Skip to main content

Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 939))

  • 557 Accesses

Abstract

In the field of cryptography, to make cryptosystem more secure an evaluation of modulus operations on integral values followed by ASCII value generation on plain text characters have been deeply explored in this research paper. On the basis of this an extended algorithm has been proposed. In this, the Encryption technique consists of an extended combination of Vigenere and Caesar cipher which is the main key feature of this algorithm and then decryption of text along with ASCII algorithm and substitution methodology has been done. The Algorithm is initiated on the basis of inspection of various research papers, furthermore, reviews have been made for proving this system more reliable. In the proposed algorithm modified Vigenere table and ASCII values are taken into consideration for decreasing the steps to reduce complexity and making a more secure way of cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stallings, W.: Cryptography and Network Security Principles and Practice. Pearson Education Inc., Prentice Hall (2011)

    Google Scholar 

  2. Rivest, R.L.: Cryptography. In: Van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. 1. Elsevier, Amsterdam (1990)

    Google Scholar 

  3. Justin, M.J., Manimurugan, S.: A survey on various encryption techniques. Int. J. Soft Comput. Eng. 2(1), 429–432 (2012)

    Google Scholar 

  4. Shinghe, S.R., Patil, R.: An encryption algorithm based on ASCII value. Int. J. Comput. Sci. Inf. Technol. 5(6), 7232–7234 (2014)

    Google Scholar 

  5. Sultana, R., Kamari, T.: An ASCII value based optimized text data encryption system. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 5(8) (2016)

    Google Scholar 

  6. Sukhraliya, V., Chaudhary, S., Solanki, S.: Encryption and decryption algorithm using ASCII values with substitution array approach. Int. J. Adv. Res. Comput. Commun. Eng. 2(8), 3094–3097 (2013)

    Google Scholar 

  7. Mathur, A.: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. Int. J. Comput. Sci. Eng. 4(9), 1650–1657 (2012)

    Google Scholar 

  8. Saraswat, A., Khatri, C., Sudhakar, Thakral, P., Biswas, P.: An Extended Hybridization of Vigenere and Caeser cipher techniques for secure communication. Procedia Comput. Sci. 92, 355–360 (2016)

    Article  Google Scholar 

  9. Krishna, Y.S.R.: Cryptographic algorithm based on ASCII conversions and a Radix function. Int. J. Sci. Eng. Res. 6(11), 1191–1194 (2015)

    Google Scholar 

  10. Bhargava, U., Sharma, A., Chawla, R., Thakral, P.: A new algorithm combining substitution & transposition cipher techniques for secure communication. In: ICOEI Tamil Nadu, pp. 619–624 (2017)

    Google Scholar 

  11. Gupta, C., Thakral, P.: ASCII conversion based two keys V4S scheme for encryption and decryption-a four step approach. In: IEEE International Conference on Computing, Communication & Networking ICCCNT 2017, IIT Delhi, pp. 1–6 (2017)

    Google Scholar 

  12. Liwandouw, V., Wowor, A.: The existence of cryptography: a study on instant messaging. Procedia Comput. Sci. 124, 721–727 (2017)

    Article  Google Scholar 

  13. Joshi, A., Wazid, M., Goudar, R.H.: An efficient cryptographic scheme for text message protection against brute force & cryptanalytic attacks. Procedia Comput. Sci. 48, 360–366 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prateek Thakral .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sakshi, Thakral, P., Goyal, K., Kumar, T., Garg, D. (2019). Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance. In: Abraham, A., Gandhi, N., Pant, M. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2018. Advances in Intelligent Systems and Computing, vol 939. Springer, Cham. https://doi.org/10.1007/978-3-030-16681-6_4

Download citation

Publish with us

Policies and ethics