The Effect Of Varying Key Length On A Vigenère Cipher
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Vigenère cipher is one of the polyalphabetic substitution ciphers. Its weakness is the key repetition.To overcome this weakness there are many researchesgoing on to modify the key generation. In this paper a keygenerator function isimplemented with C++. Itgenerates a key with length depends on the message securitylevel.This level is determined by the sender of the message, according to the security importance of the message.The security level determines the key length, which is a ratio from the plain-text message. This ratio varies from10% to 100% from the plain-text length. This paper studies the effect of varying the key length on theperformance of Vigenère cipher andits frequency analysis attack. When the key length increases the encryptionand decryption time increases, the frequency analysis attack becomes more difficult and also the confusion isincreased
Authors and Affiliations
Ayman Al-ahwal , Sameh Farid
An Improved Novel Steganographic Technique For RGB And YCbCr Colorspace
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most...
Positional Prediction of Individuals Present In a Crime Scene
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tr...
Auto Finding and Resolving Distributed Firewall Policy
Abstract: In the network environment firewall is one of the protection layers. A firewall policy defines how an organization’s firewalls should handle inbound and outbound network traffic for specifi c IP addresses...
A Novel Method of Generating (Stream Cipher) Keys forSecure Communication
Abstract: Security is an important part of computer science that deals with the protection of importantinformation from access, change or modified, and delete, so there are many ways to improve the security ofinfor...
Mobile Phone Embedded With Medical and Security Applications
Abstract: This paper introduces MOBILE PHONE EMBEDDED WITH ANDROID BASED EMERGENCY ALERT BUTTON AND MEDICAL TOOLS - a mobile phone can serve us with various functions of security applications and medical tools. T...