The PolyVernam Cipher
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 8
Abstract
Cryptography encryption is an effective way to achieve the security of data. The encryption is to hide the data in a way that an attacker cannot hack the data. The main purpose of encryption is to hide the data from the unauthorized parties. The symmetric key cryptographic is called the conventional/private-key/single-key cryptography. The sender and receiver can share a common key for encrypting and decrypting the data. An important distinction in the symmetric cryptographic algorithms is between stream and block ciphers. Stream ciphers convert one symbol of plaintext directly into a symbol of cipher text. Block ciphers encrypt a group of plaintext symbols as one block. The symmetric cipher use similar keys. For encryption, the plaintext is in the input side, whereas for decryption, the cipher text is in the output side. The symmetric key algorithm is much faster than the asymmetric algorithm. Symmetric key ciphers can be used as primitives to construct various cryptographic mechanisms. It can be composed of producing a stronger cipher. This is the advantage of the symmetric cipher. The disadvantage of the symmetric key is shared key systems; however, both parties know the secret key. In polyalphabetic cipher, multiple alphabets are used. To facilitate encryption, all the alphabets are usually written in a large table. The advantage of polyalphabetic cipher is that they make a frequency analysis more difficult. The polyVernam cipher is a one of the method of encryption. This cipher is not easy to understand and implement, so it often appears to be unbreakable. A new approach is polyVernam cipher is designed by combining of polyalphabetic cipher and Vernam cipher to increase the security in the symmetric cipher. A polyalphabetic cipher is based on substitution cipher. The polyalphabetic decrypt value can be substituted in the polyVernam cipher; while decrypting the value, it gives a new encrypted value. Using the same key can get the original message from the encrypted value. The encrypted message is applying by XOR operation. And finally, a receiver can get the message more securely.
Authors and Affiliations
Divya R, Anita Madona M
Development of Low Power Micro Inverter for Use In House Hold Applications
The paper presents the design of a single phase low power solar micro inverter that can be used in homes for low power applications. The basic idea behind this research is to make most use of solar energy in operating s...
Modernizing ATM Security with Biometrics by Using LabVIEW
In today’s world the usage of currencies is moving towards virtual money. One of the at most important things that helped in making the transition towards virtual cash has been Automated Teller Machine (ATM). In order t...
Detection and Removal of Cracks from Digital Painting
Image inpainting is the process of restoring the lost or damaged regions of a digital image. Many paintings, especially old ones, suffer from breaks in the substrate, the paint, or the varnish .In this paper, a techniqu...
The Analysis of Dimension of Instability in the Informal Settlements (Case Study: Hesar Neighborhood of City of Karaj, Iran)
Squatters (or informal) settlements have existed in Iran since 1961. There were turning points for the massive migration from the village and small cities to political and capital centers (city of Tehran as the capital...
Efficient Spam Detection on Social Network
With the growth of social networking sites for communicating, sharing, storing and managing significant information, it is attracting cybercriminals who misuse the Web to exploit vulnerabilities for their illicit benefi...