0% found this document useful (0 votes)
7 views

Base

The paper presents a hybrid cryptography system that combines the Vigenère Cipher and Polybius Cipher to enhance data security over communication channels. It discusses the importance of cryptography in protecting information against unauthorized access, highlighting the need for confidentiality, authentication, and data integrity. The proposed hybrid cipher aims to provide greater security compared to traditional ciphers by utilizing a systematic encryption and decryption process.

Uploaded by

divyad8809
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Base

The paper presents a hybrid cryptography system that combines the Vigenère Cipher and Polybius Cipher to enhance data security over communication channels. It discusses the importance of cryptography in protecting information against unauthorized access, highlighting the need for confidentiality, authentication, and data integrity. The proposed hybrid cipher aims to provide greater security compared to traditional ciphers by utilizing a systematic encryption and decryption process.

Uploaded by

divyad8809
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

2020 International Conference on Computational Performance Evaluation (ComPE),

North-Eastern Hill University, Shillong, Meghalaya, India. July 2–4, 2020

Design of Hybrid Cryptography System based on


Vigenère Cipher and Polybius Cipher
Shivam Vatshayan Raza Abbas Haidri Jitendra Kumar Verma
School of Computing Science & Engg. School of Computing Science & Engg. Amity School of Engg. & Technology
Galgotias University Galgotias University Amity University Haryana
Greater Noida, India Greater Noida, India Gurugram (Manesar), India
[email protected] [email protected] [email protected]

Abstract—The Cryptography is gotten from a Greek word structure so that the main individual ready to recover this
which implies the craft of ensuring data by changing it into information is the conscious beneficiary [2].
a muddled organization and unreadable format. It is a mix of Cryptography is a systematic technique and procedure to
arithmetic and software engineering. The dynamite growth of
the Internet has made an expanded familiarity with intrigue hide the data and information over a communication channel.
uncertainty issues. Even though security is the measure worries It is a craftsmanship to hide the data from outsiders. As the
over the internet, numerous applications have been created and innovation grows step by step the need for data security over
structured without considering fundamental destinations of data the communication channel is expanded to a high degree.
security that is confidentiality, authentication, and protection. As Encryption is defined as a systematic procedure of changing
our day by day exercises become increasingly more dependent
upon data networks, the significance of an understanding of over plain message text into ciphertext. Encryption process
such security issues and trouble will also increase. To forestall needs any programmed encryption algorithm and a key to
some undesirable clients or individuals to gain admittance to the change over the plain message text into cipher r [3]. In the
data, cryptography is required. .This paper introduces a new cryptography system encryption execute at the message sender
hybrid security cipher by combining the two most important side. Encryption executes the message at sender’s side before
Ciphers such as Polybius Cipher and Vigenère Cipher. This
hybrid encryption cipher provides greater security as compared sending it to the receiver.
to classic ciphers. Decryption is an opposite systematic procedure of encryp-
Index Terms—Encryption, Cryptography, Polybius Ciphers, tion. It transforms the encrypted ciphertext into a message
Vigenère Ciphers plaintext. In cryptography system decryption procedure exe-
cute at the receiver side. The process of decryption algorithm
I. I NTRODUCTION requires a couple of steps such as - a Decryption algorithm
In the present direction of the world, the innovations have and a key.
progressed so much that the vast majority of the people incline Cryptography is extensively isolated into two classes relying
toward utilizing the internet as the essential intends to consign on the Key; which is characterized as the guidelines used
data starting with one end then onto the next over the world. to change over a unique book into scrambled content: -
There are numerous potential approaches to communicate data Asymmetric Key Encryption and Symmetric Key Encryption.
utilizing the internet: through messages, talks, and so on. The A symmetric key encryption utilizes a similar key for de-
data change is made very snap, quick and exact utilizing the cryption and encryption processes. This system is a basic
internet. In any case, one of the primary tests with sending yet groundbreaking yet key circulation is the main issue that
data over the internet is the “security risk” it presents, for should be addressed. While asymmetric key encryption utilizes
example, the individual or privy data can be packed away or two mathematically related keys: Public Key and Private Key
hacked from various perspectives. In this way, it turns out to for encryption. The public key is accessible to everybody
be essential to mull over data security, as it is one of the most except the data once encoded by the public key of any client
vital variables that need consideration during the process of must be decrypted by the private key of that specific client as
data transfer [1]. either sender or receiver.
Security is a significant factor in the open system and
cryptography assumes a significant job in this field. Cryptog- II. L ITERATURE S URVEY
raphy is old and made sure about the system of information In the security for web keeping money, account pass-
out in the open system. Be that as it may, the goal of words, messages account secret word, etc requires content
cryptography is utilized not exclusively to give classification, protection in mechanized media [4]. It shows the security
yet in addition to giving arrangements to different issues: data besides, pressure for the information with the move encryption
trustworthiness, verification, non-denial [2]. Cryptography is a standard. The Number of continuous rounds increases the
term defined as encapsulating and contriving techniques which greater security that can be break by active and passive attacks
permit important information and data to be sent in a protected by software engineers, intruders and hackers.

978-1-7281-6644-5/20/$31.00 © 2020 IEEE


848

Authorized licensed use limited to: University of New South Wales. Downloaded on September 19,2020 at 19:31:30 UTC from IEEE Xplore. Restrictions apply.
Caesar cipher, otherwise called the shift cipher, is least posed to accomplish security during communication. Every
perplexing and large known old-style encryption systems. It one of them has certain valid statements and certain awful
is a sort of replacement cipher in which each letter in the points. To improve the quality of the encryption algorithm
plaintext is supplanted. For instance, with a move of 2, A they proposed a hybrid model. The proposed model is a blend
would be supplanted by C, B would become D, and similarly. combination of AES and DES algorithmic cryptographic. The
The encryption technique system performed by Caesar ciphers two algorithms are symmetric key procedure and itself they
is a combination and thoroughly goes together as a disputed are especially able for encryption. Reconciliation of AES and
and complex growth plan as Vigenère Cipher and to date, DES would give a solid degree of security at encryption end.
it has advantages in the ROT13 framework and paraphrase A critical improvement in results has been seen with the
system. Similarly, in substitution ciphers, the Caesar cipher is proposed arrangement [12].
effortlessly and discreetly broken and in present-day structure,
III. T HEORIES
the use shows no correspondence security and protection [5].
Caesar Cipher’s strategy is one of the soonest and least PCs will be undependable if they are associated with a
complex techniques for the encryption method. Its a kind of worldwide system, particularly the internet [2]. The locales
replacement cipher, i.e., each letter of a given text is supplanted visited a great extent have infections, malware or the like that
by a letter some fixed number of positions down the letters in can take singular data from a PC. Security is fundamental
order. For instance, with a move of 1, M would be supplanted to keep up a key good way from data replication, stealing,
by N, N would become O, and so on. This technique is named visualizing, detection and intrusion. The core of PC security
after Julius Caesar, who utilized it to speak with his authorities. is done to guarantee the PC and its system to ensure the data
Accordingly, to cipher a given text we need a whole number safe and secure inside the system [13].
worth, known as a move which demonstrates the quantity of PC security works and incorporates a few angles, for
position each letter of the the text has been descended. example:
The transposition cipher is a process and adaptive system • Privacy is usually that is confidential. The fact of the
of encryption system by which location and position held by matter is anticipation with the goal that unapproved
units of plaintext are moved by a standard structure or model individuals don’t get to information and data. Avoidance
so that the ciphertext includes a phase of the plaintext. The is conceivable to utilize encryption innovation, so just the
location is the main substitute that is always occupied and pre information proprietor can discover genuine information.
location movement by given derived metric graph that can be • Confidentiality involves a set of rules or a promise
used by string or message given by the sender [6] [7]. usually executed through confidentiality rule agreements
In [8] changed variation of Vigenère cipher algorithm was that limit access or places restrictions on certain types
derived as scrabbled and scattering is given by combination of information. It shows when requested to demonstrate
and summation of a subjective piece to each byte and bits somebody’s wrongdoing, regardless of whether the in-
before the message and string are mixed using the system formation keeper will offer information to the individual
Vigenère cipher. This procedure crashes and burns the so- who mentioned it or keep up the customers.
called Kasiski attack to find the length of the key because • Non-repudiation is the process that sides to the capac-
of the padding of the message and string with sporadic bits. ity to guarantee that involved with an agreement or a
The central drawback and nil improvement of this framework communication can’t prevent the realness from securing
are that the size of the mixed text and string will be expanded their mark on an archive or the sending of a message that
by approximately calculated 56%. they started. To disavow intends to deny. For a long time,
Another strategy for executing the Vigenère algorithm was specialists have looked to make repudiation unthinkable
introduced and brought up as through normally and system- in certain circumstances. We may send enlisted mail, for
atically for encryption and diffusion of message need key to instance, so the beneficiary can’t deny that a letter was
be replaced again and again. But here primary keys act as conveyed. Thus, an authoritative archive regularly expects
Continuation for exchange of replaced key for the process [9]. observers to mark with the goal that the individual who
New technique has been Introduced in this paper as Vi- signs can’t deny having done as such. On the Internet,
genere Cipher constitute alphabetic numerical and punctuation an advanced mark is utilized not exclusively to guarantee
marks as colon, comma, semicolon, question marks, underline, that a message or report has been electronically marked
full stop and brackets are used as the key instead of character by the individual that implied to sign the archive, yet
to formed it increasingly hard for active and passive assault additionally, since a computerized mark must be made
and attacks and spreading this spread the rang, so literate by one individual, to guarantee that an individual can’t
people who understand basic of cryptography can recognize later deny that they outfitted the mark.
the message [10] [11]. • Integrity, Data integrity defines as alludes to the depend-
It addresses that the internet is one of the most perilous ability and reliability of data all through its lifecycle. It
communication medium because of immense association and can portray the condition of your data e.g., substantial or
open system. Data assurance is one of the basic parametric invalid or the process of guaranteeing and protecting the
prerequisite. At present different security algorithms are pro- legitimacy and precision of data.

849

Authorized licensed use limited to: University of New South Wales. Downloaded on September 19,2020 at 19:31:30 UTC from IEEE Xplore. Restrictions apply.
• Authentication is a safety effort planned and processed
to build up the legitimacy and oneness of a transmission,
message, or pre originator, or methods for checking a
persons authorization to get explicit classifications of
data. It is done to verify the login user who is trying
to log in for the procurement of the message. It checks
first the user details for login as username and password.
Then after checking the whole details, it allows entering
the system. It is an important process for the protection
of Information.
• Availability ensures that systems, applications and data
are accessible to clients when they need them. The
most widely recognized assault that impacts accessibility
is disavowal of administration in which the assailant
interferes with access to data, framework, gadgets or
other network assets. A refusal of administration in an
inward vehicular network could bring about an ECU not
having the option to access the data expected to work Fig. 1: Vigenère Square Table
and the ECU could become nonoperational or even most
noticeably terrible it could carry the framework to a
hazardous state. To keep away from accessibility issues, Encryption:
it is important to incorporate repetition ways and failover
The main letter of the plaintext, alphabet S is that is in a
procedures in the planning stage, just as to incorporate
row combined with alphabet L is the key that is a column, the
interruption avoidance systems that can monitor network
primarily given letter of the sender and receiver side key that
traffic design, decide whether there is an abnormality and
results in the output as D. Then E is a row and key I is a
square network traffic when required.
column now it will result as M in the crossover of both rows
Cryptography has four fundamental parts, for example: as Message by sender and column as the key. Similarly, other
1) The plaintext is defined as a message that can be perused. letters will be processed in the same format and will result in
2) The ciphertext is a random unscripted, disputed and an encoded message. The plaintext (P ) and key (K) is added to
informal message that is unable to be perused. the modulus of 26.
3) The key is a vital aspect for defining the cryptographic The plaintext (P ) and key (K) are added to modulus of 26.
techniques such as symmetric and asymmetric.
4) An algorithm is a procedural solution to execute encryp-
tion and decryption algorithms in the system. Ei = [Pi + Ki ]modulus(26) (1)
Cipher: IIn cryptography, a cipher (or cipher) is an algo-
Using (1), one may convert plaintext into ciphertext as
rithm for performing encryption or decryption (unscrambling)
shown below.
a progression of very much characterized advances that can
be followed as a method. Another option, less regular term Plaintext: SECURITY
is encipherment. To encipher or encode is to change over Key: LIONLION
data from plaintext into cipher or code. In nontechnical use, a Ciphertext: D M Q H C Q H L
’cipher’ is a similar thing as a ’code’; nonetheless, the ideas
are unmistakable in cryptography. In customary cryptography, Decryption:
ciphers were recognized from codes. Codes usually substitute Decryption is resulted by systematically heading off to the
differing length arrangement of characters in the yield, while row in the table comparing to key, finding the situation of the
ciphers regularly substitute an unclear number of characters ciphertext letter that is in this row, and afterward utilizing the
from are input. There are exceptional cases and some cipher column’s name as plaintext. As an instance, in row L (from
systems may use possibly more, or less, characters when yield LIONLION) that is key, and the ciphertext appears D in the
versus the number that was input. column, which will result in the plaintext output as S in the
row. So, similarly, the other alphabets will be seen in row and
A. Vigenère Cipher
column and then the exact plaintext will come as output.
Vigenère Cipher is a strategy for scrambling [A to Z] letters The simpler and easier approach is to view Vigenère log-
message. It utilizes a basic type of polyalphabetic replacement. arithmically and changing over alphabets [A-Z] into numeri-
A polyalphabetic cipher is known cipher that is dependent on cally as [0-25].
replacement, utilizing numerous replacement letter sets .The
encapsulation of the first plaintext is finished utilizing the
Vigenère square table [14]. Di = (Ei − Ki + 26)modulus26 (2)

850

Authorized licensed use limited to: University of New South Wales. Downloaded on September 19,2020 at 19:31:30 UTC from IEEE Xplore. Restrictions apply.
Fig. 2: Polybius Square

B. Polybius Square Cipher

The Polybius square is shown as a figure of 5x5 grids


occupied with letters inside for encryption. Polybius Square
is a table that permits somebody to change over letters into
numbers. To make the encryption minimal harder, this table Fig. 3: Flowchart of Hybrid Algorithm
can be randomized and imparted to the beneficiary. To fit the
26 letters of the letters in order into the 25 cells made by
the table, the letters ’I’ and ’J’ are generally consolidated into A. Encryption
a solitary cell. Initially, there was no such issue because the Phase 1 (Vigenère Cipher)
old Greek letters in order have 24 letters. A table of greater
STEP1: MESSAGE - AMERICANVIRUS
size could be utilized if a language contains a huge number
STEP2: KEY- DELHI
of letters in order [15].
STEP3: OUTPUT- DQPYQFEYCQUYD
Encryption: Example: D is placed in row 1 and column 4, so
it results in output coded as 14; O is placed in row 3, column Phase 2 (Polybius Cipher)
3, it is result output coded as 34. So, Encrypted message result STEP4: TEXT-DQPYQFEYCQUYD
message DOG as 14, 34, 23. STEP5: OUTPUT-41145345141251453114544541
Decryption: Polybius decryption requires knowing the grid We can see output is in a NUMERICAL format where
and consists of a substitution of a couple of coordinates by sender has sent as in ALPHABETICAL format. Even the
the corresponding letter in the grid. Vigenère cipher result outputs as in distributed, jumbled and
Example: 12 visualize for 1st line and 2nd column, as result unformatted ALPHABETS which is also secured but again
letter B, 45 visualize for 4th line and 5th column that result passing that treating Vigenère outputs as Polybius input and
U and continues as same. Decrypted message result as BUS. then result in numerical format that makes it greater secure
and complex than the use of single ciphers.
IV. M ETHODOLOGY B. Decryption
Phase 1 (Polybius Cipher)
The strategy utilizes a combination of Vigenère cipher
STEP1: MESSAGE- 41
and Polybius Square Cipher in its encryption process. The
STEP2: OUTPUT- D
ciphertext will initially be worked on utilizing Vigenère cipher.
A picked key out of arbitrary will start the process. Toward Phase 2 (Vigenère Cipher)
the finish of the process, the subsequent ciphertext then turns STEP3: TEXT- D
into a key for the Polybius Square Cipher process. The key is STEP3: KEY- DELHI
used to work on the message which is the plaintext to create STEP4: OUTPUT-A
the last ciphertext. This process will wind up making the last We can see decode output is arriving after reversing the
ciphertext progressively hard to be broken utilizing existing process of through first and foremost Polybius cipher and
cryptanalysis processes. then Vigenère cipher. This makes complexity for intruders,
Decryption will be done by the receiver in reverse order for attackers and hackers to confuse them and stop them to
retrieval of a message from the sender. Replicate, copy, or harm the system through various types
A product program will be composed to exhibit the via- of active and passive attacks. The Biggest advantage of this
bility of the calculation utilizing python coding and different process can be used army, police system, secure message
cryptanalysis technique will be performed on the ciphertext. communication and transmission.
A flowchart depicting the Hybrid Algorithm is as shown in Hence, we can see the implementation of the Encryption
Fig. 3. and Decryption process of the Hybrid cipher process that flows

851

Authorized licensed use limited to: University of New South Wales. Downloaded on September 19,2020 at 19:31:30 UTC from IEEE Xplore. Restrictions apply.
systematically through Polybius and Vigenère cipher system. [12] P. Gutmann, Cryptographic security architecture: design and verifica-
Python Program is written as for the Implementation of Hybrid tion. Springer Science & Business Media, 2003.
[13] A. P. U. Siahaan, “Protection of important data and information using
cipher. gronsfeld cipher,” 2018.
[14] S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data
V. C ONCLUSION security using vigenère cipher and goldbach codes algorithm,” Int. J.
Eng. Res. Technol, vol. 6, no. 1, pp. 360–363, 2017.
Cryptography is the generally utilized technique for the [15] M. Maity, “A modified version of polybius cipher using magic square
security, privacy, confidentiality and reliability of data. Single and western music notes,” International Journal For Technological
Research In Engineering, ISSN, pp. 2347–4718, 2014.
classic ciphers are cryptographic techniques that are viewed as
least complex and most vulnerable because of numerous im-
pediments, restriction, and smooth system. One of the famous
ciphers is Vigenère Cipher but it also has few drawbacks. To
conquer the impediments of Vigenère cipher, A new technique
is present an upgraded variant as a combination of Polybius
cipher and Vigenère that is a lot more secure against attacks
like Active, passive, Kasiski and Friedman assaults (attacks).
Cryptanalysis, recurrence examination, men in middle attacks,
frequency analysis, fault analysis attacks, design expectation
and brute force attacks on the proposed strategy are likewise
much troublesome because of the utilization of product tables
for encryption. The altered hybrid combination of the Caesar
Cipher and Vigenère Cipher, that’s the result in as a high level
of complexity, scattering, distribution, and confusion in the
algorithm that creates them making it an exceptionally solid
cipher and hard to break. Even though there are numerous
cryptographic strategies yet this space still requires genuine
consideration of the research network for the up-gradation,
refinement and enhancement of data privacy and security.
In the coming future, our purpose is to approve the proposed
approach by executing security attacks and performance anal-
ysis on messages.

R EFERENCES
[1] S. Chaudhari, M. Pahade, S. Bhat, C. Jadhav, and T. Sawant, “A research
paper on new hybrid cryptography algorithm.”
[2] K. Jakimoski, “Security techniques for data protection in cloud comput-
ing,” International Journal of Grid and Distributed Computing, vol. 9,
no. 1, pp. 49–56, 2016.
[3] A. A. Soofi, I. Riaz, and U. Rasheed, “An enhanced vigenère cipher for
data security,” Int. J. Sci. Technol. Res, vol. 5, no. 3, pp. 141–145, 2016.
[4] P. Kumar and S. B. Rana, “Development of modified aes algorithm for
data security,” Optik, vol. 127, no. 4, pp. 2341–2345, 2016.
[5] A. Saraswat, C. Khatri, P. Thakral, P. Biswas et al., “An extended
hybridization of vigenére and caesar cipher techniques for secure com-
munication,” Procedia Computer Science, vol. 92, pp. 355–360, 2016.
[6] J. Chen and J. S. Rosenthal, “Decrypting classical cipher text using
markov chain monte carlo,” Statistics and Computing, vol. 22, no. 2,
pp. 397–413, 2012.
[7] M. B. Pramanik, “Implementation of cryptography technique using
columnar transposition,” International Journal of Computer Application-
s, vol. 975, p. 8887, 2014.
[8] C. Sanchez-Avila and R. Sanchez-Reillol, “The rijndael block cipher (aes
proposal): a comparison with des,” in Proceedings IEEE 35th Annual
2001 International Carnahan Conference on Security Technology (Cat.
No. 01CH37186). IEEE, 2001, pp. 229–234.
[9] Q.-A. Kester, “A cryptosystem based on vigenère cipher with varying
key,” International Journal of Advanced Research in Computer Engi-
neering & Technology (IJARCET), vol. 1, no. 10, pp. 108–113, 2012.
[10] C. Bhardwaj, “Modification of vigenère cipher by random numbers,
punctuations & mathematical symbols,” Journal of Computer Engineer-
ing (IOSRJCE) ISSN, pp. 2278–0661, 2012.
[11] F. M. S. Ali and F. H. Sarhan, “Enhancing security of vigenère cipher
by stream cipher,” International Journal of Computer Applications, vol.
100, no. 1, pp. 1–4, 2014.

852

Authorized licensed use limited to: University of New South Wales. Downloaded on September 19,2020 at 19:31:30 UTC from IEEE Xplore. Restrictions apply.

You might also like