0% found this document useful (0 votes)
19 views

Cipher Craft Design and Analysis of Advanced Crypt

Abc
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Cipher Craft Design and Analysis of Advanced Crypt

Abc
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.

1051/matecconf/202439201112
ICMED 2024

Cipher Craft: Design and Analysis of Advanced


Cryptographic Techniques for Secure
Communication Systems
Yerragudipadu Subbarayudu1, Gurram Vijendar Reddy2, Merugu Shankar2,Mailagani Ven2,
PK Abhilash3, Archana Sehgal4
1Department of AI&ML, KG Reddy College of Engineering and Technology, Moinabad, Hyderabad,
Telangana-501504
2Department of Information Technology, GRIET, India
3Department of IT, GRIET, Hyderabad, Telangana, India
4Lovely Professional University, Phagwara, Punjab, India.

Abstract. The name "cryptography" comes from a Greek word


that refers to the art of securing data by organizing it in a
disorganized and unintelligible way. It combines software
engineering with math. The explosive expansion of the Internet
has led to a greater awareness of intriguing uncertainty concerns.
Although security is the biggest concern when it comes to the
internet, many apps have been developed and designed without
taking confidentiality, authentication, and protection—the three
essential components of data security—into account. Knowing
these kinds of security problems and challenges is going to be
more important as our daily activities rely more and more on data
networks. Cryptography is necessary to prevent some unwanted
customers or persons from gaining access to the data. This study
presents a novel hybrid security cipher that combines the three
most significant ciphers, such as the Caesar, Rail Fence and
Vigenère ciphers. When compared to traditional ciphers, this
hybrid encryption cipher offers more security.

* Corresponding author: [email protected]

1 Introduction
Technology has advanced to such an extent in the modern world that the great
majority of people prefer to use the internet as their primary means of sending
data from one end of the planet to the other. Data may be communicated over the
internet in a variety of ways, including chats, messages, and more. With the
internet, data changes may be made quickly, precisely, and snappily. Anyhow, one
of the main concerns with transmitting data over the internet is the "security risk"
it poses; for instance, private or individual data may be hidden or compromised
from several angles. Thus, it turns out that thinking about data security is crucial
because it's one of the most important factors to consider while transferring data
[1].

© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative
Commons Attribution License 4.0 (https://creativecommons.org/licenses/by/4.0/).
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

An important component of an open system is security, and cryptography plays a


big role in this area. Since cryptography is ancient, it has ensured the integrity of
the public information system. However, the purpose of cryptography is not
limited to categorization; it is also employed to provide solutions for many
problems, such as data integrity, data verification, and non-denial [2].
The word "cryptography" refers to encapsulating and devising methods that
enable the transmission of critical data and information in a secure manner, with
the conscious recipient being the only one prepared to retrieve it [2].

A methodical approach and process for concealing data and information via a
communication channel is called cryptography. The data is skillfully hidden from
outsiders. The necessity for data security throughout the communication channel
is increasing largely as innovation advances gradually. The methodical process of
converting plain message text into ciphertext is known as encryption. To convert
the plain message text into cipher r, the encryption procedure requires a key and
any preprogrammed encryption method [3]. Encryption occurs at the sender's end
in the cryptography system. Prior to being sent to the recipient, the message is
executed at the sender's end using encryption.

The methodical process of decryption is the opposite of encryption. It converts the


message plaintext from the encrypted ciphertext. The decryption process in a
cryptography system is carried out at the receiving end. A key and a decryption
algorithm are two of the steps needed in the decryption algorithm process.
Asymmetric key encryption and symmetric key encryption are the two main forms
of cryptography that rely on the key, which is defined as the set of rules that
convert a unique book into jumbled information. A comparable key is used for
both encryption and decryption in symmetric key encryption. This method is
simple but innovative, and the primary problem that has to be solved is key
circulation. On the other hand, asymmetric key encryption encrypts data using the
Public and Private keys, which are mathematically connected. Everyone has
access to the public key; however, anything encrypted with a client's public key
needs to be decrypted using that client's private key, whether the sender or the
recipient.

2 Literature Survey
The security of online banking, passwords, communications, secret word
accounts, and other data necessitates content protection in automated media,
according to this article [5]. It demonstrates the security in addition to the burden
on data using the mobile encryption standard. The Polybius square has been used
to help determine the age of the key. Because of the increased number of rounds,
breaking the system will need more and more computing guessing, which will
irritate the software developer. [6] One of the simplest and best-known old-style
encryption schemes is the Caesar cipher, sometimes referred to as the shift cipher.
It is a type of substitution cipher where a letter is inserted a certain number of
positions down the alphabet to replace each letter in the plaintext. For instance, if
there were a shift of 3, A would become D, B would become E, and so on. The
encryption process carried out by a Caesar cipher is frequently used as part of

2
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

more intricate schemes, such the Vigenère cipher, and is still used in the ROT13
framework today. Like other single letters in order substitution ciphers, the Caesar
cipher is easily cracked and provides very little communication security in current
usage. [7][8] A transposition cipher is a cryptographic encryption technique in
which the locations of plaintext units are moved by a standard framework or
example, resulting in a stage of the plaintext being included in the cipher text. In
other words, when the moving procedure comes to an end, the request for the units
is modified. In terms of mathematics, an inverse function is used for decryption
and a bijective function on the locations of the letters for encoding. The fact that
the letters themselves remain unchanged implies that the influence is limited to
their placements, resulting in a message that combines their request with a few
broadly defined schemes. Many transposition ciphers are implemented according
to a geometric pattern.

A modified version of the Vigenère algorithm was presented in [9], whereby


dispersion is achieved by appending an arbitrary piece to each byte before the
message being jumbled using the Vigenère algorithm. This tactic fails the Kasiski
attack to determine the length of the key since the message is padded with erratic
fragments. This system's primary drawback is that the jumbled message will
enlarge by approximately 56%. Another way to implement the Vigenère algorithm
was described in [10]; it included naturally altering the cipher key following each
encryption stage. Progressive keys, which depended on the underlying key as an
incentive throughout the encryption process, were used in this approach.

The Vigenère cipher was adjusted by including punctuation, erratic digits, and
scientific imagery in [11]. The suggested approach used scientific graphics,
punctuation, and numbers as keys instead of letters to make it harder for an animal
power attack. It was deduced that only highly competent individuals would be
able to understand the message if irregular numbers were used for the key and to
broaden the range. Another technique [12] was devised, which combined the
stream cipher and the Vigenère substitution cipher. It included repeatedly
encrypting plaintext with different segments of the binary key or slogan. The
Vigenère encryption was used to encode the letters in even locations, while the
stream cipher was used to encode the letters in odd locations. It was deduced that
the suggested approach hides the link between plain and encrypted text, which
greatly complicates cryptanalysis.

The internet is one of the riskiest communication channels because of its vast
connections and open networks, according to Tianfu [13-20]. Protecting
information is one of the most important requirements. Currently, several security
techniques are put out to ensure communication security. Each of them has its
advantages and disadvantages. They suggested a hybrid paradigm to strengthen
the encryption algorithm. The suggested model combines DES and AES. Both
techniques are very capable of encryption and use the symmetric key strategy.
Strong encryption security would result from the combination of DES and AES.
With the suggested solution, outcomes have significantly improved.

The most significant security measures for data protection that have previously
been approved by cloud computing providers were examined and assessed by

3
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

Jakimoski et al. [20-30]. Based on the security methods they offer, they have been
categorized into four sections: authorization, access control, confidentiality, and
authentication. They conclude that cloud computing may be trusted to secure data
provided all suggested precautions are followed, including those that offer access
control, authorization, secrecy, and authentication. They concentrated on the
security concerns that needed to be carefully considered to provide adequate data
protection in the cloud. They made significant security recommendations that
need to be considered to safeguard data in the cloud.

3 System Architecture

Plain Text

Encryption

Cipher Text

Decryption

Plain Text

Fig. 1. System Architecture.

4 Methodology

The strategy's encryption method combines the Ceaser, Rail Fence ciphers with
the Vigenère cipher. The Ceaser cipher will be used to work on the ciphertext first.
The procedure will begin with an arbitrarily selected key. The next ciphertext
becomes a key for the Rail Fence Cipher and again the next ciphertext becomes a
key for the Vigenère Cipher procedure towards the end of the process. The
message, which is the plaintext, is worked on using the key to produce the final
ciphertext. As a result, the final ciphertext will become increasingly difficult to
decipher using current cryptanalysis techniques. The recipient will decrypt in
reverse order to obtain a message from the sender.

Using Python coding, a product application will be created to demonstrate the


calculation's viability, and the ciphertext will be subjected to several
cryptoanalysis techniques. The Hybrid Algorithm is illustrated in a flowchart in

4
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

Figure 2. The mathematical approach to Ciphers involves encryption and


decryption phase with shift ‘n’. This can be formulated as:

En(x) = (x + n) mod 26 (1)


(Encryption Phase with shift n)

Using (1), one may convert plaintext into ciphertext as shown below.
Plaintext: SECURITY
Key: LIONLION
Ciphertext: DMQHCQHL

Dn(x) = (x - n) mod 26 (2)


(Decryption Phase with shift n)

Using (2), one may again convert ciphertext into plaintext as shown below.
Ciphertext: DMQHCQHL
Key: LIONLION
Plaintext: SECURITY

Fig. 2. Flowchart of Hybrid Algorithm.

5
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

5 Methods:
5.1 Ceaser Cipher
Julius Caesar is credited with creating the straightforward substitution cipher
encryption method known as the Caesar cipher. It entails moving every letter in
plaintext up or down the alphabet by a certain number of places. There would be
a three-step shift: "A" would go to "D," "B" to "E," and so on. Because the
alphabet is iterated over, "Z" would become "C." Reversing the shift is necessary
for decryption. Despite the Caesar cipher's historical significance, its small key
space makes it susceptible to brute force attacks. Nonetheless, it is a fundamental
concept in cryptography and serves to demonstrate the concepts of substitution
ciphers.

Fig. 3. Ceaser Cipher Algorithm.

5.2 Rail Fence Cipher:

A transposition cipher known as "Rail Fence" rearranges plaintext letters by


printing them over a sequence of "rails" or lines diagonally in a zigzag pattern.
The ciphertext is then created by reading off the plaintext horizontally. The zigzag
pattern's depth is determined by the number of rails. For instance, when there are
three rails, the plaintext is written horizontally and zigzags over three lines. The
procedure is reversed to decrypt. Although the Rail Fence cipher is a
straightforward and antiquated encryption method, it is not frequently employed
for secure communication in contemporary cryptography because to its ease of
frequency analysis deciphering.

Fig. 4. Rail Fence Cipher Algorithm.

6
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

5.3 Vigenère Cipher:

Using a polyalphabetic substitution technique, the Vigenère cipher shifts each


letter in accordance with a keyword to encrypt text. It uses an alphabet table,
usually a 26 × 26 grid called the Vigenère square. The degree of shift for each
letter in the plaintext is determined by the keyword. The plaintext letter "P"
becomes "Z" after shifting by 10, "D" after shifting by 4, and "I" after shifting by
24, for example, if the keyword is "KEY" and the plaintext letter is "P." "K"
corresponds to a shift of 10, "E" to 4, and "Y" to 24. When compared to
straightforward replacement techniques, this strategy improves the cipher's
security.

Fig. 5. Vigenère Cipher Algorithm

7
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

6 Experiment Results

6.1 Output

Fig. 6. Output

7 Conclusion
Cryptography is the generally utilized technique for the security of data. In
conclusion, super ciphers, which combine multiple cryptographic algorithms,
offer an effective approach to enhance security in encryption systems. By
leveraging the strengths of different ciphers and techniques, super ciphers
provide robust encryption, secure key exchange, integrity verification, and
resistance against various attacks. The use of super ciphers in applications
such as secure messaging systems, file transfer protocols, and distributed
systems can significantly enhance data confidentiality and integrity.
However, it is vital to ensure careful design, implementation, and analysis of
the individual components to achieve a high level of security in super ciphers.
Cryptographic techniques that are viewed as least complex and most
vulnerable because of numerous impediments. To conquer the impediments
of normal cipher we proposed an upgraded variant as extra use of 3 different
Key that is a lot of secure against Kasiski and Friedman assaults.
Cryptanalysis, frequency analysis, pattern prediction and brute attack on
proposed technique are also much more difficult due to use of multiples
tables for encryption. The modified hybrid of ciphers with extra keys there is
now a high percentage of Diffusion and Confusion in the algorithm that
generates them making it a very strong cipher and difficult to break. Although
there are numerous cryptographic strategies, this space still requires genuine

8
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

consideration of research networks for the improvement of data security. In


future our point is to give approval of the proposed approach by performing
security and performance analysis.
References
1. S. Chaudhari, M. Pahade, S. Bhat, C. Jadhav, and T. Sawant, “A research paper
on new hybrid cryptography algorithm.”
2. K. Jakimoski, “Security techniques for data protection in cloud computing,”
International Journal of Grid and Distributed Computing, vol. 9, no. 1, pp. 49–56,
2016.
3. A. A. Soofi, I. Riaz, and U. Rasheed, “An enhanced vigenere cipher for ` data
security,” Int. J. Sci. Technol. Res, vol. 5, no. 3, pp. 141–145, 2016.
4. P. Kumar and S. B. Rana, “Development of modified aes algorithm for data
security,” Optik, vol. 127, no. 4, pp. 2341–2345, 2016.
5. A. Saraswat, C. Khatri, P. Thakral, P. Biswas et al., “An extended hybridization of
vigenere and caesar cipher techniques for secure com- ´ munication,” Procedia
Computer Science, vol. 92, pp. 355–360, 2016.
6. J. Chen and J. S. Rosenthal, “Decrypting classical cipher text using markov chain
monte carlo,” Statistics and Computing, vol. 22, no. 2, pp. 397–413, 2012.
7. M. B. Pramanik, “Implementation of cryptography technique using columnar
transposition,” International Journal of Computer Applications, vol. 975, p. 8887,
2014.
8. C. Sanchez-Avila and R. Sanchez-Reillol, “The rijndael block cipher (aes
proposal): a comparison with des,” in Proceedings IEEE 35th Annual 2001
International Carnahan Conference on Security Technology (Cat. No.
01CH37186). IEEE, 2001, pp. 229–234.
9. Q.-A. Kester, “A cryptosystem based on vigenere cipher with varying ` key,”
International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET), vol. 1, no. 10, pp. 108–113, 2012.
10. C. Bhardwaj, “Modification of vigenere cipher by random numbers, `
punctuations & mathematical symbols,” Journal of Computer Engineering
(IOSRJCE) ISSN, pp. 2278–0661, 2012.
11. F. M. S. Ali and F. H. Sarhan, “Enhancing security of vigenere cipher ` by stream
cipher,” International Journal of Computer Applications, vol. 100, no. 1, pp. 1–4,
2014.
12. P. Gutmann, Cryptographic security architecture: design and verification.
Springer Science & Business Media, 2003.
13. A. P. U. Siahaan, “Protection of important data and information using gronsfeld
cipher,” 2018.
14. S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data security using
vigenere cipher and goldbach codes algorithm,” ` Int. J. Eng. Res. Technol, vol. 6,
no. 1, pp. 360–363, 2017.
15. M. Maity, “A modified version of polybius cipher using magic square and
western music notes,” International Journal For Technological Research In
Engineering, ISSN, pp. 2347–4718, 2014.
16. Syed Umar, Yerragudipadu Subbarayudu,K. Kiran Kumar, N. Bashwanth,
“Designing of Dynamic Re-clustering Leach Protocol for Calculating Total
Residual Time and Performance”,International Journal of Electrical and
Computer Engineering (IJECE)Vol.7, No.3, June2017, pp. 1286~1292ISSN:

9
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

2088-8708, DOI: 10.11591/ijece.v7i3.pp1286-1292


17. Yerragudipadu Subba Rayudu,R M Noorullah and C Praveen Kumar, Scribble
Legalization Cryptographic Aspect Based On Data Access Control For Steam
Count, VOL. 13, NO. 8, APRIL 2018 ISSN 1819-6608 , “ARPN Journal of
Engineering and Applied Sciences” ©2006-2018 Asian Research Publishing
Network (ARPN).
18. Subbarayudu Y, Reddy R.O. Anjaiah, P. “A study on user mobility in device to
device (D2D) networks through distrubted catching” , IEEE International
Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI
2017.2018 DOI: 10.1109/ICPCSI.2017.8391798 EID: 2-s2.0-85050095042,
URL: http://www.scopus.com/inward/record.url?Eid=2-s2.0-
85050095042&partnerid=MN8TOARS

19. Subbarayudu Y. Rakesh, M. Lingappa, E. Umar, S.,” Overview of the new


bioinformatics virus goes from the front of next generation sequencing in
genomics based on datamining”, Proceedings of the 2017 International
Conference on Intelligent Computing and Control Systems,2018 , DOI:
10.1109/ICCONS.2017.8250670 ,EID: 2-s2.0-85047447491,
URL:Http://www.scopus.com/inward/record.url?Eid=2-s2.0-
85047447491&partnerid=MN8TOARS
20. “Subbarayudu Y.” “Patil, S.” “ Ramyasree, B.” “ Praveen Kumar, C.” “Geetha,
G” , Assort-EHR graph based semi-supervised classification algorithm for mining
health records, Journal of Advanced Research in Dynamical and Control Systems
2017 .EID: 2-s2.0-85058439255
21. Umar, S., Sridevi, G., Subbarayudu Y., Nath, N.Y. “Datamining based
multimode approach for estimating the risk under heart failure cases” , Journal of
Theoretical and Applied Information Technology Volume 95, Issue 16, 31
August 2017, Pages 3879-3883
22. Yerragudipadu subbarayudu , alladi Sureshbabu “Distributed Multimodal
Aspective on Topic Model Using Sentiment Analysis for Recognition of Public
Health Surveillance” Expert Clouds and Applications, 16 July 2021, DOI:
https://doi.org/10.1007/978-981-16-2126-0_38 Springer, Singapore Print ISBN
978-981-16-2125-3 Online ISBN 978-981-16-2126-0
23. Yerragudipadu Subbarayudu , Adithi Soppadandi , Shreya Vyamasani and
Supriya Bandanadam1, The Distributed Deep Learning Paradigms for Detection
of Weeds from Crops in Indian Agricultural Farms, E3S Web of Conferences
391, 01057 (2023) https://doi.org/10.1051/e3sconf/202339101057 ICMED-
ICMPC 2023.
24. Subbarayudu Yerragudipadu , Vijendar Reddy Gurram ,Navya Sri Rayapudi ,
Bhavana Bingi , Likhitha Gollapalli1 and Ukritha peddapatlolla, An Efficient
Novel Approach on Machine Learning Paradigmsfor Food Delivery Company
through Demand Forecastıng in societal community, E3S Web of Conferences
391, 01089 (2023) https://doi.org/10.1051/e3sconf/202339101089 ICMED-
ICMPC 2023.
25. Yerragudipadu Subbarayudu , G Vijendar Reddy , M Vamsi Krishna Raj , K
Uday , MD Fasiuddin , and P Vishal, An efficient novel approach to E-commerce
retail price optimization through machine learning, E3S Web of Conferences 391,
01104 (2023) https://doi.org/10.1051/e3sconf/202339101104 ICMED-ICMPC
2023.
26. Subbarayudu, Y., Sureshbabu, A. (2023). A distributed densely connected
convolutional network approach for enhanced recognition of health-related

10
MATEC Web of Conferences 392, 01112 (2024) https://doi.org/10.1051/matecconf/202439201112
ICMED 2024

topics: A societal analysis case study. Ingénierie des Systèmes d’Information,


Vol. 28, No. 3, pp. 677-684. https://doi.org/10.18280/isi.280317
27. P. Gopal Krihsna, Yerragudipadu Subbarayudu, S. Sai Siva Kumar, D. Naveen,
Abhishek Srivastava and K. Thangamani “IoT Sensor-based sustainable smart
home management for human needs through Micro Controller” Published online:
06 October 2023 DOI: https://doi.org/10.1051/e3sconf/202343001079

28. P. Gopal Krihsna, Yerragudipadu Subbarayudu, S. Sai Siva Kumar, D. Naveen,


Abhishek Srivastava and K. Thangamani IoT Sensor-based sustainable smart
home management for human needs through Micro Controller Published online:
06 October 2023 DOI: https://doi.org/10.1051/e3sconf/202343001079

29. P. Gopal Krihsna, Yerragudipadu Subbarayudu, K. Mythili Rao, V. Jyoshna,


Jumaid Aman and G. Vijendar Reddy An Efficient, Novel, and Sustainable IoT-
Based Approach for Attendance Detection through RFID Module and IR Sensor
Published online: 06 October 2023 DOI:
https://doi.org/10.1051/e3sconf/202343001096

30. Subbarayudu Yerragudipadu, Alladi Sureshbabu ,”The Evaluation of Distributed


topic models for recognition of health-related topics in social media through
Machine Learning Paradigms” International Journal of Intelligent Systems and
Applications in Engineering (IJISAE), https://ijisae.org ISSN:2147-6799,2023

11

You might also like