The PolyVernam Cipher
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 8
Abstract
Cryptography encryption is an effective way to achieve the security of data. The encryption is to hide the data in a way that an attacker cannot hack the data. The main purpose of encryption is to hide the data from the unauthorized parties. The symmetric key cryptographic is called the conventional/private-key/single-key cryptography. The sender and receiver can share a common key for encrypting and decrypting the data. An important distinction in the symmetric cryptographic algorithms is between stream and block ciphers. Stream ciphers convert one symbol of plaintext directly into a symbol of cipher text. Block ciphers encrypt a group of plaintext symbols as one block. The symmetric cipher use similar keys. For encryption, the plaintext is in the input side, whereas for decryption, the cipher text is in the output side. The symmetric key algorithm is much faster than the asymmetric algorithm. Symmetric key ciphers can be used as primitives to construct various cryptographic mechanisms. It can be composed of producing a stronger cipher. This is the advantage of the symmetric cipher. The disadvantage of the symmetric key is shared key systems; however, both parties know the secret key. In polyalphabetic cipher, multiple alphabets are used. To facilitate encryption, all the alphabets are usually written in a large table. The advantage of polyalphabetic cipher is that they make a frequency analysis more difficult. The polyVernam cipher is a one of the method of encryption. This cipher is not easy to understand and implement, so it often appears to be unbreakable. A new approach is polyVernam cipher is designed by combining of polyalphabetic cipher and Vernam cipher to increase the security in the symmetric cipher. A polyalphabetic cipher is based on substitution cipher. The polyalphabetic decrypt value can be substituted in the polyVernam cipher; while decrypting the value, it gives a new encrypted value. Using the same key can get the original message from the encrypted value. The encrypted message is applying by XOR operation. And finally, a receiver can get the message more securely.
Authors and Affiliations
Divya R, Anita Madona M
Microcontroller Based Speed Control Scheme of Bldc Motor using Proteus
this paper is proposed to control speed of a dc motor using low cost pic16f877a microcontroller. To accomplish this, pwm technique is used, which is intrinsic under module of pic. A microcontroller based speed control s...
Investigation on the micro structural and surface morphological properties of SILAR grown CdO thin films by altering dipping cycle
Cadmium oxide (CdO) thin films were prepared by successive ionic layer adsorption and reaction (SILAR) method by altering dipping cycle. The prepared films were annealed at 2500C for 2 h. The prepared films were charact...
A Survey on Data Mining
Information mining is the figuring procedure of finding examples in expansive informational collections including techniques at the convergence of counterfeit consciousness, machine learning, measurements, and database...
Energy Efficient Concentric Clustering Protocol for Wireless Sensor Network
Energy Efficiency technique plays an important role in saving the energy. To improve network lifetime, an efficient data aggregation protocols which help to eliminate redundant data transmission in a wireless sensor net...
slugLoad Balancing In Cloud Computing Environment Using Pso Algorithm
Cloud computing is an entirely internet- based approach where all the applications and files are hosted on a cloud which consists of thousands of computers interlinked together in a complex...