Analyzing the Kasiski Method Against Vigenere Cipher

12/10/2019
by   April Lia Hananto, et al.
0

The weakness of the vigenere cipher lies in its short key and is repeated, so there is a key loop in encrypting messages, this is used by cryptanalysts using the Kasiski method to know the key length so it can solve this algorithm. The Kasiski method uses repetitive cryptograms found in the ciphertext to determine the key length. Modification of the vigenere cipher solves strengthen the cipher by using arranged keys to make it difficult to crack the keys against the Kasiski method attacks. This study analyzes the strength of the vigenere cipher ciphertext and the modification of the vigenere cipher from the encryption results composed of plaintexts that use different keys. Against the Kasiski method attack. The method used in this study is a quantitative method with a descriptive approach through nonparametric statistical tests on the sign test. The results showed a difference in the ciphertext's strength from the encryption process even though using the same key. The kaiseki method if can know not all key lengths the ciphertext in the compilation does not occur repetitive cryptograms. Modification of the vigenere cipher has a positive effect on the strength of the cipher and can influence the strength of the ciphertext that is built against the Kasiski method attacks.

READ FULL TEXT

page 1

page 6

page 7

research
01/19/2019

Weak Keys and Cryptanalysis of a Cold War Block Cipher

T-310 is a cipher that was used for encryption of governmental communica...
research
11/02/2020

Computing Power, Key Length and Cryptanalysis. An Unending Battle?

There are several methods to measure computing power. On the other hand,...
research
01/17/2019

Side-Channel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys

We consider the secure communication problem for broadcasting of two enc...
research
09/28/2021

Physical Unclonable Functions using speckle patterns of perfect optical vortices

Encryption techniques demonstrate a great deal of security when implemen...
research
12/26/2018

Implementation of Simplex Channels in the Blom's Keys Pre-Distribution Scheme

In article the modification of the Blom's keys preliminary distribution ...
research
08/28/2010

Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher

Problem statement: This paper examines Artificial Spiking Neural Network...
research
11/22/2020

Electt: running auditable and verifiable elections in untrusted environments

We present a system for running auditable and verifiable elections in un...

Please sign up or login with your details

Forgot password? Click here to reset