The PolyVernam Cipher

Abstract

Cryptography encryption is an effective way to achieve the security of data. The encryption is to hide the data in a way that an attacker cannot hack the data. The main purpose of encryption is to hide the data from the unauthorized parties. The symmetric key cryptographic is called the conventional/private-key/single-key cryptography. The sender and receiver can share a common key for encrypting and decrypting the data. An important distinction in the symmetric cryptographic algorithms is between stream and block ciphers. Stream ciphers convert one symbol of plaintext directly into a symbol of cipher text. Block ciphers encrypt a group of plaintext symbols as one block. The symmetric cipher use similar keys. For encryption, the plaintext is in the input side, whereas for decryption, the cipher text is in the output side. The symmetric key algorithm is much faster than the asymmetric algorithm. Symmetric key ciphers can be used as primitives to construct various cryptographic mechanisms. It can be composed of producing a stronger cipher. This is the advantage of the symmetric cipher. The disadvantage of the symmetric key is shared key systems; however, both parties know the secret key. In polyalphabetic cipher, multiple alphabets are used. To facilitate encryption, all the alphabets are usually written in a large table. The advantage of polyalphabetic cipher is that they make a frequency analysis more difficult. The polyVernam cipher is a one of the method of encryption. This cipher is not easy to understand and implement, so it often appears to be unbreakable. A new approach is polyVernam cipher is designed by combining of polyalphabetic cipher and Vernam cipher to increase the security in the symmetric cipher. A polyalphabetic cipher is based on substitution cipher. The polyalphabetic decrypt value can be substituted in the polyVernam cipher; while decrypting the value, it gives a new encrypted value. Using the same key can get the original message from the encrypted value. The encrypted message is applying by XOR operation. And finally, a receiver can get the message more securely.

Authors and Affiliations

Divya R, Anita Madona M

Keywords

Related Articles

Performance investigation of axial flow compressor at different climatic conditions

This paper discusses the effect on axial-flow compressor, when climatic conditions are changing. Ensuring compressor run at maximum effectiveness is a primary aim for operators. In the existing economic climate, whateve...

Design and Implementation of Inverter for driving Induction Motor using DSPACE

This paper presents the design and implementation of inverter system for driving both single phase , three phase Induction motor using DSPACE with the controlling objectives PWM and SVPWM . AC motor drives are widely us...

A Literature Survey on Data Mining Techniques to Predict Lifestyle Diseases

Data Mining is the process of extraction hidden patterns from previously unknown and imaginably useful information from huge amount of data. The diagnosis of Disease is one of the major application where data mining too...

Our Future: Artificial Intelligence, Expert Systems & Robots

Artificial Intelligence is the concept of computer science which deals with building computers that exhibits the intelligent behaviour like us. In other words it concern with making intelligent machines which having abi...

Implementation Paper of Result Alert System

The development of mobile network communication system, users have been proposed with lots of services such as ability to send SMS, Video, Data files, Images etc. This process described the implementation of the result...

Download PDF file
  • EP ID EP21225
  • DOI -
  • Views 181
  • Downloads 5

How To Cite

Divya R, Anita Madona M (2015). The PolyVernam Cipher. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(8), -. https://europub.co.uk/articles/-A-21225