Professional Documents
Culture Documents
A.J.CIPHER
A. Encryption Process
1) First Encryption Process: We have combined the
encryption technique of Vigenere. The first row in the table
which represents the key and there is a first column which
represents the plaintext. We generate a random key of the
same size as the plaintext. We find the ciphertext by getting
the intersection of key and plaintext from TABLE III. So that,
PLAINTEXT - H I K E 7 @
KEY -KILLER
CIPHERTEXT - S r w q \ r
2) Second Encryption Process: Then after this,we find
ASCII value of all characters or numeric data and then
converted into the binary number.
CIPHERTEXT - S r w q \ r
ASCII - 83 114 119 113 92 114
Fig 2. Encryption Process
BINARY- 01010011 01110010 01110111 01110001
01011100 01110010 CIPHERTEXT - 24 59 59 61 25 32
KEY - K I L L E R BINARY - 00011000 00111011 00111011
ASCII - 75 73 76 76 69 82 00111101 00011001 00100000
BINARY - 01001011 01001001 01001100 01001100
01000101 01010010 KEY - K I L L E R
After performing XOR operation we get our final ASCII - 75 73 76 76 69 82
Cipher text message – BINARY - 01001011 01001001 01001100
00011000 00111011 00111011 00111011 01001100 01000101 01010010
00011001 00100000
We get the binary number which will be converted to its After performing XOR operation we get,
ASCII character and then we get its mnemonic equivalent. 01010011 01110010 01110111 11110001 01011100
In last, we found our ciphertext. 01110010
24 59 59 61 25 32 And then converted into ASCII value
ASCII - 83 114 119 113 92 114
B. Decryption Process
CIPHERTEXT - S r w q \ r
1) First Decryption Process: We find the ciphertext of
mnemonic equivalent then we get its ASCII value and 2) Second Deccryption Process:Applying Vigenere Cipher
converted into the binary number and perform the XOR on the ciphertext (Srwq\r) and the key, we get our plaintext
operation with the key. from the table.
CIPHERTEXT - S r w q \ r
KEY - K I L L E R
PLAINTEXT - H I K E 7 @
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)
V. IMPLEMENTATION AND TESTING
Fig 7.
REFERENCES
[1] Anjum Priyam, ”Extended Vigenere using Double Transposition Cipher
with One Time Pad Cipher,” Intl J Engg Sci Adv Research 2015
June;1(2):62-65.
[2] Aized Amin Soofi,Irfan Riaz, Umair Rasheed, ”An Enhanced Vigenere
Cipher For Data Security,” International Journal of Scientific and
Technology Research Volume 5, Issue 03, April 2016
[3] Aditi Saraswat, Chahat Khatri, Sudhakar, Prateek Thakral, Prantik
Biswas, “An Extended Hybridization of Vigenere and Ceaser Cipher
Techniques for Secure Communication,” 2nd International Conference
on Intelligent Computing, Communication & Convergence (ICCC-
2016), Procedia Computer Science 92 ( 2016 ) 355 – 360.
[4] Quist-Aphetsi Kester, “A Hybrid Cryptosystem Based On Vigenere Cipher
And Colamnar Transposition Cipher,” International Journal of
Advanced Technology & Engineering Research (IJATER)”, ISSN No:
2250-3536 Volume 3, Issue 1, Jan. 2013.
[5] Ravindra Babu Kallam, Dr.S. Udaya Kumar, Dr. A. Vinaya Babu, Md
Abdul Rasool, “An Enhanced Polyalphabetic Cipher using Extended
Vigenere Table”, ISSN No. 0976-5697, Volume 2 , No.2, March – April
2011.
[6] S.S. Omran ,A.S.Al-Khalid, D.M. Al-Saady,”A Cryptanalytic Attack on
Vigenere Cipher Using Genetic Algorithm”, 2011 IEEE Conference on
Open System (ICOS2011), September 25 – 28, 2011 , Langkawi,
Malaysia.
[7] Prachi Patni , “A Poly-alphabetic Approach to Caesar Cipher Algorithm”,
(IJCSIT) International Journal of Computer Science and Information
Technologies, Vol. 4 (6) , 2013, 954-959, ISSN : 0975-9646