An Improvement of Linear Cipher Using Public Tables, Pairs of Moduli, and Periodic Keys
Abstract
In this paper, we propose an improvement of the linear cipher using a public table, which can be used for decryption only by the recipient, and a pair of moduli to prevent successful determination of the private keys by the opponent. Our scheme also uses a periodic key for encrypting each block of plaintext and decrypting each block of ciphertext. We find that our modified linear cipher is more secure against frequency analysis, a ciphertext-only attack, and a known-plaintext attack than the classical linear cipher. Keywords : cryptography, linear cipher, periodic key, pair of moduli, public tableReferences
Burton, D.M. (2007). Elementary Number Theory. (6th ed.). New York: McGraw-Hill.
Rajan, A., & Balakumaran, D. (2014). Advancement in Caesar cipher by randomization and delta formation. In Proceedings of the 2014 IEEE International Conference on Information Communication and Embedded Systems. (pp. 1-4). Piscataway: Institute of Electrical and Electronics Engineers.
Senthil, K., Prasanthi, K., & Rajaram, R. (2013). A modern avatar of Julius Caesar and Vigenère cipher. In Proceedings of the 2013 IEEE International Conference on Computational Intelligence and Computing Research. (pp. 1-3). Piscataway: Institute of Electrical and Electronics Engineers.
Singh, A., Nandal, A., & Malik, S. (2012). Implementation of Caesar cipher with rail fence for enhancing data security. International Journal of Advanced Research in Computer Science and Software Engineering, 2(12), 78-82.
Stallings, W. (2011). Cryptography and Network Security: Principles and Practice. (5th ed.). Upper Saddle River: Pearson Education.
Stinson, D.R. (2006). Cryptography: Theory and Practice. (3rd ed.). Boca Raton: Chapman & Hall/CRC.
Rajan, A., & Balakumaran, D. (2014). Advancement in Caesar cipher by randomization and delta formation. In Proceedings of the 2014 IEEE International Conference on Information Communication and Embedded Systems. (pp. 1-4). Piscataway: Institute of Electrical and Electronics Engineers.
Senthil, K., Prasanthi, K., & Rajaram, R. (2013). A modern avatar of Julius Caesar and Vigenère cipher. In Proceedings of the 2013 IEEE International Conference on Computational Intelligence and Computing Research. (pp. 1-3). Piscataway: Institute of Electrical and Electronics Engineers.
Singh, A., Nandal, A., & Malik, S. (2012). Implementation of Caesar cipher with rail fence for enhancing data security. International Journal of Advanced Research in Computer Science and Software Engineering, 2(12), 78-82.
Stallings, W. (2011). Cryptography and Network Security: Principles and Practice. (5th ed.). Upper Saddle River: Pearson Education.
Stinson, D.R. (2006). Cryptography: Theory and Practice. (3rd ed.). Boca Raton: Chapman & Hall/CRC.
Downloads
Published
2018-07-02
Issue
Section
Research Article