Design of Hybrid Cryptography System Based on Vigenere Cipher and Polybius Cipher

  IJCTT-book-cover
 
         
 
© 2022 by IJCTT Journal
Volume-70 Issue-5
Year of Publication : 2022
Authors : Anzar Ahmad Raina, Saood Rasool Shah, Mehwar Raj , Waqqas Manzoor
DOI :  10.14445/22312803/IJCTT-V70I5P104

How to Cite?

Anzar Ahmad Raina, Saood Rasool Shah, Mehwar Raj , Waqqas Manzoor, "Design of Hybrid Cryptography System Based on Vigenere Cipher and Polybius Cipher," International Journal of Computer Trends and Technology, vol. 70, no. 5, pp. 33-38, 2022. Crossref, https://doi.org/10.14445/22312803/IJCTT-V70I5P104

Abstract
Cryptography is gotten from a Greek word that suggests the specialty of guaranteeing information by transforming it into a tangled association and unintelligible organization. It is a blend of math and computer programming. The explosive development of the internet has made an extended knowledge of interest vulnerability issues. Even though security is the action stressed over the web,various applications have been made and organized, disregarding principal objections of information security: secrecy, validation, and insurance. As our step-by-step practices become progressively more subject to information organizations, the meaning of comprehension of such security issues and inconvenience will likewise increment. Cryptography is required to prevent a few unwanted clients or people from acquiring induction to the information. This paper presents another half-breed security figure by joining the two most significant Ciphers, Polybius Cipher and Vigenére Cipher. This half and half encryption figure give more noteworthy security than exemplary codes. Index Terms—Encryption, Cryptography, Polybius Ciphers, Vigenére Ciphers.

Keywords
Encryption, Cryptography, Polybius Ciphers, Vigenére Ciphers.

Reference

[1] S. Chaudhari, M. Pahade, S. Bhat, C. Jadhav, and T. Sawant, A research paper on new hybrid cryptography algorithm.
[2] K. Jakimoski, Security techniques for data protection in cloud computing, International Journal of Grid and Distributed Computing, 9(1) (2016) 49–56.
[3] A. A. Soofi, I. Riaz, and U. Rasheed, An enhanced vigen`ere cipher for data security, Int. J. Sci. Technol. Res, 5(3) (2016) 141–145.
[4] P. Kumar and S. B. Rana, Development of modified aes algorithm for data security, Optik, 127(4) (2016) 2341–2345.
[5] A. Saraswat, C. Khatri, P. Thakral, P. Biswas, et al., An extended hybridization of vigen ?ere and caesar cipher techniques for secure communication, Procedia Computer Science, 92 (2016) 355–360.
[6] J. Chen and J. S. Rosenthal, Decrypting classical cipher text using markov chain monte carlo, Statistics and Computing, 22(2) (2012) 397–413.
[7] M. B. Pramanik, Implementation of cryptography technique using columnar transposition, International Journal of Computer Applications, 945 (2014) 8887.
[8] C. Sanchez-Avila and R. Sanchez-Reillol, The rijndael block cipher (aes proposal): a comparison with des, in Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186). IEEE, (2001) 229–234.
[9] Q.-A. Kester, A cryptosystem based on vigen`ere cipher with varying key, International Journal of Advin Computer Engineering & Technology (IJARCET), 1(10) (2012) 108–113.
[10] C. Bhardwaj, Modification of vigen`ere cipher by random numbers, punctuations & mathematical symbols, Journal of Computer Engineering (IOSRJCE) ISSN, (2012) 2278–0661.
[11] F. M. S. Ali and F. H. Sarhan, Enhancing security of vigen`ere cipher by stream cipher, International Journal of Computer Applications, 100(1) (2014) 1–4.
[12] P. Gutmann, Cryptographic security architecture: design and verification. Springer Science & Business Media, (2003).
[13] A. P. U. Siahaan, Protection of important data and information using gronsfeld cipher, (2018).
[14] S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, Data security using vigen`ere cipher and goldbach codes algorithm, Int. J. Eng. Res. Technol, 6(1) (2017) 360–363.
[15] M. Maity, A modified version of polybius cipher using magic squareand western music notes, International Journal For Technological Research In Engineering, ISSN, (2014) 2347–4718.
[16] A. Author, Name of paper, Abbrev. Title of Periodical*, vol. x, no. y, pp. zzz-zzz, Mon, year. DOI
[17] J. Grundy and J. Hosking, Developing adaptable user interfaces for component-based systems, Interact. Comput., 14 (2002) 175- 194. DOI:10.1016/S0953-5438(01)00049-2
[18] W. Stuerzlinger, et al., User interface facades: towards fully adaptable user interfaces, in Proc. 19th Annu. ACM Symp. on User Interface Software Technology, Montreux, Switzerland, (2006) 309-318. DOI: 10.1145/1166253.116630
[19] C. Stephanidis, User interfaces for all: concepts, methods, and tools. Mahwah, NJ, USA: Lawrence Erlbaum Associates Inc., (2001).
[20] C. Stephanidis, User interfaces for all: concepts, methods, and tools. Mahwah, NJ, USA: Lawrence Erlbaum Associates Inc., (2001).
[21] M. Miller, Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. Que, (2009).
[22] I. Foster, et al., Cloud Computing and Grid Computing 360-Degree Compared, Proc. Grid Computing Environments Workshop (GCE `08), (2008)1-10.
[23] R. Buyya, et al., Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility, Future Generation Computer Systems, 25(6) (2009) 599-616.