z-logo
open-access-imgOpen Access
Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm
Author(s) -
Z. Qowi,
Noor Hudallah
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1918/4/042009
Subject(s) - computer science , cipher , running key cipher , two square cipher , transposition cipher , theoretical computer science , ciphertext , stream cipher , algorithm , encryption , cryptography , arithmetic , computer security , mathematics
There is a risk in the process of exchanging information, especially text information. To reduce that risk, one of cryptographic method can be applied. That is Vigenere Cipher algorithm. But the Vigenere Cipher algorithm have a weakness. The weakness is a repetitive encryption key. It causes the chipertext to be predictable with the Babbage-Kasiski method. By combining Caesar Cipher and Hill Cipher methods in the process of generating the encryption key, its expected to cover up the weakness of the Vigenere Cipher method. The combination has the capability to hide the character appearance’s frequencies.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here