Cipher Craft Design and Analysis of Advanced Crypt
Cipher Craft Design and Analysis of Advanced Crypt
1051/matecconf/202439201112
ICMED 2024
1 Introduction
Technology has advanced to such an extent in the modern world that the great
majority of people prefer to use the internet as their primary means of sending
data from one end of the planet to the other. Data may be communicated over the
internet in a variety of ways, including chats, messages, and more. With the
internet, data changes may be made quickly, precisely, and snappily. Anyhow, one
of the main concerns with transmitting data over the internet is the "security risk"
it poses; for instance, private or individual data may be hidden or compromised
from several angles. Thus, it turns out that thinking about data security is crucial
because it's one of the most important factors to consider while transferring data
[1].
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative
Commons Attribution License 4.0 (https://creativecommons.org/licenses/by/4.0/).
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
A methodical approach and process for concealing data and information via a
communication channel is called cryptography. The data is skillfully hidden from
outsiders. The necessity for data security throughout the communication channel
is increasing largely as innovation advances gradually. The methodical process of
converting plain message text into ciphertext is known as encryption. To convert
the plain message text into cipher r, the encryption procedure requires a key and
any preprogrammed encryption method [3]. Encryption occurs at the sender's end
in the cryptography system. Prior to being sent to the recipient, the message is
executed at the sender's end using encryption.
2 Literature Survey
The security of online banking, passwords, communications, secret word
accounts, and other data necessitates content protection in automated media,
according to this article [5]. It demonstrates the security in addition to the burden
on data using the mobile encryption standard. The Polybius square has been used
to help determine the age of the key. Because of the increased number of rounds,
breaking the system will need more and more computing guessing, which will
irritate the software developer. [6] One of the simplest and best-known old-style
encryption schemes is the Caesar cipher, sometimes referred to as the shift cipher.
It is a type of substitution cipher where a letter is inserted a certain number of
positions down the alphabet to replace each letter in the plaintext. For instance, if
there were a shift of 3, A would become D, B would become E, and so on. The
encryption process carried out by a Caesar cipher is frequently used as part of
2
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
more intricate schemes, such the Vigenère cipher, and is still used in the ROT13
framework today. Like other single letters in order substitution ciphers, the Caesar
cipher is easily cracked and provides very little communication security in current
usage. [7][8] A transposition cipher is a cryptographic encryption technique in
which the locations of plaintext units are moved by a standard framework or
example, resulting in a stage of the plaintext being included in the cipher text. In
other words, when the moving procedure comes to an end, the request for the units
is modified. In terms of mathematics, an inverse function is used for decryption
and a bijective function on the locations of the letters for encoding. The fact that
the letters themselves remain unchanged implies that the influence is limited to
their placements, resulting in a message that combines their request with a few
broadly defined schemes. Many transposition ciphers are implemented according
to a geometric pattern.
The Vigenère cipher was adjusted by including punctuation, erratic digits, and
scientific imagery in [11]. The suggested approach used scientific graphics,
punctuation, and numbers as keys instead of letters to make it harder for an animal
power attack. It was deduced that only highly competent individuals would be
able to understand the message if irregular numbers were used for the key and to
broaden the range. Another technique [12] was devised, which combined the
stream cipher and the Vigenère substitution cipher. It included repeatedly
encrypting plaintext with different segments of the binary key or slogan. The
Vigenère encryption was used to encode the letters in even locations, while the
stream cipher was used to encode the letters in odd locations. It was deduced that
the suggested approach hides the link between plain and encrypted text, which
greatly complicates cryptanalysis.
The internet is one of the riskiest communication channels because of its vast
connections and open networks, according to Tianfu [13-20]. Protecting
information is one of the most important requirements. Currently, several security
techniques are put out to ensure communication security. Each of them has its
advantages and disadvantages. They suggested a hybrid paradigm to strengthen
the encryption algorithm. The suggested model combines DES and AES. Both
techniques are very capable of encryption and use the symmetric key strategy.
Strong encryption security would result from the combination of DES and AES.
With the suggested solution, outcomes have significantly improved.
The most significant security measures for data protection that have previously
been approved by cloud computing providers were examined and assessed by
3
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
Jakimoski et al. [20-30]. Based on the security methods they offer, they have been
categorized into four sections: authorization, access control, confidentiality, and
authentication. They conclude that cloud computing may be trusted to secure data
provided all suggested precautions are followed, including those that offer access
control, authorization, secrecy, and authentication. They concentrated on the
security concerns that needed to be carefully considered to provide adequate data
protection in the cloud. They made significant security recommendations that
need to be considered to safeguard data in the cloud.
3 System Architecture
Plain Text
Encryption
Cipher Text
Decryption
Plain Text
4 Methodology
The strategy's encryption method combines the Ceaser, Rail Fence ciphers with
the Vigenère cipher. The Ceaser cipher will be used to work on the ciphertext first.
The procedure will begin with an arbitrarily selected key. The next ciphertext
becomes a key for the Rail Fence Cipher and again the next ciphertext becomes a
key for the Vigenère Cipher procedure towards the end of the process. The
message, which is the plaintext, is worked on using the key to produce the final
ciphertext. As a result, the final ciphertext will become increasingly difficult to
decipher using current cryptanalysis techniques. The recipient will decrypt in
reverse order to obtain a message from the sender.
4
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
Using (1), one may convert plaintext into ciphertext as shown below.
Plaintext: SECURITY
Key: LIONLION
Ciphertext: DMQHCQHL
Using (2), one may again convert ciphertext into plaintext as shown below.
Ciphertext: DMQHCQHL
Key: LIONLION
Plaintext: SECURITY
5
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
5 Methods:
5.1 Ceaser Cipher
Julius Caesar is credited with creating the straightforward substitution cipher
encryption method known as the Caesar cipher. It entails moving every letter in
plaintext up or down the alphabet by a certain number of places. There would be
a three-step shift: "A" would go to "D," "B" to "E," and so on. Because the
alphabet is iterated over, "Z" would become "C." Reversing the shift is necessary
for decryption. Despite the Caesar cipher's historical significance, its small key
space makes it susceptible to brute force attacks. Nonetheless, it is a fundamental
concept in cryptography and serves to demonstrate the concepts of substitution
ciphers.
6
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
7
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
6 Experiment Results
6.1 Output
Fig. 6. Output
7 Conclusion
Cryptography is the generally utilized technique for the security of data. In
conclusion, super ciphers, which combine multiple cryptographic algorithms,
offer an effective approach to enhance security in encryption systems. By
leveraging the strengths of different ciphers and techniques, super ciphers
provide robust encryption, secure key exchange, integrity verification, and
resistance against various attacks. The use of super ciphers in applications
such as secure messaging systems, file transfer protocols, and distributed
systems can significantly enhance data confidentiality and integrity.
However, it is vital to ensure careful design, implementation, and analysis of
the individual components to achieve a high level of security in super ciphers.
Cryptographic techniques that are viewed as least complex and most
vulnerable because of numerous impediments. To conquer the impediments
of normal cipher we proposed an upgraded variant as extra use of 3 different
Key that is a lot of secure against Kasiski and Friedman assaults.
Cryptanalysis, frequency analysis, pattern prediction and brute attack on
proposed technique are also much more difficult due to use of multiples
tables for encryption. The modified hybrid of ciphers with extra keys there is
now a high percentage of Diffusion and Confusion in the algorithm that
generates them making it a very strong cipher and difficult to break. Although
there are numerous cryptographic strategies, this space still requires genuine
8
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
9
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
10
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024
11