective statistical texture descriptor in many areas. One of the main disadvantage of LBP is they are more sen...
Optical Character Recognition (OCR) System
Abstract: In the running world, there is growing demand for the software systems to recognize characters incomputer system when information is scanned through paper documents as we know that we have number ofnewspa...
Detecting Malicious Nodes in Wireless Sensor Networks
Abstract:A typical wireless sensor network consists of several tiny and low-power sensors which use radio frequencies to perform distributed sensing tasks. Wireless sensor networks are used to detect the occurrence of ev...
Providing High Security and Recovering Good Quality Image using Visual Cryptographic Technique
Abstract: Security is an important factor, since many digital images are transmitted through internet, which contains secret information. Symmetric and Asymmetric methods are two types of cryptographic techniques used to...
Voltage Control Of Three Phase Ac/Dc Pwm Converters UsingFeedback Linearisation
Abstract: This paper proposes a voltage control strategy for a three level PWM converter based on feedbacklinearization in order to control dc bus voltage. Incorporating the power balance of the input and output si...