A Hybrid Cryptosystem Using Vigenère Cipher and Rabin-p Algorithm in Securing BMP Files
DOI:
https://doi.org/10.32734/jocai.v4.i2-4173Keywords:
Vigenère cipher, Rabin-p, hybrid cryptosystem, BMP fileAbstract
Vigenère cipher is a classical cryptography algorithm and similar to other classical algorithms, it produces smaller but less secure ciphertexts than a public key cryptography algorithm. Meanwhile, Rabin-p is a public key cryptography algorithm with a stronger encryption than Vigenère cipher. Nevertheless, as a public key algorithm, Rabin-p is inefficient to encrypt vast amounts of messages such as BMP image files, since the size of the cipherimages will increase manyfold and this would lead to a problem in storing and sending the cipherimages. To overcome these problems, in this study, we combined the Vigenère cipher and the Rabin-p algorithm in a hybrid cryptosystem scheme. In the experiment, the Vigenère cipher was used to encrypt the BMP files and the Rabin-p algorithm was used to encrypt the Vigenère keys. The result showed that the size of the cipherimages did not increase and the decryption procedure could recover the original BMP files while maintaining their integrity.
Downloads
References
S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, “A comparative survey of Symmetric and Asymmetric Key Cryptography”, in 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014.
Q. A. Kester, “A cryptosystem based on Vigenère cipher with varying key”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), pp. 108-113, 2012.
E. Ramaraj, S. Karthikeyan, and M. Hemalatha, “A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA)”, International Journal of The Computer, the Internet and Management, vol. 17, no. 1, pp. 78-86, 2009.
V. Gampala, S. Inuganti, and S. Muppidi, “Data security in cloud computing with elliptic curve cryptography”, International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 3, pp. 138-141, 2012.
S. Park, J. Kim, K. Cho, and D. H. Yum. “Finding the key length of a Vigenère cipher: How to improve the twist algorithm”, Cryptologia, vol. 44, no. 3, pp. 197–204, Jan. 2019.
M. O. Rabin, Digitalized Signatures and Public-Key Functions as Intractable as Factorization, No. MIT/LCS/TR-212, Massachusetts Inst. of Tech. Cambridge Lab. for Computer Science, 1979.
H. R. Hashim, “H-Rabin Cryptosystem”, Journal of Mathematics and Statistics, vol. 10, no. 3, pp. 304–308, Jan. 2014.
M. A. Asbullah and M. R. K. Ariffin, “Design of Rabin-like cryptosystem without decryption failure”, Malaysian Journal of Mathematical Sciences, vol. 10, pp. 1-18, 2016.
M. A. Asbullah, M. R. K. Ariffin, and Z. Mahad, “Analysis on the Rabin-p cryptosystem”, in AIP Conference Proceedings, vol. 1787, no. 1, p. 080012, AIP Publishing LLC, Nov. 2016.
R. Novak, “SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation,” Public Key Cryptography Lecture Notes in Computer Science, pp. 252–262, 2002.
B. Carter and T. Magoc, Introduction Classical Ciphers and Cryptanalysis, 2007.
Published
How to Cite
Issue
Section
Copyright (c) 2020 Data Science: Journal of Computing and Applied Informatics
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Data Science: Journal of Informatics Technology and Computer Science (JoCAI) and Faculty of Computer Science and Information Technology as well as TALENTA Publisher Universitas Sumatera Utara as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, will be allowed only with a written permission fromData Science: Journal of Informatics Technology and Computer Science (JoCAI).
The Copyright Transfer Form can be downloaded here.
The copyright form should be signed originally and sent to the Editorial Office in the form of original mail or scanned document.