Polyalphabetic Substitution Cipher Using Multiple Random Table
DOI:
https://doi.org/10.26438/ijcse/v6i5.5158Keywords:
Polyalphabetic Cipher, Vigenere Cipher, Vigenere Table, Kasiski Method, Index of Coincidence ICAbstract
There are many cryptographic techniques available for providing a secure communication. Encryption technique can be classified according to their encrypting process. They are substitution cipher and transposition cipher. Polyalphabetic cipher is based on substitution technique- the plaintext letters are encrypted differently depending upon their placement in the text and the keyword. Vigenere cipher is considered to be the most efficient and simplest Polyalphabetic substitution cipher. Due to its repeating nature of the keyword, it is vulnerable to attacks. To overcome this, here we are presenting a new cipher which uses multiple random Tables (26x26) for encryption. In this proposed cipher, the keyword is repeating until it is equal to the length of the plaintext. But here, whenever the keyword repeats, this cipher generates different 26x26 random tables for encryption. Also, each table will be completely independent of the previous table. So this proposed Polyalphabetic cipher is unbreakable.
References
Sakshi Dubey, Darpan Anand, Jayash Sharma, "LFSR Based Block Cipher Technique for Text” International Journal of Computer Sciences and Engineering, Vol.6, Issue.2, pp.54-60, 2018.
P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy, "Modular Encryption Algorithm for Secure Data Transmission”, The International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue. 1, Feb 2018.
Benni Purnama, HettyRohayani A. H, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted”, International Conference on Computer Science and Computational Intelligence (ICCSCI 2015).
Behrouz A Forouzan, “Cryptography and Network Security”, Tata McGraw-Hill Publishing Company Limited, 2007.
A. Eskicioglu and L. Litwin, “Cryptography”, IEEE Potentials, Vol. 20, Issue. 1, pp. 36-38February/March 2001.
Ranju S Kartha, Dr. Varghese Paul, “ Survey: Recent Modifications in Vigenere cipher”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 2, Ver. IX, Mar-Apr. 2014.
Abdul Razzaq and Yasir Mahmood, Farooq Ahmed, “Strong Key Mechanism Generated by LFSR based Vigenère Cipher”, The 13th International Arab Conference on Information Technology, ACIT'’2012, Dec.10-13
Alfred J. Menezes, Paul C. van Oorschot, Scott A., “Handbook of Applied Cryptography”, CRC Press, 1996.
Navnish Goel, Amitabh Maurya, Babloo Kumar, “Information Security: Encryption and Decryption with Polyalphabetic Substitution Method”, International Journal of Computer Science and Communication, Vol. 2, January-June 2011.
Prof.Ravindra Babu Kallam, Dr. S.Udaya Kumar, Dr. A.Vinaya babu, V.Shravan Kumar, “A Contemporary Polyalphabetic Cipher using Comprehensive Vigenere Table”, World of Computer Science and Information Technology Journal, Vol. 1, 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
