Search Results - Vigenère cipher algorithm

Refine Results
  1. 1

    Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512 by Riadi, Imam, Fadlil, Abdul, Tsani, Fahmi Auliya

    ISSN: 2088-1541, 2541-5832
    Published: Udayana University, Institute for Research and Community Services 24.08.2022
    Published in Lontar komputer (24.08.2022)
    “…One of the popular cryptographic algorithms is the Vigenère Cipher. This algorithm is included in classical cryptographic algorithms, so its capabilities are limited to text-type data…”
    Get full text
    Journal Article
  2. 2

    Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm by Qowi, Z, Hudallah, N

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.06.2021
    Published in Journal of physics. Conference series (01.06.2021)
    “… To reduce that risk, one of cryptographic method can be applied. That is Vigenere Cipher algorithm…”
    Get full text
    Journal Article
  3. 3

    Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher by Boussif, Mohamed, Aloui, Noureddine, Cherif, Adnene

    ISSN: 1751-9659, 1751-9667
    Published: The Institution of Engineering and Technology 11.05.2020
    Published in IET image processing (11.05.2020)
    “… Then, the proposed algorithm encrypts the image block-by-block using the Vigenère cipher algorithm. For each block, the proposed algorithm modifies the key using Arnold transform…”
    Get full text
    Journal Article
  4. 4

    Modified Vigenère cipher algorithm based on new key generation method by Hassan Hameed, Thamer, Tariq Sadeeq, Haval

    ISSN: 2502-4752, 2502-4760
    Published: 01.11.2022
    “… The Vigenère cipher is attracting the attention of cryptography specialists, although the Vigenère cipher algorithm has a problem…”
    Get full text
    Journal Article
  5. 5

    SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm by Ahamed, B. Bazeer, Krishnamoorthy, Murugan

    ISSN: 2194-668X, 2194-6698
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.12.2022
    “… Therefore, appropriate cryptographic algorithms must be applied to ensure security. One of the most common cryptographic techniques used for encrypting and decrypting messages is the Vigenere cipher…”
    Get full text
    Journal Article
  6. 6

    Finding the key length of a Vigenère cipher: How to improve the twist algorithm by Park, Seongmin, Kim, Juneyeun, Cho, Kookrae, Yum, Dae Hyun

    ISSN: 0161-1194, 1558-1586
    Published: West Point Taylor & Francis 03.05.2020
    Published in Cryptologia (03.05.2020)
    “…A Vigenère cipher applies a single short key repeatedly to encrypt a plaintext. If a cryptanalyst correctly finds out the key length, the ciphertext can be divided into multiple instances of shift cipher and be broken by frequency analysis…”
    Get full text
    Journal Article
  7. 7

    Application of Message Security Application Using Vigenere Cipher Algorithm Utilizing One Time Pad (OTP) Algorithm as a Key Generator by Pardede, A M H, Br Sitepu, Lorena Perbina, Zarlis, Muhammad, Tulus, Iskandar, Akbar, Sriadhi, S, Manurung, Rosida Tiurma, Siregar, Nurintan Asyiah, Sari, Ayu Esteka, Yunawati, Sri, Mursyidah, M, Mursalin, M, Kurniasih, Nuning, Kurniawan, Citra, Winarno, Edy

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.11.2019
    Published in Journal of physics. Conference series (01.11.2019)
    “… One of the ways securing the form of text message information is by the encryption process using the Vigenere Cipher algorithm and utilizing the One Time Pad (OTP…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Probing the Genetic Algorithm Assisted Vigenère Cipher Cryptanalysis by V., Harshvardhan, Gupta, Kritesh Kumar, K.P., Soman

    Published: IEEE 16.05.2024
    “…) for performing Vigenère cipher cryptanalysis under the constraint of a fixed key length. The presented framework conducts a comprehensive performance evaluation by investigating the convergence analysis of the GA under varying lengths of characters…”
    Get full text
    Conference Proceeding
  10. 10

    A Modified Key Generation Scheme of Vigenère Cipher Algorithm using Pseudo-Random Number and Alphabet Extension by Perez, John Paul G., Sigua, Sean Kevin P., Cortez, Dan Michael A., Mata, Khatalyn E., Regala, Richard C., Alipio, Antolin J., Blanco, Mark Christopher R., Sison, Ariel M.

    Published: IEEE 10.12.2021
    “…In recent years, many modifications have been done to combat the weaknesses of the Vigenère Cipher Algorithm. Several studies have been carried out to rectify…”
    Get full text
    Conference Proceeding
  11. 11

    Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System by AlSideiri, Abir, AlShamsi, Saif, AlBreiki, Hajar, AlMoqbali, Manal, AlMaamari, Mithaa, AlSaadi, Shaima

    ISSN: 2078-8665, 2411-7986
    Published: University of Baghdad, College of Science for Women 01.01.2024
    Published in Majallat Baghdād lil-ʻulūm (01.01.2024)
    “…لا يزال أمن البيانات مصدر قلق في عصرنا الرقمي، مع فشل العديد من أنظمة التشفير بسبب تعقيدها وقابليتها للتهديدات السيبرانية. Cypher-X، هو نظام تشفير وفك تشفير…”
    Get full text
    Journal Article
  12. 12

    Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process by Subandi, A, Lydia, M S, Sembiring, R W, Zarlis, M, Efendi, S

    ISSN: 1757-8981, 1757-899X, 1757-899X
    Published: Bristol IOP Publishing 01.10.2018
    “…Modifications to Vigenere cipher are possible to make in order to be effective and efficient of this algorithm…”
    Get full text
    Journal Article
  13. 13

    Modifying twist algorithms for determining the key length of a Vigenère cipher by Millichap, Christian, Yau, Yeeka, Pate, Alyssa, Carns, Morgan

    ISSN: 0161-1194, 1558-1586
    Published: West Point Taylor & Francis 01.11.2024
    Published in Cryptologia (01.11.2024)
    “…In this article, we analyze and improve upon the twist-based algorithms introduced by Barr-Simoson and Park-Kim-Cho-Yum for determining the key length of a Vigenère cipher…”
    Get full text
    Journal Article
  14. 14

    A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher by Tan, Camille Merlin S., Arada, Gerald P., Abad, Alexander C., Magsino, Elmer R.

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.08.2021
    Published in Journal of physics. Conference series (01.08.2021)
    “…This paper presents a hybrid encryption and decryption algorithm, which combines the concept of Caesar Cipher and Vigenere Cipher algorithms…”
    Get full text
    Journal Article
  15. 15

    Leveraging the Techniques of Vigenère Cipher and Modern Cryptographic Algorithms by Esther Careen Katema, Fanny Chatola

    ISSN: 2581-9429, 2581-9429
    Published: 30.11.2024
    “… Algorithms and methodologies employed include: Vigenère Cipher which utilizes a keyword to shift characters by different amounts, creating a polyalphabetic substitution…”
    Get full text
    Journal Article
  16. 16

    Application and Manual Encryption Process with The Combination Algorithm of One Time Padand Vigenere Cipher by Siregar, Siti Julianita, Zarlis, Muhammad, Situmorang, Zakarias

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.11.2020
    Published in Journal of physics. Conference series (01.11.2020)
    “…Cryptography is a branch of science which study art or a way to secure an information in order to that information becomesincomprehensible to third parties who…”
    Get full text
    Journal Article
  17. 17

    IMPLEMENTATION OF STEGANOGRAPHY ON DIGITAL IMAGE WITH MODIFIED VIGENERE CIPHER ALGORITHM AND LEAST SIGNIFICANT BIT (LSB) METHOD by Miftakhul Fahmi, Gilang, Isnaini, Khairunnisak Nur, Suhartono, Didit

    ISSN: 2723-3863, 2723-3871
    Published: 23.03.2023
    Published in Jurnal Teknik Informatika (Jutif) (23.03.2023)
    “… Hiding messages to an image can be conducted using steganography. It can be combined with cryptography algorithms in order to make it harder to be accessed by unauthorized parties…”
    Get full text
    Journal Article
  18. 18

    Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System by Aryanti, Aryanti, Mekongga, Ikhthison

    ISSN: 2267-1242, 2555-0403, 2267-1242
    Published: Les Ulis EDP Sciences 01.01.2018
    Published in E3S web of conferences (01.01.2018)
    “…) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf…”
    Get full text
    Journal Article Conference Proceeding
  19. 19

    Encrypted Short Message Service Design Using Combination of Modified Advanced Encryption Standard (AES) and Vigenere Cipher Algorithm by Christopher, Christopher, Gunawan, Abel, Prima, Sheila

    ISSN: 2686-2573, 2686-2573
    Published: 09.06.2022
    “… In this paper, a modified AES with Vigenere Cipher Algorithm will be used to encrypt the text message, hence greatly increasing the security of the sent messages…”
    Get full text
    Journal Article
  20. 20

    A Secure Image Steganography Using Improved Lsb Technique And Vigenere Cipher Algorithm by Voleti, Lasya, Balajee, R M, Vallepu, Siva Koteswararao, Bayoju, Karthik, Srinivas, Devireddy

    Published: IEEE 25.03.2021
    “… The aim of this analysis is to include a description which outlines the criteria of a good steganographic algorithm and briefly discusses best techniques which are in…”
    Get full text
    Conference Proceeding