scholarly journals An improved vigener algorithm based on circular-left-shift key and MSB binary for data security

Author(s):  
Aso Ahmed Majeed ◽  
Banaz Anwer Qader

Cryptography is a significant study area at present since it can be vital to protect exceedingly sensitive and secret information from illegal fraud during network transmission. One of the basic cryptographic algorithms is the Vigenere cipher, which is a very easy encryption method to be used as an alternative to Caesar cipher for encrypting the text of the message. In this paper, we enhance the Vigenere algorithm and propose a new method by shifting the key in each message to prevent repeating the messages. Also, it converts the messages into binary form rather than an alphabet. Furthermore, it adds a few bits of random padding to each block of outputs to send a series of bits. The proposed algorithm is named “Circular-Left-Shift Key-based Vigener Algorithm using MSB Binary (CLS-V-MSB)”. Finally, this technique slightly raises the size of the ciphertext, but substantially increases the cipher's protection, achieves the security objectives (authentication, confidentiality, integrity, freshness, and non-repudiation), and avoids Kasiski and Friedman.

2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Author(s):  
Kaldius Ndruru ◽  
Putri Ramadhani

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal


2007 ◽  
Vol 7 (24) ◽  
pp. 4007-4012 ◽  
Author(s):  
B. Ananda Krishna ◽  
S. Radha ◽  
K. Chenna Keshava Re

2013 ◽  
Vol 9 (2) ◽  
pp. 36-48
Author(s):  
Qutaiba Ali ◽  
Sahar Lazim

The incredible growth of FPGA capabilities in recent years and the new included features have made them more and more attractive for numerous embedded systems. There is however an important shortcoming concerning security of data and design. Data security implies the protection of the FPGA application in the sense that the data inside the circuit and the data transferred to/from the peripheral circuits during the communication are protected. This paper suggests a new method to support the security of any FPGA platform using network processor technology. Low cost IP2022 UBICOM network processor was used as a security shield in front of any FPGA device. It was supplied with the necessary security methods such as AES ciphering engine, SHA-1, HMAC and an embedded firewall to provide confidentiality, integrity, authenticity, and packets filtering features.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 196
Author(s):  
R Vignesh ◽  
K Rohini

This paper analyzes a variety of Challenging Roles of Ethical Hacking employed in Cyber Security. The requirement for more viable requesting data security rehearses is progressively evident with every security encroaches revealed in the media. Ethical hacking set forward a target investigation of an association's data security bearing for associations of numerous phase of security capability. Programmers must output for shortcomings, test section focuses, needs targets, and build up a procedure that best use their assets. The reason for this sort of security appraisal directly affects the estimation of the entire assessment. More finished it is recognized that electronic devices are fundamental to forestall digital culprits hacking into online systems to contain their administrations and access secret information for uncalled for purposes. Ethical Hacking is capably required where approved programmers endeavor to penetrate a business' frameworks/arranges for the benefit of the proprietors with the goal of discovering security shortcomings. It give bits of knowledge into how Ethical Hacking, as Penetration Testing utilizing free open source devices, can be utilized by associations to secure their system's administrations/activities. Utilizing Nmap, Google Hacking, Nessus, Brutus and Acunetix .Thus measures were placed in to determine these vulnerabilities and dodge the delicate information from potential digital threats.  


2014 ◽  
Vol 1044-1045 ◽  
pp. 1498-1502 ◽  
Author(s):  
Hong Sheng Wang ◽  
Dao Gang Ji ◽  
Yang Zhang ◽  
Kai Yan Chen ◽  
Kai Song

Cipher chips, such as microprocessors, are playing the important role in most cryptosystems, and implementing many public cryptographic algorithms. However, Side channel attacks pose serious threats to Cipher chips. Optical Side channel attack is a new kind of method against cipher chips. Two methods are presented in this paper, which shows how to implement optical fault injection attacks against RSA and AES algorithms running on AT89C52 microchip, and demonstrates how to exploit secret information under attack.


2017 ◽  
Vol 2017 ◽  
pp. 1-6
Author(s):  
Pengtao Yang ◽  
Guiling Sun ◽  
Jingfei He ◽  
Peiyao Zhou ◽  
Jiangjiang Liu

A new type of student information management system is designed to implement student information identification and management based on fingerprint identification. In order to ensure the security of data transmission, this paper proposes a data encryption method based on an improved AES algorithm. A new S-box is cleverly designed, which can significantly reduce the encryption time by improving ByteSub, ShiftRow, and MixColumn in the round transformation of the traditional AES algorithm with the process of look-up table. Experimental results show that the proposed algorithm can significantly improve the encryption time compared with the traditional AES algorithm.


Sign in / Sign up

Export Citation Format

Share Document