Skip to main content
Log in

A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Nowadays, with the advancement of technologies in modern life communication and networks, the secrecy of a cryptographic technique has become a strong necessity. The Vernam’s cipher which is a specific form of Vigenère cipher is gaining attention of researchers in the cryptography. But the modern encryption methods based on matrices available in the literature have their limitations to utilize them. Therefore, motivated by numerous cryptographic techniques available in the literature, this study presents a novel encryption approach for secure data communication. The proposed encryption approach is based on Vigenère cipher in finite dimensional vector space. Furthermore, the proposed approach relies on an eternal decomposition which is indiscriminate in the key selection inside key space. To add complexity by text scrambling, a weird substitution cipher key is added to provide maximum derangement in the encrypted text structure. Additionally, in the lights of Shannon’s secrecy, a comparison with usual matrix methods relying on \(LU\)—decomposition and eigenvalue decomposition is also discussed to justify the perfect secrecy thus achieved. It is revealed that the proposed encryption approach is a more versatile and perfectly secret encryption scheme that roots on the widening of key space to a mathematical structure, which not only fulfills the completeness with respect to the proposed decomposition but identical to message space as well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4), 656–715.

    Article  MathSciNet  Google Scholar 

  2. Wilson, P. I., & Garcia, M. (2006). A Modified Version of the Vigenère Algorithm. IJCSNS International Journal of Computer Science and Network Security, 6(3B), 140–143.

    Google Scholar 

  3. Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal 27, 379–423, 623–656 (Reprinted in C.E. Shannon and W. Weaver The Mathematical Theory of Communication; University Illinois Press: Champaign, IL, USA, 1949).

  4. Shannon, C. E., & Warren, W. (2009). The Mathematical Theory of Communication (pp. 12–29). University of Illinois Press.

    Google Scholar 

  5. Kester, Q. A. (2012). A cryptosystem based on Vigenère cipher with varying key. International Journal of Advanced Research in Computer Engineering and Technology, 1(10), 108–113.

    Google Scholar 

  6. Khalid, M., Wadhwa, N., & Malhotra, V. (2012). Alpha-qwerty cipher. International Journal of Advanced Computing, 3(3), 107–118.

    Article  Google Scholar 

  7. Kester, Q. A. (2013). A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher. International Journal of Advanced Technology and Engineering Research, 3(1), 141–147.

    Google Scholar 

  8. Omolara, O. E., Oludare, A. I., & Abdulahi, S. E. (2014). Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication. International Journal of Computer Engineering and Intelligent Systems, 5(5), 34–46.

    Google Scholar 

  9. Ali, F. M. S., & Sarhan, F. H. (2014). Enhancing security of vigenere cipher by stream cipher. International Journal of Computer Applications, 100(1), 1–4.

    Article  Google Scholar 

  10. Subandi, A., Mieyanti, R., Sandy, C. L. M., & Sembiring, R. W. (2017). Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification. Advances in Science, Technology and Engineering Systems Journal, 2(5), 1–5.

    Article  Google Scholar 

  11. Singh, G. (2014). Modified vigenere encryption algorithm and its hybrid implementation with base64 and AES. In IEEE Journal.

  12. Song, Y., Zhu, Z., Zhang, W., Yu, H., & Zhao, Y. (2019). Efficient and secure image encryption algorithm using a novel key-substitution architecture. In IEEE Journal.

  13. Okamoto, T., & Takashima, K. (2008). Homomorphic encryption and signatures from vector decomposition. In S. D. Galbraith & K. G. Paterson (Eds.), Pairing 2008. LNCS (Vol. 5209, pp. 57–74). Springer.

    Chapter  Google Scholar 

  14. Johnson, N. F. (1998). Exploring steganography: Seeing the unseen. IEEE Transaction on Computer, 31(2), 26–34.

    Article  Google Scholar 

  15. Benni, P., & Hetty Rohayani, A. H. (2015). A new modified Caesar cipher cryptography method with legible ciphertext from a message to be encrypted. Procedia Computer Science, 59, 195–204.

    Article  Google Scholar 

  16. Uniyal, N., Dobhal, G., & Semwal, P. (2020). Enhanced security of encrypted text by KDMT: Key-domain maximization technique. IJRTE, 8(5), 1385–1388.

    Article  Google Scholar 

  17. Othman, A. A. (2013). Binary LU encryption. In IEEE Journal.

  18. Hu, Q. (1997). On the uniqueness of the Singular value decomposition in meteorological applications. Journal of Climate, 10(7), 1762–1766.

    Article  Google Scholar 

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Sikander.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Uniyal, N., Dobhal, G., Rawat, A. et al. A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication. Wireless Pers Commun 119, 1577–1587 (2021). https://doi.org/10.1007/s11277-021-08295-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08295-5

Keywords

Navigation