A Hybrid Cryptosystem Using Vigenère Cipher and Rabin-p Algorithm in Securing BMP Files
DOI:
https://doi.org/10.32734/jocai.v4.i2-4173Keywords:
Vigenère cipher, Rabin-p, hybrid cryptosystem, BMP fileAbstract
Vigenère cipher is a classical cryptography algorithm and similar to other classical algorithms, it produces smaller but less secure ciphertexts than a public key cryptography algorithm. Meanwhile, Rabin-p is a public key cryptography algorithm with a stronger encryption than Vigenère cipher. Nevertheless, as a public key algorithm, Rabin-p is inefficient to encrypt vast amounts of messages such as BMP image files, since the size of the cipherimages will increase manyfold and this would lead to a problem in storing and sending the cipherimages. To overcome these problems, in this study, we combined the Vigenère cipher and the Rabin-p algorithm in a hybrid cryptosystem scheme. In the experiment, the Vigenère cipher was used to encrypt the BMP files and the Rabin-p algorithm was used to encrypt the Vigenère keys. The result showed that the size of the cipherimages did not increase and the decryption procedure could recover the original BMP files while maintaining their integrity.
Downloads
References
S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, “A comparative survey of Symmetric and Asymmetric Key Cryptographyâ€, in 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014.
Q. A. Kester, “A cryptosystem based on Vigenère cipher with varying keyâ€, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), pp. 108-113, 2012.
E. Ramaraj, S. Karthikeyan, and M. Hemalatha, “A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA)â€, International Journal of The Computer, the Internet and Management, vol. 17, no. 1, pp. 78-86, 2009.
V. Gampala, S. Inuganti, and S. Muppidi, “Data security in cloud computing with elliptic curve cryptographyâ€, International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 3, pp. 138-141, 2012.
S. Park, J. Kim, K. Cho, and D. H. Yum. “Finding the key length of a Vigenère cipher: How to improve the twist algorithmâ€, Cryptologia, vol. 44, no. 3, pp. 197–204, Jan. 2019.
M. O. Rabin, Digitalized Signatures and Public-Key Functions as Intractable as Factorization, No. MIT/LCS/TR-212, Massachusetts Inst. of Tech. Cambridge Lab. for Computer Science, 1979.
H. R. Hashim, “H-Rabin Cryptosystemâ€, Journal of Mathematics and Statistics, vol. 10, no. 3, pp. 304–308, Jan. 2014.
M. A. Asbullah and M. R. K. Ariffin, “Design of Rabin-like cryptosystem without decryption failureâ€, Malaysian Journal of Mathematical Sciences, vol. 10, pp. 1-18, 2016.
M. A. Asbullah, M. R. K. Ariffin, and Z. Mahad, “Analysis on the Rabin-p cryptosystemâ€, in AIP Conference Proceedings, vol. 1787, no. 1, p. 080012, AIP Publishing LLC, Nov. 2016.
R. Novak, “SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation,†Public Key Cryptography Lecture Notes in Computer Science, pp. 252–262, 2002.
B. Carter and T. Magoc, Introduction Classical Ciphers and Cryptanalysis, 2007.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Data Science: Journal of Computing and Applied Informatics

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.