Polyalphabetic Substitution Cipher Using Multiple Random Table

Authors

  • Kartha RS School of Computer Science, Mahatma Gandhi University, Kottayam, Kerala, India
  • Paul V Department of Information Technology, RSET, Cochin, Kerala, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.5158

Keywords:

Polyalphabetic Cipher, Vigenere Cipher, Vigenere Table, Kasiski Method, Index of Coincidence IC

Abstract

There are many cryptographic techniques available for providing a secure communication. Encryption technique can be classified according to their encrypting process. They are substitution cipher and transposition cipher. Polyalphabetic cipher is based on substitution technique- the plaintext letters are encrypted differently depending upon their placement in the text and the keyword. Vigenere cipher is considered to be the most efficient and simplest Polyalphabetic substitution cipher. Due to its repeating nature of the keyword, it is vulnerable to attacks. To overcome this, here we are presenting a new cipher which uses multiple random Tables (26x26) for encryption. In this proposed cipher, the keyword is repeating until it is equal to the length of the plaintext. But here, whenever the keyword repeats, this cipher generates different 26x26 random tables for encryption. Also, each table will be completely independent of the previous table. So this proposed Polyalphabetic cipher is unbreakable.

References

Sakshi Dubey, Darpan Anand, Jayash Sharma, "LFSR Based Block Cipher Technique for Text” International Journal of Computer Sciences and Engineering, Vol.6, Issue.2, pp.54-60, 2018.

P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy, "Modular Encryption Algorithm for Secure Data Transmission”, The International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue. 1, Feb 2018.

Benni Purnama, HettyRohayani A. H, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted”, International Conference on Computer Science and Computational Intelligence (ICCSCI 2015).

Behrouz A Forouzan, “Cryptography and Network Security”, Tata McGraw-Hill Publishing Company Limited, 2007.

A. Eskicioglu and L. Litwin, “Cryptography”, IEEE Potentials, Vol. 20, Issue. 1, pp. 36-38February/March 2001.

Ranju S Kartha, Dr. Varghese Paul, “ Survey: Recent Modifications in Vigenere cipher”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 2, Ver. IX, Mar-Apr. 2014.

Abdul Razzaq and Yasir Mahmood, Farooq Ahmed, “Strong Key Mechanism Generated by LFSR based Vigenère Cipher”, The 13th International Arab Conference on Information Technology, ACIT'’2012, Dec.10-13

Alfred J. Menezes, Paul C. van Oorschot, Scott A., “Handbook of Applied Cryptography”, CRC Press, 1996.

Navnish Goel, Amitabh Maurya, Babloo Kumar, “Information Security: Encryption and Decryption with Polyalphabetic Substitution Method”, International Journal of Computer Science and Communication, Vol. 2, January-June 2011.

Prof.Ravindra Babu Kallam, Dr. S.Udaya Kumar, Dr. A.Vinaya babu, V.Shravan Kumar, “A Contemporary Polyalphabetic Cipher using Comprehensive Vigenere Table”, World of Computer Science and Information Technology Journal, Vol. 1, 2011.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.5158
Published: 2025-11-13

How to Cite

[1]
R. S. Kartha and V. Paul, “Polyalphabetic Substitution Cipher Using Multiple Random Table”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 51–58, Nov. 2025.

Issue

Section

Research Article