Modified Vigenere Encryption Algorithm and Its Hybrid Implementation with Base64 and AES

Security is a mechanism by which information is protected from unintended or unauthorized access, change or destruction. To secure such information process of encryption is used. Encryption is the act of transforming sensitive data through an algorithm to make the data unreadable in such a way that only the person (or computer) with the key can have access to it. In this paper hybrid approach is used for applying encryption algorithms. Different kinds of algorithms such as substitution cipher, symmetric algorithm etc are used. The system's security is greatly improved, through researching several famous data encryption algorithms, improving some data encryption algorithms and arranging them in a suitable order. Avalanche Effect is chosen as a metric for measuring performance of proposed algorithm and its implementation. Proposed algorithm shows significant high Avalanche Effect, as compared with Vigenere Encryption Algorithm.

[1]  Gabriela Moise,et al.  A Survey on the Usage of Substitution Tables in DES and AES Algorithms , 2009 .

[2]  Lili Yu,et al.  The Application of Hybrid Encryption Algorithm in Software Security , 2013, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[3]  Elaine B. Barker,et al.  SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .

[4]  Simon Josefsson,et al.  The Base16, Base32, and Base64 Data Encodings , 2003, RFC.

[5]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[6]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[7]  Peter Kulchyski and , 2015 .

[8]  A. Al Hasib,et al.  A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[9]  D. Pishva,et al.  AES and Confidentiality from the inside out , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[10]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[11]  Sajad Shirali-Shahreza,et al.  Sending pictures by SMS , 2009, 2009 11th International Conference on Advanced Communication Technology.