The PolyVernam Cipher

Abstract

Cryptography encryption is an effective way to achieve the security of data. The encryption is to hide the data in a way that an attacker cannot hack the data. The main purpose of encryption is to hide the data from the unauthorized parties. The symmetric key cryptographic is called the conventional/private-key/single-key cryptography. The sender and receiver can share a common key for encrypting and decrypting the data. An important distinction in the symmetric cryptographic algorithms is between stream and block ciphers. Stream ciphers convert one symbol of plaintext directly into a symbol of cipher text. Block ciphers encrypt a group of plaintext symbols as one block. The symmetric cipher use similar keys. For encryption, the plaintext is in the input side, whereas for decryption, the cipher text is in the output side. The symmetric key algorithm is much faster than the asymmetric algorithm. Symmetric key ciphers can be used as primitives to construct various cryptographic mechanisms. It can be composed of producing a stronger cipher. This is the advantage of the symmetric cipher. The disadvantage of the symmetric key is shared key systems; however, both parties know the secret key. In polyalphabetic cipher, multiple alphabets are used. To facilitate encryption, all the alphabets are usually written in a large table. The advantage of polyalphabetic cipher is that they make a frequency analysis more difficult. The polyVernam cipher is a one of the method of encryption. This cipher is not easy to understand and implement, so it often appears to be unbreakable. A new approach is polyVernam cipher is designed by combining of polyalphabetic cipher and Vernam cipher to increase the security in the symmetric cipher. A polyalphabetic cipher is based on substitution cipher. The polyalphabetic decrypt value can be substituted in the polyVernam cipher; while decrypting the value, it gives a new encrypted value. Using the same key can get the original message from the encrypted value. The encrypted message is applying by XOR operation. And finally, a receiver can get the message more securely.

Authors and Affiliations

Divya R, Anita Madona M

Keywords

Related Articles

Sign Language Glove using Arduino

Communication between speakers and non-speakers of American Sign Language can be problematic, inconvenient, and expensive. This project attempts to bridge the communication gap by designing a portable glove that capture...

Study & Enhancement of Fly spray Bug Tracking Tool

As software projects become increasingly large and complicated, it becomes more difficult to properly verify the code of the project. The major limitation of the software industry is that it is unable to develop error f...

Business Tax Fraud Detection in Big Data

There is evidence that an increasing number of enterprises plot together to evade tax in an unperceived way. At the same time, the taxation information related data is a classic kind of big data. The issues challenge th...

Propagation of Exploding Uniform Strong Cylindrical Shock Wave in Condensed Medium (Water)

The very well-known theory of the shock dynamics, Chester - Chisnell- Whitham method is applied to study the exploding i.e., diverging wave in condensed medium, the water is assumed to be the simplesed form of condensed...

Implementation of Unsigned Multiplier Using Area-Delay-Power Efficient Adder

Multiplication and addition are most widely and oftenly used arithmetic computations performed in all digital signal processing applications. Multiplication is the basic arithmetic operation which is present in many par...

Download PDF file
  • EP ID EP21225
  • DOI -
  • Views 224
  • Downloads 5

How To Cite

Divya R, Anita Madona M (2015). The PolyVernam Cipher. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(8), -. https://europub.co.uk/articles/-A-21225