The PolyVernam Cipher

Abstract

Cryptography encryption is an effective way to achieve the security of data. The encryption is to hide the data in a way that an attacker cannot hack the data. The main purpose of encryption is to hide the data from the unauthorized parties. The symmetric key cryptographic is called the conventional/private-key/single-key cryptography. The sender and receiver can share a common key for encrypting and decrypting the data. An important distinction in the symmetric cryptographic algorithms is between stream and block ciphers. Stream ciphers convert one symbol of plaintext directly into a symbol of cipher text. Block ciphers encrypt a group of plaintext symbols as one block. The symmetric cipher use similar keys. For encryption, the plaintext is in the input side, whereas for decryption, the cipher text is in the output side. The symmetric key algorithm is much faster than the asymmetric algorithm. Symmetric key ciphers can be used as primitives to construct various cryptographic mechanisms. It can be composed of producing a stronger cipher. This is the advantage of the symmetric cipher. The disadvantage of the symmetric key is shared key systems; however, both parties know the secret key. In polyalphabetic cipher, multiple alphabets are used. To facilitate encryption, all the alphabets are usually written in a large table. The advantage of polyalphabetic cipher is that they make a frequency analysis more difficult. The polyVernam cipher is a one of the method of encryption. This cipher is not easy to understand and implement, so it often appears to be unbreakable. A new approach is polyVernam cipher is designed by combining of polyalphabetic cipher and Vernam cipher to increase the security in the symmetric cipher. A polyalphabetic cipher is based on substitution cipher. The polyalphabetic decrypt value can be substituted in the polyVernam cipher; while decrypting the value, it gives a new encrypted value. Using the same key can get the original message from the encrypted value. The encrypted message is applying by XOR operation. And finally, a receiver can get the message more securely.

Authors and Affiliations

Divya R, Anita Madona M

Keywords

Related Articles

Design of High Voltage Integrated Class-F Amplifier for Ultra Sound Transducers

Pulsers are usually adopted in ultra sound applications due to their efficiency. On the other hand, amplifiers would enable apodization profiles with high resolution; beams with low harmonic content and instantaneous ch...

Multiservice Product Comparison System

Big-data computing is a new critical challenge for the ICT industry. Engineers and researchers are dealing with data sets of petabyte scale. Conventional way to provide comparison between products from heterogenous webs...

Online Anomaly Detection under Over-sampling PCA

Anomaly detection is the process of identifying unusual behavior. Outlier detection is an important issue in data mining and has been studied in different research areas. In this paper we use “Leave One Out” procedure t...

A Monitoring System for Early Detection of Microbial Activity for Various Milk Products

Smart city is a striking new activity by the Administration of India to drive monetary development and to enhance the personal satisfaction of individuals. This endeavor to perceive the innovations that can tackle issue...

A Survey on DNA Based Cryptography

DNA cryptography is a new era of enhanced security for the data transfer using the internet. DNA cryptography enhanced the cryptography in terms of time complexity as well as capacity. It uses the DNA strands to hide th...

Download PDF file
  • EP ID EP21225
  • DOI -
  • Views 217
  • Downloads 5

How To Cite

Divya R, Anita Madona M (2015). The PolyVernam Cipher. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(8), -. https://europub.co.uk./articles/-A-21225