ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY

Authors

  • SALAH ABDULGHANI ALABADY College of Engineering, University of Mosul, Mosul, Iraq.
  • THABITA FAWAZ SHAWKAT College of Engineering, University of Mosul, Mosul, Iraq.
  • AMINA WAAD ADREES College of Engineering, University of Mosul, Mosul, Iraq.

DOI:

https://doi.org/10.55197/qjoest.v6i1.194

Keywords:

network security, cybersecurity, Vigenère Cipher, cryptographic algorithms, symmetric key cryptography

Abstract

The subsequent stage of communication is characterized by the Internet of Things (IoT). Through the implementation of IoT, tangible objects are rendered capable of generating, receiving, and disseminating data via the internet. These physical entities are interconnected and are able to exchange substantial volumes of data with other digital components autonomously, without necessitating human intervention. Presently, one of the critical challenges that threaten the integrity of "Internet of Things" devices pertains to the security and privacy of the information that is gathered and transmitted, which is often intimately associated with the personal lives of the users. Various encryption methodologies are employed to safeguard data from diverse user access. Among these, encryption stands out as one of the most efficacious techniques for the secure transmission of data across communication networks. The process of encryption involves the application of a cipher algorithm to transform readable data (designated as plaintext) into an unintelligible format (referred to as cipher text). The Vigenère cipher represents a method for encrypting alphabetic text utilizing a series of distinct Caesar ciphers, which are determined by the characters of a specified keyword. Numerous encryption algorithms are currently prevalent in computational practices. This particular form of polyalphabetic substitution is considered relatively straightforward. For many generations, the Vigenère cipher was regarded as secure; however, its vulnerabilities were later identified. This paper proposes an innovative encryption method aimed at facilitating secure and safe data communication. The Vigenère cipher has been augmented and modified to incorporate extended ASCII code in lieu of solely relying on ASCII code, in addition to the inclusion of alphabets, numerals, and symbols. Furthermore, a swapping operation has been executed. These enhancements are intended to elevate the algorithm's complexity and attain a heightened level of encryption. Additionally, this modification serves to strengthen the security of the Vigenère cipher.

References

Aliyu, A.A.M., Olaniyan, A. (2016): Vigenere cipher: trends, review and possible modifications. – International Journal of Computer Applications 135(11): 46-50.

Christensen, C. (2010): Review of cryptography and network security: Principles and practice. – Cryptologia 35(1): 97-99.

Gerhana, Y.A., Insanudin, E., Syarifudin, U., Zulmi, M.R. (2016): Design of digital image application using vigenere cipher algorithm. – In 2016 4th International Conference on Cyber and IT Service Management, IEEE 5p.

Hameed, T.H., Sadeeq, H.T. (2022): Modified Vigenère cipher algorithm based on new key generation method. – Indonesian Journal of Electrical Engineering and Computer Science 28(2): 954-961.

Kartha, R.S., Paul, V. (2014): Survey: recent modifications in Vigenere Cipher. – IOSR Journal of Computer Engineering 16(2): 49-53.

Kester, Q.A. (2013): A Hybrid Cryptosystem based on Vigenere cipher and Columnar Transposition cipher. – International Journal of Advanced Technology & Engineering Research 3(1): 7p.

Kester, Q.A. (2012): A cryptosystem based on Vigenère cipher with varying key. – International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1(10): 108-113.

Kouicem, D.E., Bouabdallah, A., Lakhlef, H. (2018): Internet of things security: A top-down survey. – Computer Networks 141: 199-221.

Kumar, S.A., Vealey, T., Srivastava, H. (2016): Security in internet of things: Challenges, solutions and future directions. – In 2016 49th Hawaii International Conference on System Sciences (HICSS), IEEE 10p.

Kuzminykh, I., Yevdokymenko, M., Sokolov, V. (2021): Encryption Algorithms in IoT: Security vs Lifetime. – SSRN 21p.

Nasution, S.D., Ginting, G.L., Syahrizal, M., Rahim, R. (2017): Data security using vigenere cipher and goldbach codes algorithm. – International Journal of Engineering Research & Technology 6(1): 360-363.

Omolara, O.E., Oludare, A.I., Abdulahi, S.E. (2014): Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication. – Computer Engineering and Intelligent Systems 5(5): 34-46.

Pinheiro, G., Saraf, S. (2016): Improved Caesar cipher algorithm using multistage encryption. – International Journal of Computer Science and Technology 3p.

Purnama, B., Rohayani, A.H. (2015): A new modified caesar cipher cryptography method with legibleciphertext from a message to be encrypted. – Procedia Computer Science 59: 195-204.

Rahmani, K.I., Wadhwa, N., Malhotra, V. (2012): Alpha-Qwerty Cipher: An Extended Vigenere Cipher. – Advanced Computing 3(3): 12p.

Saraswat, A., Khatri, C., Thakral, P., Biswas, P. (2016): An extended hybridization of vigenére and caesar cipher techniques for secure communication. – Procedia Computer Science 92: 355-360.

Senthil, K., Prasanthi, K., Rajaram, R. (2013): A modern avatar of Julius Ceasar and Vigenere cipher. – In 2013 IEEE International Conference on Computational Intelligence and Computing Research, IEEE 3p.

Sharma, G., Kakkar, A. (2012): Cryptography Algorithms and approaches used for data security. – International Journal of Scientific & Engineering Research 3(6): 1-6.

Song, Y., Zhu, Z., Zhang, W., Yu, H., Zhao, Y. (2019): Efficient and secure image encryption algorithm using a novel key-substitution architecture. – IEEE Access 7: 15p.

Soofi, A.A., Riaz, I., Rasheed, U. (2016): An enhanced Vigenere cipher for data security. – International Journal of Scientific & Technology Research 5(3): 141-145.

Subandi, A., Meiyanti, R., Sandy, C.L.M., Sembiring, R.W. (2017): Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification. – 2nd International Conference of Computer, Environment, Social Science, Health Science, Agriculture & Technology (ICEST) 5p.

Suo, H., Wan, J., Zou, C., Liu, J. (2012): Security in the internet of things: a review. – In 2012 International Conference on Computer Science and Electronics Engineering, IEEE 3: 648-651.

Uniyal, N., Dobhal, G., Semwal, P. (2020): Enhanced security of encrypted text by KDMT: key-domain maximization technique. – International Journal of Recent Technology and Engineering (IJRTE) 8(5): 1385-1388.

Downloads

Published

2025-03-17

Issue

Section

Articles

How to Cite

ENHANCED VIGENERE CIPHER ALGORITHM FOR IMPROVED CRYPTOGRAPHIC SECURITY. (2025). Quantum Journal of Engineering, Science and Technology, 6(1), 1-12. https://doi.org/10.55197/qjoest.v6i1.194