Developing a Strong Cipher
نویسنده
چکیده
The vigenere is weak because of key periodicity, but the fake one-time pad based on a random number generator removes that periodicity. This fake one-time pad, however, requires seed-based random number generation and it is therefore a mathematical linear sequence, which lends itself to various flaws as well. I propose that the vigenere can be modified from its base implementation, without relying solely on random number generation, to eliminate key periodicity as well as generally strengthen the cipher by using the key and a series of subsets of the key to encrypt to the message so strongly that no Friedman-like attack can be used against it.
منابع مشابه
New Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملSecure Auction Bidding Mobile Environment through Randomized Alphanumeric Cipher Algorithm
Mobile Auction Bidding is a developing mechanism that may widely used by GPRS enabled mobile around the world. Many dependable models existing in internet enabled platform. The proposed Auction Bidding Mobile application is basically based on Japanese auction, Double auction and English auction. Making the business model trustworthy, security is being provided by RAC (Randomized Alphanumeric Ci...
متن کاملSecure Symmetric Encryption Scheme Using Genetic Algorithm
Ensuring the security of sensitive and confidential data during transmission and storage is one of the greatest challenges faced by digital world. The most common technique used to protect data is encryption. Different encryption algorithms are available and they are used in security protocols to provide confidentiality, integrity and authentication. In spite of having strong encryption algorit...
متن کاملA Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کامل