Abstract
In the field of cryptography, to make cryptosystem more secure an evaluation of modulus operations on integral values followed by ASCII value generation on plain text characters have been deeply explored in this research paper. On the basis of this an extended algorithm has been proposed. In this, the Encryption technique consists of an extended combination of Vigenere and Caesar cipher which is the main key feature of this algorithm and then decryption of text along with ASCII algorithm and substitution methodology has been done. The Algorithm is initiated on the basis of inspection of various research papers, furthermore, reviews have been made for proving this system more reliable. In the proposed algorithm modified Vigenere table and ASCII values are taken into consideration for decreasing the steps to reduce complexity and making a more secure way of cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Stallings, W.: Cryptography and Network Security Principles and Practice. Pearson Education Inc., Prentice Hall (2011)
Rivest, R.L.: Cryptography. In: Van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science, vol. 1. Elsevier, Amsterdam (1990)
Justin, M.J., Manimurugan, S.: A survey on various encryption techniques. Int. J. Soft Comput. Eng. 2(1), 429–432 (2012)
Shinghe, S.R., Patil, R.: An encryption algorithm based on ASCII value. Int. J. Comput. Sci. Inf. Technol. 5(6), 7232–7234 (2014)
Sultana, R., Kamari, T.: An ASCII value based optimized text data encryption system. Int. J. Adv. Res. Electr. Electron. Instrum. Eng. 5(8) (2016)
Sukhraliya, V., Chaudhary, S., Solanki, S.: Encryption and decryption algorithm using ASCII values with substitution array approach. Int. J. Adv. Res. Comput. Commun. Eng. 2(8), 3094–3097 (2013)
Mathur, A.: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. Int. J. Comput. Sci. Eng. 4(9), 1650–1657 (2012)
Saraswat, A., Khatri, C., Sudhakar, Thakral, P., Biswas, P.: An Extended Hybridization of Vigenere and Caeser cipher techniques for secure communication. Procedia Comput. Sci. 92, 355–360 (2016)
Krishna, Y.S.R.: Cryptographic algorithm based on ASCII conversions and a Radix function. Int. J. Sci. Eng. Res. 6(11), 1191–1194 (2015)
Bhargava, U., Sharma, A., Chawla, R., Thakral, P.: A new algorithm combining substitution & transposition cipher techniques for secure communication. In: ICOEI Tamil Nadu, pp. 619–624 (2017)
Gupta, C., Thakral, P.: ASCII conversion based two keys V4S scheme for encryption and decryption-a four step approach. In: IEEE International Conference on Computing, Communication & Networking ICCCNT 2017, IIT Delhi, pp. 1–6 (2017)
Liwandouw, V., Wowor, A.: The existence of cryptography: a study on instant messaging. Procedia Comput. Sci. 124, 721–727 (2017)
Joshi, A., Wazid, M., Goudar, R.H.: An efficient cryptographic scheme for text message protection against brute force & cryptanalytic attacks. Procedia Comput. Sci. 48, 360–366 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Sakshi, Thakral, P., Goyal, K., Kumar, T., Garg, D. (2019). Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance. In: Abraham, A., Gandhi, N., Pant, M. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2018. Advances in Intelligent Systems and Computing, vol 939. Springer, Cham. https://doi.org/10.1007/978-3-030-16681-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-16681-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16680-9
Online ISBN: 978-3-030-16681-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)