Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Prof. Ms. S. P. Vanjari, Vaishnavi Bhangale, Deepti Singh, Nitin Andhale, Amruta Dalavi
DOI Link: https://doi.org/10.22214/ijraset.2023.56920
Certificate: View Certificate
Sensitive data is being used more and more in online communication these days. Therefore, internet consumers\\\' top concern is data security. The best course of action is to utilize a cryptography technique that encrypts data, translates it over the internet, and then decrypts it back to the original data. The process of securely transmitting data is the focus of the field of cryptography. The intention is to prevent eavesdroppers from comprehending a message while enabling the intended recipients to receive it correctly. A collection of methods known as cryptography are used to jumble or hide data so that only a person skilled in data restoration may access it in its original format. Cryptography offers modern computer systems a robust and cost-effective foundation for maintaining data secrecy and confirming data indignity. While our traditional cryptography techniques, like RSA signature and AES encryption, function well on computers with respectable amounts of RAM and computing capacity, they are not well suited to the realm of embedded systems and sensor networks. As a result, techniques for lightweight cryptography are put forth to address numerous issues with traditional cryptography. This work develops a new hybrid method of plaintext encryption with the goal of adding to the body of knowledge in the field of classical cryptography. For an additional degree of protection, the cryptosystem employs three distinct numerical and alphabetical keys in cipher. Super Cipher is the name given for the new proposed cipher.
I. INTRODUCTION
Information security involves a set of measures, procedures, and strategies designed to prevent and monitor unauthorized access, troubleshooting, disclosure, disruption, and modification of computer network resources. Strengthening the privacy, integrity, and reliability of data requires continuous efforts to enhance existing methods against persistent attempts to compromise them and to develop new, resilient approaches that can withstand various types of attacks. Historically, encryption has proven to be one of the most reliable strategies for securing information. This method dates back to ancient times, such as the Romans, who employed similar techniques to safeguard their valuable information and documents. Cryptography is the practice of devising codes, whether written or generated, to maintain the confidentiality of information. It involves transforming data into an unreadable format for unauthorized users, enabling secure transmission without the risk of unauthorized decoding and compromise of the data. Information security relies on cryptography at various levels, ensuring that information remains unreadable without the appropriate decryption key. Cryptography is the practice of safeguarding information and communication by employing codes, ensuring that only intended recipients can comprehend and process the data. This process serves to thwart unauthorized access to sensitive information. The term "crypt" in cryptography signifies "hidden," while the suffix "graphy" refers to "writing."
A. Components of a Cryptosystem
``Cryptosystems are built upon several essential components:
a. Public Key: It is used for encryption in asymmetric cryptography and openly shared.
b. Private Key: It is kept confidential and used for decoding in asymmetric cryptography or for both encryption and decryption in symmetric cryptography.
4. Ciphertext: Ciphertext represents the encrypted form of plaintext, appearing as seemingly random data and requiring the decryption key for comprehension.
5. Decryption Algorithm: Mathematical procedure that reverses the encryption, turning ciphertext back into plaintext. The decryption key is used in the algorithm
6. Key Management: This section explores the critical aspects of key management, including creation, distribution, storage, and rotation. A robust key management system is imperative for ensuring the overall security of the cryptosystem.
B. Purpose
In today's digital environment, cyberattacks happen often. Attacks are more likely to occur on any social networking site, web application, etc. Studying and analyzing attacks is typically crucial in order to create a system that is resistant to attacks and solves big problems. Here are a few examples of attacks.
C. Cryptographic Attacks
An attacker's primary goal is to crack a cryptosystem and extract the plaintext from the ciphertext. Since the technique is now public knowledge, the attacker just needs to discover the secret decryption key to retrieve the plaintext. He therefore puts in his best effort to discover the cryptosystem's secret key. The attacked system is regarded as broken or compromised once the attacker is able to determine the key. The following categories apply to attacks on cryptosystems based on the methods used:
II. RELATED WORK
A literature survey consists of different learning techniques research data as follows:
TABLE I. SUMMARY OF RELATED WORK / GAP ANALYSIS\
Title |
Author |
Year/Journal name |
Summary |
An Enhanced Cipher Technique using Vigenere and Modified Caesar Cipher |
Deepanshu Gautam, Dr. Munish Mehta |
IEEE-2018 |
This paper combines the Vigenere cypher with the stream cypher. It encrypt any data and is not limited to upper case characters. |
Design of Hybrid Cryptography System based onVigenere Cipher and Polybius Cipher |
Shivam Vatshayan, Raza Abbas Haidri |
IEEE-2020 |
In this paper, two ciphers are combined to provide secure communication and that security algorithm can be combined with different applications |
An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication |
Srikanta Patnaik |
ScienceDirect-20 19 |
In this paper, secure communication is established using a combination of Vigenere and caesar cipher. There is only one key for the encryption and decryption techniques |
A Study On Cryptographic Techniques |
Anjali Krishna, Dr. L. C. Manikandan |
IJSRCSEIT-2020 |
In this paper, we came to know about all the ciphers and comparison between them and we can select which cipher we need to use |
“ASCII conversion based two key V4S scheme for encryption and decryption—A four step approach." |
Gupta, Chhavi, and Prateek Thakral. |
IEEE-2017 |
In this paper, we explored different techniques where various encryption and decryption algorithms were used for ASCII conversion based on two keys. |
III. OBSERVATIONS AND FINDING
As per the observation of the research topic finding of following things,
A. Methodology
Specific problems addressed in this project includes:
The strategy utilizes a combination of Caesar cipher, Rail- fence Cipher and Vigenere cipher in its encryption process. The ciphertext will originally be worked on exercising Caesar cipher. Further it’s reused with the posterior ciphertext also turns into a key for the Rail- fence Cipher process and also on the Vigenere Cipher at the end. The key is used to work on the communication which is the plaintext to produce the last ciphertext. This process will wind up making the last ciphertext precipitously hard to be broken exercising being cryptanalysis processes.
Decryption will be done by the receiver in rear order for reclamation of a communication from the sender. A product program will be composed to parade the viability of the computation exercising python coding and different cryptanalysis fashion will be performed on the ciphertext.
7. Caesar cipher: It's a type of substitution cipher that was used by Julius Caesar to protect sensitive information. The basic idea behind the Caesar cipher is to shift the letters of the alphabet by a fixed number of positions.
Encryption En(x) = (x + n) mod 26
Decryption Dn(x) = (x – n) mod 26
8. Vigenere cipher: The Vigenere Cipher is a method for encrypting alphabetic text, employing a basic form of polyalphabetic substitution. Encryption involves utilizing the Vigenère square or table, comprising 26 rows of alphabets. Each row represents the alphabet shifted cyclically to the left compared to the previous one, corresponding to the 26 possible Caesar Ciphers. In the encryption process, the cipher employs distinct alphabets from various rows, determined by a repeating keyword.
9. Rail- fence Cipher: The rail fence cipher, also referred to as the zigzag cipher, is a straightforward and historical transposition cipher utilized in both encryption and decryption of messages. The term "rail fence" is derived from the zigzag pattern in which the letters are written, resembling the rails of a fence. Following the completion of writing each alphabet, the rows are combined to generate the cipher-text.
Comparison
1. Key Mechanism
a. Caesar Cipher: Uses a single numeric key to shift letters in the alphabet.
b. Vigenère Cipher: It uses a keyword that determines the shift value for each letter.
c. Rail-Fence Cipher: Uses the number of rails as the key to determine the pattern of writing.
2. Security:
a. Caesar Cipher: Relatively insecure due to its limited key space (only 25 possible keys).
b. Vigenère Cipher: More secure than Caesar cipher but vulnerable to frequency analysis if the keyword is short or easily guessable.
c. Rail-Fence Cipher: Generally considered less secure, especially for small numbers of rails, and can be susceptible to pattern recognition.
3. Flexibility:
a. Caesar Cipher: Simple and easy to implement but lacks flexibility in terms of key variations.
b. Vigenère Cipher: More flexible than Caesar cipher due to the variable-length keyword, making it resistant to simple frequency analysis.
c. Rail-Fence Cipher: Limited flexibility; the security depends on the number of rails, which is a fixed parameter.
4. Algorithm Complexity:
a. Caesar Cipher: Simplest, involving only a single shift operation.
b. Vigenère Cipher: More complex due to the use of a variable-length key and the need to iterate through the key for encryption.
c. Rail-Fence Cipher: Simple, involving rearranging characters in a pattern determined by the number of rails.
5. Use Cases:
a. Caesar Cipher: Suitable for educational purposes or situations where low-security requirements are acceptable.
b. Vigenère Cipher: Historically used for more secure communication, especially when a strong, non-repeating keyword is employed.
c. Rail-Fence Cipher: Often used for simple, fun applications rather than serious cryptographic needs.
6. Cryptanalysis:
a. Caesar Cipher: Vulnerable to brute-force attacks due to the limited key space.
b. Vigenère Cipher: Resistant to simple frequency analysis but can be broken with more advanced methods like Kasiski examination.
c. Rail-Fence Cipher: Vulnerable to attacks like frequency analysis, especially for a small number of rails.
B. Key issues and challenges
a. Physical Noise: Disturbances that affect the transmission of the message, such as background sounds, poor signal quality, or interference.
b. Semantic Noise: Differences in interpretation of symbols, language, or meaning that can lead to misunderstandings.
10. Technological Advancements
Rapid advancements in communication technologies require constant adaptation. Keeping up with the latest technologies and ensuring compatibility can be challenging.
The method most frequently used to secure data is cryptography. To sum up, super ciphers—a method of combining many cryptographic algorithms—provide a practical way to improve encryption system security. Super ciphers enable strong encryption, safe key exchange, integrity verification, and resistance against a variety of assaults by combining the advantages of several cyphers and methodologies. Super ciphers can greatly improve data confidentiality and integrity when used in distributed networks, file transfer protocols, and secure messaging systems. To obtain a high level of security in super ciphers, it is imperative to make sure that each component is carefully designed, implemented, and analyzed. approaches in cryptography that are thought to be the least complicated and most susceptible due to various obstacles. In order to overcome the limitations of the standard cipher, we suggested an improved version that uses three separate keys and is much more resistant to attacks by Kasiski and Friedman. Because many tables are used for encryption, cryptanalysis, frequency analysis, pattern recognition, and brute attack on the suggested technique are likewise considerably more challenging. The algorithm that creates the updated hybrid cyphers with additional keys now has a high percentage of Diffusion and Confusion, making them extremely strong and challenging to crack. Despite the abundance of cryptographic techniques available, this field still needs careful consideration from the academic community in order to increase data security. In the future our point is to give approval of the proposed approach by performing security and performance analysis.
[1] Anuja Priyam.” Extended Vigenère using double Transposition Cipher with One Time Pad Cipher.” Intl J Engg Sci Adv Research 2015 June; 1(2):62-65. [2] Quist-Aphetsi Kester, “A cryptosystem based on Vigenère cipher with varying key.” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 10, December 2012. [3] O.E. Omolara. “Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication.” Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.5, 2014. [4] Garg, Saloni, Sonam Khera, Archana Aggarwal, and P. G. Scholar. \\\"Extended Vigenere Cipher with Stream Cipher.\\\" International Journal of Engineering Science and Computing (IJESC) 6, no. 5 (2016). [5] Aized Amin Soofi, Irfan Riaz, and Umair Rasheed. \\\"An Enhanced Vigenere Cipher for Data Security.\\\" International Journal of Scientific & Technology Research 5, no. 03 (2016). [6] Senthil, K., K. Prasanthi, and R. Rajaram. \\\"A modern avatar of Julius Caesar and Vigenere cipher.\\\" In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, pp. 1-3. IEEE, 2013. [7] Sanjeev Kumar Mandal, “A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme.” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (4) 2016, 2096- 2099. [8] P. Kumar and S. B. Rana, “Development of modified aes algorithm for data security,” Optik, vol. 127, no. 4, pp. 2341–2345, 2016. [9] F. M. S. Ali and F. H. Sarhan, “Enhancing security of vigenere cipher by stream cipher,” International Journal of Computer Applications, vol. 100, no. 1, pp. 1–4, 2014. [10] A. P. U. Siahaan, “Protection of important data and information using gronsfeld cipher,” 2018. [11] S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data security using vigenere cipher and goldbach codes algorithm,” Int. J. Eng. Res. Technol, vol. 6, no. 1, pp. 360–363, 2017. [12] M. Maity, “A modified version of polybius cipher using magic square and western music notes,” International Journal For Technological Research In Engineering, ISSN, pp. 2347–4718, 2014. [13] O.P Verma, Ritu Agarwal, Dhiraj Dafouti and Shobha Tyagi, “Peformance Analysis of Data Encryption Algorithms”, IEEE Delhi Technological University India, 2011. [14] Senthil, K., K. Prasanthi, and R. Rajaram. \\\"A modern avatar of Julius Caesar and Vigenere cipher.\\\" In Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, pp. 1-3. IEEE, 2013.
Copyright © 2023 Prof. Ms. S. P. Vanjari, Vaishnavi Bhangale, Deepti Singh, Nitin Andhale, Amruta Dalavi. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET56920
Publish Date : 2023-11-22
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here