Abstract
Nowadays, with the advancement of technologies in modern life communication and networks, the secrecy of a cryptographic technique has become a strong necessity. The Vernam’s cipher which is a specific form of Vigenère cipher is gaining attention of researchers in the cryptography. But the modern encryption methods based on matrices available in the literature have their limitations to utilize them. Therefore, motivated by numerous cryptographic techniques available in the literature, this study presents a novel encryption approach for secure data communication. The proposed encryption approach is based on Vigenère cipher in finite dimensional vector space. Furthermore, the proposed approach relies on an eternal decomposition which is indiscriminate in the key selection inside key space. To add complexity by text scrambling, a weird substitution cipher key is added to provide maximum derangement in the encrypted text structure. Additionally, in the lights of Shannon’s secrecy, a comparison with usual matrix methods relying on \(LU\)—decomposition and eigenvalue decomposition is also discussed to justify the perfect secrecy thus achieved. It is revealed that the proposed encryption approach is a more versatile and perfectly secret encryption scheme that roots on the widening of key space to a mathematical structure, which not only fulfills the completeness with respect to the proposed decomposition but identical to message space as well.

Similar content being viewed by others
References
Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4), 656–715.
Wilson, P. I., & Garcia, M. (2006). A Modified Version of the Vigenère Algorithm. IJCSNS International Journal of Computer Science and Network Security, 6(3B), 140–143.
Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal 27, 379–423, 623–656 (Reprinted in C.E. Shannon and W. Weaver The Mathematical Theory of Communication; University Illinois Press: Champaign, IL, USA, 1949).
Shannon, C. E., & Warren, W. (2009). The Mathematical Theory of Communication (pp. 12–29). University of Illinois Press.
Kester, Q. A. (2012). A cryptosystem based on Vigenère cipher with varying key. International Journal of Advanced Research in Computer Engineering and Technology, 1(10), 108–113.
Khalid, M., Wadhwa, N., & Malhotra, V. (2012). Alpha-qwerty cipher. International Journal of Advanced Computing, 3(3), 107–118.
Kester, Q. A. (2013). A hybrid cryptosystem based on Vigenère cipher and columnar transposition cipher. International Journal of Advanced Technology and Engineering Research, 3(1), 141–147.
Omolara, O. E., Oludare, A. I., & Abdulahi, S. E. (2014). Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication. International Journal of Computer Engineering and Intelligent Systems, 5(5), 34–46.
Ali, F. M. S., & Sarhan, F. H. (2014). Enhancing security of vigenere cipher by stream cipher. International Journal of Computer Applications, 100(1), 1–4.
Subandi, A., Mieyanti, R., Sandy, C. L. M., & Sembiring, R. W. (2017). Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification. Advances in Science, Technology and Engineering Systems Journal, 2(5), 1–5.
Singh, G. (2014). Modified vigenere encryption algorithm and its hybrid implementation with base64 and AES. In IEEE Journal.
Song, Y., Zhu, Z., Zhang, W., Yu, H., & Zhao, Y. (2019). Efficient and secure image encryption algorithm using a novel key-substitution architecture. In IEEE Journal.
Okamoto, T., & Takashima, K. (2008). Homomorphic encryption and signatures from vector decomposition. In S. D. Galbraith & K. G. Paterson (Eds.), Pairing 2008. LNCS (Vol. 5209, pp. 57–74). Springer.
Johnson, N. F. (1998). Exploring steganography: Seeing the unseen. IEEE Transaction on Computer, 31(2), 26–34.
Benni, P., & Hetty Rohayani, A. H. (2015). A new modified Caesar cipher cryptography method with legible ciphertext from a message to be encrypted. Procedia Computer Science, 59, 195–204.
Uniyal, N., Dobhal, G., & Semwal, P. (2020). Enhanced security of encrypted text by KDMT: Key-domain maximization technique. IJRTE, 8(5), 1385–1388.
Othman, A. A. (2013). Binary LU encryption. In IEEE Journal.
Hu, Q. (1997). On the uniqueness of the Singular value decomposition in meteorological applications. Journal of Climate, 10(7), 1762–1766.
Funding
No funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Uniyal, N., Dobhal, G., Rawat, A. et al. A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication. Wireless Pers Commun 119, 1577–1587 (2021). https://doi.org/10.1007/s11277-021-08295-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08295-5