SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm

Expand
  • 1 Department of Information Technology, Al Musanna College of Technology, Muladdah 314, Sultanate of Oman;
    2 School of Computer Science and Engieering, Vellore Institute of Technology, Vellore, Tamil Nadu 632014, India

Received date: 2019-12-12

  Revised date: 2020-07-17

  Online published: 2022-11-09

Abstract

Despite many online messaging services, short message service (SMS) is still used because of its simplicity. However, such services can be easily cracked, making SMS more vulnerable to send confidential information. Therefore, appropriate cryptographic algorithms must be applied to ensure security. One of the most common cryptographic techniques used for encrypting and decrypting messages is the Vigenere cipher. However, Vigenere cipher can be cracked easily because the previous approach involved 26×10 matrixes, and the key comprised of alphabets. If the key length is small, then it becomes easier to crack the plain text by permutation. So here in this work, we have proposed a modified Vigenere cipher technique to enhance its security standards. Existing Vigenere cipher attack is not more secured, and thus we developed a method that improves the security in Vigenere cipher using Rivest-Shamir-Adleman (RSA). RSA is an asymmetric algorithm that has public and private keys. The advantage of using this algorithm is that finding factors for the large composite numbers is difficult. This method is secured but time consuming. In this proposed method, we combined RSA with Vigenere cipher so that the proposed algorithm is secured and consumes less time than RSA algorithm. This approach is widely used to encrypt SMS.

Cite this article

B. Bazeer Ahamed, Murugan Krishnamoorthy . SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm[J]. Journal of the Operations Research Society of China, 2022 , 10(4) : 835 -848 . DOI: 10.1007/s40305-020-00320-x

References

[1] Anaand, A., Raj, A., Koli, R., Bibu, V.: Proposed symmetric key cryptography algorithm for data security. In: International Conference on Innovation and Challenges in Cyber Security, pp. 159–162(2016)
[2] Sazena, Neeetesh, Chadhari, Narendhra S.: Easy SMS: a protocol for end to end secure transmision of SMS. IEEE Trans. Info Forensics Secur. 9(7), 1157–1168(2014)
[3] Wael, A., Hassene, S.: A new SMS encryption algorithm based on hyperchaotic system. In: 2nd International Conference on Advanced Technology (2016). https://doi.org/10.1109/ATSIP.2016.7523059
[4] Faahrianto, F., Maasruroh, S.U., Ando, N.Z.: Encrypted SMS application on Android with combination of caesar cipher and Vigenere algorithm. In: 2014 International Conference on IEEE Cyber and IT Service Management (CITSM), pp. 31–33(2014)
[5] Ahamed, B.B., Murugan, K.: International Conference on Intelligent Computing & Optimization, pp. 559–568. Springer, Cham (2019)
[6] Mandal, S.K., Deepti, A.R.: A cryptosystem based on Vigenere cipher by using multilevel encryption scheme. Int. J. Comput. Sci. Inf. Technol. 7, 2096–2099(2016)
[7] Bonfate, G., Halow, M.: Asymmetric Mach–Zehnder germano-silicate channel waveguide interferometers for quantum cryptography systems. Electron. Lett. 37(13), 846–847(2001)
[8] Vasant, P., Zelinka, I., Weber, G.-W.: Intelligent computing and optimization. In: Proceedings of the 2nd International Conference on Intelligent Computing and Optimization 2019. Springer (2019). https://doi.org/10.1007/978-3-030-33585-4
[9] Ganesan, T., Vasant, P., Sanghvi, P., Thomas, J., Litvinchev, I.: Random matrix generators for optimizing a fuzzy biofuel supply chain system. J. Adv. Eng. Comput. 4(1), 33–50(2020)
[10] Plos, Thomaas, Huter, Michaael: Security-enabled near-field communication tag with flexible architecture supporting asymmetric cryptography. IEEE Trans. Very Large Scale Integr. Syst. 21(11), 1965–1974(2013)
[11] Reddy, A.G., Das, A.K., Yoon, E.-J., Yoo, K.-Y.: A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4, 4394–4407(2016)
[12] Braveglieri, Luca, Korren, Israel, Maistri, Polo: An operation-centered approach to fault detection in symmetric cryptography ciphers. IEEE Trans. Comput. 56(5), 635–649(2007)
[13] Kauor, A., Shingh, S.: A hybrid technique of cryptography and watermarking for data encryption and decryption. In: Parallel, Distributed and Grid Computing (PDGC), Fourth International Conference, pp. 351–356(2016)
[14] Ahamad, S,. Alaam, K.M.R., Raahman, H., Taamura, S.: A comparision between symmetric and asymmetric key Encryption algorithm based decryption mix nets. In: International Conference on Networking, Systems and Security (NSysS), pp. 1–5(2015)
[15] Mushtaaque, M.A., Dhimaan, H.: Implementation of new encryption algorithm with random key selection and minimum space complexity. In: International Conference On Advances in Computer Engineering and Application (ICACEA), pp. 507–511(2015)
[16] Chaandra, S., Paaira, S., Alaam, S.S., Saanyal, G.: A comparative survey of symmetric and Asymmetric key cryptography. In: International Conference on Electrical, Communication and Computer, pp. 83–93(2014)
[17] Omran, S.S., Al-Khalid, A.S., Al-Saady, D.M.: A cryptanalytic attack on Vigenre cipher using genetic algorithm. In: 2011 IEEE Conference on Open Systems (ICOS), pp. 59–64(2011)
[18] Lu, T., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: An analysis of attacks against anonymous communication networks. In: 7th International Conference on Security Technology (SecTech), pp. 38–40(2014)
[19] Delgoshaa, F., Feki, F.: Public-key cryptography using paraunitary matrices. IEEE Trans. Signal Process. 54(9), 3489–3504(2016)
[20] Gerhaana, Y.A., Insaanudin, E., Syaarifudin, U., Zulmie, M.R.: Design of digital image application using Vigenere cipher algorithm. In: International Conference on IEEE Cyber and IT Service Management, pp. 1–5(2016)
[21] Raavikant, D.: Performance evaluation of loss packet percentage for asymmetric key cryptography in VANET. In: IEEE Conference, vol. 7(2019). https://doi.org/10.1109/PDGC.2018.8745798
[22] Naacira, G.Z., Abdelaaziz, A.: The θ-Vigenere cipher extended to numerical data. In: Proceedings International Conference on IEEE Information and Communication Technologies: from Theory to Applications, pp. 413–414(2004)
[23] O’Malia, S., Elbert, A.J.: Enhancing the performance of symmetric-key cryptography via instruction set extensions. IEEE Trans. Very Large Scale Integr. Syst. 8(11), 1505–1518(2009)
[24] Imraan, M., Rasheed, M., Jaafri, A.R., Najaam-ul-Islam, M.: ACryp-proc: flexible asymmetric crypto processor for point multiplication. IEEE Access 6, 22778–22793(2018)
Options
Outlines

/