Indonesi
an
J
ournal
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
23
,
No.
1
,
Ju
ly
20
21
,
pp.
431
~
437
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v
23
.i
1
.
pp
431
-
437
431
Journ
al h
om
e
page
:
http:
//
ij
eecs.i
aesc
or
e.c
om
An imp
roved
vigener
algorithm b
ased on
circula
r
-
left
-
shift
key
and MSB b
inary
for d
ata security
Aso Ahmed
Majeed
1
,
Ba
n
az
A
nwe
r Q
ader
2
1
Depa
rtment of
Para
sitol
og
y
,
Co
ll
eg
e
of
Vete
r
inar
y
Medicine
,
Un
ive
rsit
y
of
Kirku
k
,
Ir
aq
2
Com
pute
r
Depa
rtment,
Co
llege of
Com
pute
r
Sci
enc
e
and
Inform
at
ion
Technol
og
y
,
Univer
si
t
y
of
Kirkuk
,
Ir
aq
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Ma
r
3
, 2
021
Re
vised
A
pr
1,
2021
Accepte
d
J
un
1
5
, 202
1
Cr
y
ptogr
aph
y
is
a
signif
ic
an
t
st
ud
y
area
a
t
pre
s
ent
sinc
e
i
t
c
an
be
vi
ta
l
t
o
prote
c
t
ex
ceedi
n
gl
y
sensiti
v
e
and
sec
re
t
informat
i
on
from
il
le
g
al
f
rau
d
during
net
work
tr
ansm
ission.
One
o
f
the
b
asic
cr
y
pt
ogra
phic
al
go
rithm
s
is
the
Vigene
re
ci
pher
,
which
is
a
ver
y
e
as
y
en
cr
y
pt
io
n
m
et
hod
to
be
used
as
an
al
t
ern
ative
to
C
ae
sar
ci
ph
er
fo
r
enc
r
y
pti
ng
th
e
te
xt
of
the
m
essage
.
In
th
is
pape
r,
we
enh
a
nce
th
e
Vigen
er
e
al
gor
it
hm
and
propose
a
new
m
et
hod
b
y
shifti
ng
the
k
e
y
in
ea
ch
m
essage
to
pre
vent
r
epeat
ing
th
e
m
essage
s.
Also,
i
t
conve
rts
the
m
essage
s
int
o
bina
r
y
form
rat
her
th
an
an
al
phab
et
.
Furthermore,
it
adds
a
f
ew
bits
of
ran
dom
paddi
ng
to
e
ac
h
blo
ck
of
output
s
to
send
a
series
of
bit
s.
The
pr
oposed
al
gori
th
m
is
named
“
ci
rcu
l
ar
-
le
f
t
-
shift
ke
y
-
base
d
Vigene
r
a
lgori
th
m
using
m
ost
si
gnifi
c
ant
bit
(
M
SB
)
b
ina
r
y
(C
L
S
-
V
-
MS
B)”.
Final
l
y
,
th
is
techni
que
slight
l
y
r
ai
ses
the
si
ze
of
the
c
iph
ert
ex
t,
bu
t
subs
ta
nti
all
y
in
cre
ase
s
the
c
i
pher
'
s
protect
io
n,
ac
hi
eve
s
th
e
sec
urity
obje
c
ti
ves
(au
th
ent
i
ca
t
ion,
conf
ide
ntialit
y
,
inte
grity
,
fre
shness
,
and
non
-
rep
udiation), a
n
d
avoi
ds Kasiski
and
Fri
edman
.
Ke
yw
or
d
s
:
Asym
m
et
ric k
ey
cryptogra
phy
Crypto
gr
a
phy
Substi
tuti
on ciph
e
r
Sy
m
m
e
tric
k
ey
crypt
ography
Vige
ner
e
cip
he
r
This
is an
open
acc
ess arti
cl
e
un
der
the
CC
B
Y
-
SA
l
ic
ense
.
Corres
pond
in
g
Aut
h
or
:
Aso Ahm
ed
Ma
j
eed
Dep
a
rtm
ent o
f Parasi
tolo
gy
Un
i
ver
sit
y o
f Kir
kuk, Kir
ku
k,
Ir
a
q
Em
a
il
: asoalsalihi@gm
ai
l.com
1.
INTROD
U
CTION
In
t
he
la
st
ce
nturie
s,
afte
r
us
in
g
the
Vi
ge
ner
e
ci
pher
f
or
nea
rly
300
ye
ars;
at
ta
cks
against
t
he
Vige
ner
e
ci
pher
we
re
disco
ve
red
i
n
the
19th
cent
ur
y.
The
Vige
ner
e
ci
pher
pe
rfor
m
anc
e
is
si
m
il
ar
to
C
aesar
ci
ph
e
r
in
s
ubsti
tuti
ng
eac
h
le
tt
er
by
a
ce
rtai
n
value.
Wh
ere
a
s,
the
dif
fer
e
nc
e
is
the
sh
i
ft
of
each
al
pha
bet
le
tt
er
in
Vi
gen
e
re
ci
ph
e
r
acc
ordin
g
to
a k
ey
c
onsist
s
of
se
ver
al
a
lph
a
bets
in
a wa
y
that
the
n
it
is
bei
ng
pro
gres
sed
t
o
crypto
gr
a
phy.
But
in
Ca
esar,
the
enc
ryptio
n
has
do
ne
th
rou
gh
a
key
co
ns
i
sts
of
on
e
num
ber
[1]
,
[2]
.
Us
ually
,
two
par
ti
es
ne
ed
to
exc
ha
ng
e
m
essages,
but
th
ey
nee
d
t
o
dodge
t
he
underst
and
i
ng
of
the
third
pa
rty
to
thes
e
m
essages
if
t
hose
fall
into
hi
s/her
ha
nds.
T
he
st
ud
y
of
te
chn
i
qu
e
s
of
s
afe
interact
ive
c
om
m
un
ic
at
ion
be
tween
two pa
rtie
s is don
e
b
y c
rypt
ography
[
3]
-
[5]
.
Along
with
th
e
acce
le
rated
a
dv
a
ncem
ent
of
inf
or
m
at
ion
te
chnolo
gies,
the
volum
e
of
data
file
s
tha
t
are
exc
hange
d
ov
e
r
the
I
nter
ne
t
con
ti
nues
to
grow.
Th
us
,
t
he
safe
tra
ns
fe
r
of
sec
ret
knowle
dge
acr
os
s
public
netw
orks
has
be
com
e
a
co
m
m
on
t
opic
an
d
in
te
rest
in
acad
e
m
ic
research
fiel
ds
[
6]
.
T
he
i
dea
of
c
rypto
grap
hy
is
div
i
ded
into
two
basic
c
ompone
nts
of
sub
sti
tuti
on
a
nd
tr
ans
po
sit
io
n.
I
n
a
s
ub
sti
tuti
on
ci
ph
e
r,
t
he
plainte
xt
le
tt
ers
are
s
ubs
ti
tuted
by
oth
e
r
le
tt
ers
to
crea
te
the
ci
pherte
xt,
wh
il
e
t
ra
nspo
sit
io
n
ci
ph
e
r
involve
s
scr
a
m
bl
ing
the p
la
inte
xt le
tt
ers
su
c
h
t
hat they occ
upy a
di
ff
ere
nt
po
sit
io
n [4
]
,
[
7]
.
C
r
y
p
t
o
g
r
a
p
h
i
c
p
r
o
t
o
c
o
l
s
a
r
e
d
i
v
i
d
e
d
i
n
t
o
t
w
o
t
y
p
e
s
w
h
i
c
h
a
r
e
:
s
y
m
m
e
t
r
i
c
-
k
e
y
c
r
y
p
t
o
g
r
a
p
h
y
a
n
d
a
s
y
m
m
e
t
r
i
c
-
k
e
y
c
r
y
p
t
o
g
r
a
p
h
y
.
I
n
t
h
e
f
i
r
s
t
k
i
n
d
,
t
h
e
s
e
n
d
e
r
a
n
d
r
e
c
e
i
v
e
r
u
s
e
a
s
i
n
g
l
e
k
e
y
f
o
r
b
o
t
h
t
h
e
e
n
c
r
y
p
t
i
o
n
a
n
d
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
20
21
:
431
-
437
432
d
e
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
[
8
]
-
[
1
0
]
.
W
h
e
r
e
a
s
i
n
t
h
e
o
t
h
e
r
k
i
n
d
w
h
i
c
h
i
s
k
n
o
w
n
a
s
a
s
y
m
m
e
t
r
i
c
-
k
e
y
c
r
y
p
t
o
g
r
a
p
h
y
;
t
h
e
r
e
a
r
e
t
w
o
k
e
y
s
.
T
h
e
f
i
r
s
t
k
e
y
i
s
n
a
m
e
d
a
p
u
b
l
i
c
k
e
y
a
n
d
u
s
e
d
f
o
r
t
h
e
e
n
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
.
T
h
e
s
e
c
o
n
d
k
e
y
i
s
n
a
m
e
d
a
p
r
i
v
a
t
e
k
e
y
a
n
d
u
s
e
d
f
o
r
t
h
e
d
e
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
a
s
w
e
l
l
a
s
u
s
i
n
g
f
o
r
s
i
g
n
a
t
u
r
e
[
5
]
,
[
1
1
]
.
T
h
i
s
p
a
p
e
r
u
s
e
s
b
o
t
h
i
d
e
a
s
o
f
c
r
y
p
t
o
g
r
a
p
h
y
p
r
i
n
c
i
p
l
e
(
s
u
b
s
t
i
t
u
t
i
o
n
a
n
d
t
r
a
n
s
p
o
s
i
t
i
o
n
)
a
n
d
u
s
e
s
t
h
e
s
y
m
m
e
t
r
i
c
k
e
y
p
r
o
t
o
c
o
l
w
h
i
c
h
i
s
s
u
i
t
e
d
f
o
r
d
a
t
a
s
e
c
u
r
i
t
y
d
u
e
t
o
i
t
s
l
i
g
h
t
w
e
i
g
h
t
.
The
detai
ls o
f
this arti
cl
e w
il
l be clarifie
d
i
n
the foll
ow
i
ng
s
ect
ion
s. In
s
ect
ion
2,
w
e
su
m
m
arize fr
om
the
pr
e
vious
li
te
ratur
e
w
ork
s
sever
al
dif
f
eren
t
al
gorith
m
s
that
are
recently
wr
it
te
n.
T
he
obj
ect
i
ves
of
crypto
gr
a
phy
a
nd
an
entire
de
scriptio
n
of
t
he
pro
posed
al
go
rithm
are
dem
on
st
rated
res
pe
ct
ively
in
s
ect
ion
3.
The
sec
ur
it
y
a
sp
ect
s
a
nd
t
he
at
ta
cks'
analy
sis
of
the
pro
po
s
ed
al
gorith
m
is
being
dis
cusse
d
in
sect
ion
4.
Finall
y,
s
ect
io
n 5 in
cl
ud
e
s
de
ta
il
ed
co
nclusi
on
s
of t
his
paper
.
2.
RELATE
D
W
ORK
Aized
et
al
.
[
12]
ha
ve
en
ha
nc
ed
the
Vige
nere
ci
ph
e
r
by
us
i
ng
a
ta
ble
co
nsi
sts
of
8
s
hiftin
g
al
phab
et
le
tt
ers
in
orde
r
inclu
di
ng
t
he
sy
m
bo
l
'
&'
t
o
create
8
li
ne
s
of
al
pha
bet
le
tt
ers.
T
his
le
d
to
a
n
i
ncr
ea
se
th
e
m
od
ule
27
rat
he
r
tha
n
26.
Ac
cordin
g
to
thei
r
al
gorithm
,
th
e
ind
e
x
of
plai
ntext
would
ha
ve
been
m
at
ching
the
ind
e
x
of
t
he
ta
ble.
F
or
exam
ple,
the
fir
s
t
le
tt
er
w
ould
be
e
nc
rypted
ac
co
rdi
ng
t
o
the
first
li
ne
in
the
pro
po
s
ed
ta
ble,
a
nd
so
on.
To
sa
ve
the
enc
ryptio
n
m
essage,
it
m
us
t
ne
ver
be
re
du
nd
a
nt,
but
this
point
was
m
issed
i
n
this
al
gorithm
.
Re
searche
rs
Kh
ai
run
an
d
P
artha
[
6]
ha
ve
su
ggest
ed
a
n
exp
a
nded
vers
ion
of
the
Vige
ner
e
Ci
ph
er
util
iz
ing
the
95
×
95
Vige
ner
e ta
ble,
w
hic
h
f
urnis
he
d
facil
it
ie
s f
or
en
cry
pting
t
he
low
e
r
-
case l
et
te
rs
(a
-
z),
nu
m
ber
s
(0
-
9),
a
nd
33
s
pe
ci
al
char
act
er
s
involvi
ng
th
e
sp
ace
t
hat
is
util
iz
ed
in
ke
yboa
rd
a
nd
E
ng
li
s
h
Lan
gu
a
ge.
Th
ei
r
al
gorithm
is
so
m
ewh
at
equ
i
valent
to
t
he
sin
gula
r
al
gorithm
because
it
ben
e
fite
d
from
m
od
ulo
95
ins
te
ad
of
us
i
ng
m
od
ulo
26.
T
he
crit
ic
al
issue
in
cryptogra
ph
y
is
to
pr
e
ve
nt
send
i
ng
th
e
sa
m
e
m
essage
twic
e
,
an
d
the
al
gor
it
h
m
did
no
t
c
ov
e
r
this
iss
ue
.
S
ur
ya
et
al
.
[
13
]
a
dd
e
d
t
he
Vige
ner
e
G
oldbac
h
cod
e
s to
t
he Vigene
re al
gorith
m
. Mo
reo
ve
r,
t
hey cha
nged
th
e res
ult of the
Vige
ner
e
ci
phe
r
to
G
oldbach
cod
e
s
then
co
nverte
d
the
resu
lt
into
AS
CII
c
od
e
c
har
act
er
s.
The
auth
or
s
se
nt
a
sp
eci
al
char
act
er
and
a
n
al
phabet
char
act
e
r
in
the
final
co
de.
This
al
go
rit
hm
send
s
the
sa
m
e
m
essage
again,
this
le
a
ds
to
ex
plorin
g
the
al
gorithm
through
c
om
pu
ti
ng
the
re
peated
cha
racter.
Fai
rouz
a
nd
Fala
h
[14]
util
iz
ed
a
c
om
bin
at
ion
of
the
Vige
ner
e
with
Stream
ci
ph
er
to
create
a
ci
pherte
xt
from
a
Plai
ntext
thr
ough
tw
o
keys
wh
ic
h
are:
Vige
ner
e
tradit
ion
al
key
an
d
bin
a
ry
ke
y.
Firstl
y,
the
Vige
ner
e
al
gor
it
h
m
was
a
pp
li
ed
to
the
plain
te
xt.
A
fter
t
hat
,
the
plainte
xt
was
conve
rted
to
it
s
AS
CI
I
the
n
XO
R
it
with
the
bi
nar
y
ke
y.
Last
ly
,
the
y
app
e
nded
t
he
first
al
ph
a
bet
ou
ste
d
from
the
Vi
gen
e
re
with
t
he
first
oute
d
c
har
act
er
f
r
om
the
stream
ci
ph
er
,
a
nd
so
on
.
T
he
fr
es
hness is a
n i
ssu
e in
this al
gorithm
b
ecaus
e when
se
nd
i
ng a m
essage tw
ic
e, the
sam
e
ci
ph
e
r wil
l be se
nt.
The
Vige
ner
e
encr
y
ption
is
c
lose
to
Ca
esa
r
encr
y
ption.
Wh
ere
it
in
volve
s
a
key
th
rou
gh
it
an
d
th
e
sh
ifti
ng
will
do
for
each
le
tt
er.
H
ow
e
ve
r,
th
e
disti
nction
be
tween
them
is
that
the
siz
e
o
f
sh
ifti
ng
va
ries
with
each
le
tt
er.
Be
fore
c
on
t
in
uing,
it
w
ould
be
ben
e
fici
al
to
di
sp
la
y
the
enc
od
i
ng
ta
ble
tha
t
is
cal
le
d
the
ta
bu
l
a
rectum
as seen
in Figu
re
1
[14]
,
[15]
. T
his m
et
hod
is
not res
ist
ant to Kasi
s
ki and
Fr
ie
dm
a
n
at
ta
cks
.
Figur
e
1.
Vi
ge
ner
e
t
able
[15]
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
i
mp
r
ove
d
vi
gen
e
r
algorit
hm
ba
se
d o
n
ci
r
cular
-
le
ft
-
sh
if
t
key a
nd M
SB b
ina
ry
for…
(
As
o
A
hmed
Ma
je
ed
)
433
On
ly
the
al
pha
bets
(
A
-
Z)
a
re en
co
de
d
by
the
Vige
nere
c
ip
he
r.
Be
f
ore
e
ncry
ption
,
al
l
the
l
ow
e
r
-
ca
se
al
ph
abets
and up
per
-
case
alph
a
bets i
n
a
plainte
xt m
essage m
us
t be c
onve
rted
to o
nly t
he uppe
rcase
al
ph
a
bets.
Alge
br
ai
cal
ly
,
the
Vige
ne
re
ci
ph
er
can
be
per
cei
ve
d.
By
fu
nctio
n
E
k
,
the
encr
y
ption
fe
at
ur
e
gen
e
rates
the
c
iph
e
rtext.
It
is
def
i
ned
as
C
i
=
E
k
(M
i
)
=
M
i
+
K
i
(m
od
26)
[
16]
,
[
17]
.
T
hu
s
,
C
i
is
the
it
h
num
ber
of
t
he
ci
pherte
x
t.
M
is
the p
la
intext,
M
i
is
th
e
it
h
num
ber
in
M.
K
is
the
ke
y,
K
i
is
the
it
h
nu
m
ber
in
K
Mod
26.
If
the
le
tt
ers
A
–
Z
are
ta
ke
n
to
be
the
num
ber
s
0
–
25.
Be
sides,
a
D
k
dec
r
ypti
on
featu
re
recover
s
the
plainte
xt
from
the ciph
e
rtext.
It is
def
i
ned as
M
i
= D
k
(C
i
)
=
(C
i
-
K
i
)
(m
od
26)
[18]
,
[
19
]
.
In
each
cry
ptogra
phy,
the
se
cur
it
y
ser
vice
i
s
an
esse
ntial
par
t.
The
propose
d
al
gorithm
CLS
-
V
-
MSB
has
al
so
bee
n
e
valuated
to
e
nsure
an
acce
pta
ble
le
vel
of
pr
otect
ion
.
In
thi
s
al
go
rithm
,
the
secur
it
y
is
ob
ta
ined
per certai
n basi
c secu
rity
co
nd
it
ion
s ar
e
g
i
ve
n belo
w:
Au
t
hen
ti
cat
io
n;
A
uth
e
ntica
ti
on
is
the
e
nd
re
cei
ver
that
c
he
cks
the
i
den
ti
ty
of
the
sen
de
r.
T
he
dev
ic
e
or
us
er
m
ay
co
nf
i
rm
their iden
ti
ty
to
an
oth
e
r pe
r
son
w
ho is un
awar
e
of thei
r
i
den
ti
ty
[
20
]
,
[
21]
.
Confide
ntial
it
y;
The
m
os
t
wi
dely
deb
at
e
d
obj
ect
iv
e
is
secrecy
.
Co
nf
ide
nt
ia
li
t
y
is
app
lied
to
pre
ven
t
t
he
third pa
rty
f
r
om
o
btaining t
he
infor
m
at
ion
wh
e
n
t
wo
-
per
s
on ex
c
ha
ng
e
th
is i
nfor
m
at
ion
[21]
,
[22]
.
In
te
gr
it
y
;
In
te
gri
ty
gu
ara
ntees
the
m
essage
t
hat
has
bee
n
re
cei
ved
is
of
th
e
sa
m
e
sh
ape.
It
ensures
that
th
e
receive
d
m
essage is
not al
te
re
d or m
od
if
ie
d
[
21
]
,
[
23
]
.
Fr
es
hn
es
s
;
Fr
e
sh
ne
ss
gua
ran
t
ees
m
od
ern
it
y
of
al
l
data
a
nd
s
ha
red
c
om
m
un
ic
at
ion
s
avo
i
ding
the
re
-
sen
ding
of
old
inf
or
m
at
ion
.
More
ov
e
r,
to
preve
nt
old
m
essages
from
being
re
-
tra
ns
m
itt
ed
by
an
at
ta
cker,
a tim
est
a
m
p
ca
n be a
dd
e
d
t
o
t
he packet t
o
e
nsure
the
fr
e
shn
ess of t
he data
[8]
,
[
21
]
.
Non
-
Re
pudiati
on
;
Non
-
repu
di
at
ion
is
a
way
of
ens
uri
ng
th
e
exch
a
nge
of
m
essages
by
di
gital
sign
at
ur
e
or
encr
y
ption bet
ween pa
rtie
s. It aim
s to
guar
d against t
he den
ia
l of
a
uth
e
ntica
ti
on
[8]
,
[
12
]
.
T
h
e
p
r
o
p
o
s
e
d
a
l
g
o
r
i
t
h
m
C
L
S
-
V
-
M
S
B
u
s
e
s
b
o
t
h
i
d
e
a
s
o
f
c
r
y
p
t
o
g
r
a
p
h
y
p
r
i
n
c
i
p
l
e
(
s
u
b
s
t
i
t
u
t
i
o
n
a
n
d
t
r
a
n
s
p
o
s
i
t
i
o
n
)
a
n
d
u
s
e
s
t
h
e
s
y
m
m
e
t
r
i
c
k
e
y
p
r
o
t
o
c
o
l
w
h
i
c
h
p
r
o
t
e
c
t
s
t
h
e
m
e
s
s
a
g
e
f
r
o
m
r
e
p
e
a
t
i
n
g
.
T
h
i
s
l
e
a
d
s
t
o
a
c
h
i
e
v
i
n
g
a
u
t
h
e
n
t
i
c
a
t
i
o
n
,
c
o
n
f
i
d
e
n
t
i
a
l
i
t
y
,
i
n
t
e
g
r
i
t
y
,
f
r
e
s
h
n
e
s
s
,
a
n
d
n
o
n
-
r
e
p
u
d
i
a
t
i
o
n
.
A
n
d
i
t
a
v
o
i
d
s
K
a
s
i
s
k
i
a
n
d
F
r
i
e
d
m
a
n
a
t
t
a
c
k
s
.
3.
THE
PROPO
SED
ALGO
R
ITHM
T
h
e
p
r
o
p
o
s
e
d
a
l
g
o
r
i
t
h
m
C
L
S
-
V
-
M
S
B
e
n
h
a
n
c
e
s
t
h
e
V
i
g
e
n
e
r
e
a
l
g
o
r
i
t
h
m
b
y
a
d
d
i
n
g
p
a
r
a
m
e
t
e
r
s
t
o
t
h
e
e
n
c
r
y
p
t
i
o
n
a
n
d
d
e
c
r
y
p
t
i
o
n
e
q
u
a
t
i
o
n
s
o
f
t
h
e
t
r
a
d
i
t
i
o
n
a
l
V
i
g
e
n
e
r
e
a
l
g
o
r
i
t
h
m
(
s
u
b
s
t
i
t
u
t
i
o
n
)
.
I
t
c
o
n
v
e
r
t
s
t
h
e
r
e
s
u
l
t
s
t
o
b
i
n
a
r
y
s
y
s
t
e
m
f
o
r
m
(
t
r
a
n
s
p
o
s
i
t
i
o
n
)
.
A
l
s
o
,
i
t
c
o
n
c
a
t
e
n
a
t
e
s
a
s
h
a
r
e
d
s
y
m
m
e
t
r
i
c
k
e
y
w
i
t
h
e
a
c
h
b
i
n
a
r
y
o
u
t
p
u
t
o
f
e
n
c
r
y
p
t
i
o
n
.
M
o
r
e
o
v
e
r
,
t
h
e
p
r
o
p
o
s
e
d
m
e
t
h
o
d
s
e
n
d
s
t
h
e
a
l
p
h
a
b
e
t
l
o
c
a
t
i
o
n
r
a
t
h
e
r
t
h
a
n
t
h
e
a
l
p
h
a
b
e
t
i
t
s
e
l
f
a
s
s
h
o
w
s
i
n
A
l
g
o
r
i
t
h
m
1
a
n
d
2
.
B
e
s
i
d
e
s
,
i
t
c
o
n
s
i
s
t
s
o
f
2
6
l
e
t
t
e
r
s
a
n
d
a
s
p
a
c
e
c
o
r
r
e
s
p
o
n
d
e
d
w
i
t
h
t
h
e
i
r
i
n
d
e
x
e
s
a
s
s
h
o
w
n
i
n
T
a
b
l
e
1
.
Table
1.
CL
S
-
V
-
MSB
ta
ble
Alp
h
ab
et
Ind
ex
Alp
h
ab
et
Ind
ex
Alp
h
ab
et
Ind
ex
Alp
h
ab
et
Ind
ex
Alp
h
ab
et
Ind
ex
A
0
G
6
M
12
S
18
Y
24
B
1
H
7
N
13
T
19
Z
25
C
2
I
8
O
14
U
20
Ø
26
D
3
J
9
P
15
V
21
-
-
E
4
K
10
Q
16
W
22
-
-
F
5
L
11
R
17
X
23
-
-
Algorithm
1
. C
LS
-
V
-
MSB
f
or enc
ryptio
n
1.
Seiz
e
for ea
ch
c
har
acte
r
5
bi
ts,
b
ec
ause
we
h
ave
27
locati
ons
for eac
h
one
c
al
l
ed a
blo
ck.
2.
Sele
c
t
p
,
p
=
p
lai
nte
xt
.
3.
Sele
c
t
K,
l
.
K=k
e
y
and
l
is t
h
e length of
the key
.
4.
Defi
ne
j
=0
To
2
l(p)
-
1
,
wher
e
j
i
s
an
int
eg
er
shar
ed
ke
y
st
art
s
fro
m
ze
ro,
l(p)
=
l
e
ngth
of
plain
t
e
xt.
Besid
es,
i
t
is
inc
rement
ed autom
at
ic
a
lly
fo
r
th
e
nex
t
m
essage
.
5.
=
(
+
)
27
,
whe
re
is t
he
in
it
ial
output
of
c
i
pher
te
x
t,
th
e
K
i
s
ke
y
and
th
e
l
is
th
e
le
ng
th
of
th
e
ke
y
,
and
I
th
e in
dex.
Fin
al
l
y
,
w
e use
the space als
o;
so t
h
at we
h
av
e
m
od
27.
6.
Us
e
the
inde
x
of
each cha
r
ac
t
er t
o
the bi
n
ar
y
bi
t.
7.
=
||
j,
wher
e
is
th
e
fin
al
ci
ph
ertext
,
|
|
is
conc
a
te
n
at
i
on
where
p
added
j
(one
bi
t)
acc
ording
to
the
m
ost
signifi
c
ant
b
it (
MS
B)
for
each
b
loc
k
in
th
e
.
8.
Inc
rement
j.
9.
KCLS,
where
C
LS
is mea
nt
Cir
c
ula
r Left Shift
fo
r
next e
n
cr
y
pts
m
assage
.
10.
W
ai
t
10
sec
onds
.
Algorithm
2
. C
LS
-
V
-
MSB
f
or d
ec
ryptio
n
1.
Se
iz
e
for ea
ch
c
har
acte
r
5
bi
ts,
b
ec
ause
we
h
ave
27
locati
ons
for eac
h
one
c
al
l
ed a
blo
ck.
2.
Sele
c
t
p
,
p
=
p
lai
nte
xt
.
3.
Sele
c
t
K
,
l
.
K
=key
and
l
is t
he
l
en
gth
of the
ke
y
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
20
21
:
431
-
437
434
4.
Defi
ne
j=0
To 2
l
(
p
)
-
1.
5.
begi
n
6.
Find t
he
j
re
c
e
ive
r m
e
ssage
val
ue
,
throu
gh
the num
ber
o
f
the re
ce
iv
ed
m
essage
.
7.
Isolat
es
the
j
re
c
e
ive
r
mess
age
(one
bit
) acc
o
rding to
the m
ost signi
fi
ca
nt
bit (MS
B)
f
or
each
b
loc
k
in the
.
8.
If
j==
j
re
c
e
ive
r m
e
ssage
the
n
beg
in
9.
Change
the bi
na
r
y
bit to
get t
h
e
i
ndex
of ea
ch charac
t
er.
10.
=
(
−
)
27
.
11.
Save
t
ime
re
ce
i
v
ed
m
essage
.
12.
Inc
rement
j.
13.
K
CLS
,
where
CL
S
is mea
nt
Cir
cul
a
r
Le
f
t
Shif
t
for
n
ext
d
ec
r
y
pt
m
essage
.
14.
W
ai
t
10
sec
onds
.
15.
end
16.
El
se
d
isca
rd
the
m
essage
.
17.
W
ai
t
10
sec
onds
18.
end
E
x
a
m
p
l
e
:
P
l
a
i
n
t
e
x
t
=
H
E
L
L
O
,
t
h
e
k
e
y
=
W
S
N
,
t
h
e
e
n
c
r
y
p
t
i
o
n
t
h
a
t
i
s
d
o
n
e
a
c
c
o
r
d
i
n
g
t
o
a
l
g
o
r
i
t
h
m
1
w
i
l
l
b
e
a
s
t
h
e
f
o
l
l
o
w
i
n
g
:
1.
p
=HEL
LO.
2.
K=
W
S
N,
l
=3
.
3.
J=
0
, 2
l(
p)
-
1
=
15.
4.
=
(
+
)
27
H=V,
10101
E=
M,
01100
L=
Y,
11000
L=
Z
,
11001
O=W
,
10110
5.
010101001100011000011001010110
6.
J
=1.
7.
K=
NW
S
.
The decry
ptio
n o
f
the
cip
her
te
xt acco
r
ding to
A
lg
ori
thm
2
wi
ll
b
e as the
fol
lowing:
1.
p
=HEL
L
O.
2.
K
=W
SN
,
l=3
.
3.
J
=0
,
2
l(p)
-
1
=
15
.
4.
0
1
0
1
0
1
0
0
1
1
0
0
0
1
1
0
0
0
0
1
1
0
0
1
0
1
0
1
1
0
5.
0
0
0
0
0
=0
of
r
eceiver
m
ess
ag
e.
6.
0
of
r
eceiver
m
ess
ag
e=j.
7.
1
0
1
0
1
=V
0
1
1
0
0
=M
1
1
0
0
0
=Y
1
1
0
0
1
=Z
1
0
1
1
0
=W
8.
=
(
−
)
27
V=H
M=E
Y=L
Z=L
W
=O
9.
J
=1
.
10.
K
= N
W
S.
The
pro
po
se
d
al
gorithm
CLS
-
V
-
MSB
m
akes
sure
th
at
eac
h
m
essage
has
ne
ver
bee
n
re
peated
unti
l
the
sh
a
re
d
key
j
reaches
2
l(
p)
-
1
.
Wh
e
n
it
re
aches
this
val
ue,
t
he
key
m
us
t
be
cha
nge
d
a
nd
sta
rt
f
rom
the
beg
i
nn
i
ng.
Ge
ner
al
ly
,
the
bit
series
wh
ic
h
includes
ra
nd
om
bits
and
conve
rted
cha
ra
ct
er
bit;
m
akes
the
la
nguag
e'
s c
ha
racteri
sti
c am
b
iguous.
4.
RESU
LT
S
AND DI
SCUS
S
ION
T
h
e
p
r
o
p
o
s
e
d
m
e
t
h
o
d
C
L
S
-
V
-
M
S
B
m
a
k
e
s
t
h
e
e
n
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
s
t
r
o
n
g
b
y
e
n
c
r
y
p
t
i
n
g
t
h
e
s
a
m
e
m
e
s
s
a
g
e
m
o
r
e
t
h
a
n
o
n
c
e
a
n
d
g
i
v
e
d
i
f
f
e
r
e
n
t
r
e
s
u
l
t
s
.
T
h
i
s
a
d
v
a
n
t
a
g
e
i
s
g
o
t
t
e
n
b
y
u
s
i
n
g
b
o
t
h
(
s
u
b
s
t
i
t
u
t
i
o
n
,
tr
a
n
s
p
o
s
i
t
i
o
n
)
a
n
d
s
y
m
m
e
t
r
i
c
s
h
a
r
e
d
k
e
y
s
.
A
s
s
h
o
w
n
i
n
T
a
b
l
e
2
,
t
h
e
m
e
s
s
a
g
e
w
a
s
r
e
p
e
a
t
e
d
i
n
[
6
]
,
[
1
2
]
,
[
1
3
]
,
[
2
4
]
f
o
r
t
h
e
p
l
a
i
n
t
e
x
t
“
G
O
O
D
M
O
R
N
I
N
G
"
w
i
t
h
a
k
e
y
"
S
U
R
Y
A
”
.
B
u
t
i
n
t
h
e
p
r
o
p
o
s
e
d
a
l
g
o
r
i
t
h
m
t
h
e
m
e
s
s
a
g
e
w
i
l
l
n
o
t
b
e
r
e
p
e
a
t
e
d
t
i
l
l
t
h
e
s
y
m
m
e
t
r
i
c
k
e
y
j
r
e
a
c
h
2
l
(
p
)
-
1.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
i
mp
r
ove
d
vi
gen
e
r
algorit
hm
ba
se
d o
n
ci
r
cular
-
le
ft
-
sh
if
t
key a
nd M
SB b
ina
ry
for…
(
As
o
A
hmed
Ma
je
ed
)
435
Table
2
.
C
om
par
iso
n betwee
n t
he pr
opos
e
d
a
lgorit
hm
CLS
-
V
-
MSB
a
nd
ot
her al
gorithm
s
Alg
o
rith
m
s
Ro
u
n
d
1
Ro
u
n
d
1
Ro
u
n
d
1
Vig
en
ere
YIFBM
GLE
G
NY
YIFBM
GLE
GNY
YIFBM
GLE
GNY
[
1
2
]
XE&UR
TV
TJF
&
T
XE&UR
TV
TJF
&
T
XE&UR
TV
TJF
&
T
[
1
3
]
ڌ
–
¢
: G
ڌ
–
¢
: G
ڌ
–
¢
: G
[
6
]
Yif
b
eiilI
f
a
Yif
b
eiilI
f
a
Yif
b
eiilI
f
a
[
2
4
]
4
FC8
TDI
BDU5
4
FC8
TDI
BDU5
4
FC8
TDI
BDU5
CLS
-
V
-
MSB
GBWD
ØMB
ZNI
NU
UW
O
DØØ
W
RN
I
AO
OOODN
UORN
W
VG
The
ci
pherte
xt
conver
ts
eac
h
char
act
er
or
s
ym
bo
l
to
a
bloc
k
of
five
bin
a
ry
bits
values
accor
ding
to
their
in
dex
in
Table
1
to
be
(00
110000
011011
000011
110100
110000
0
01
110010
110101
000011
011010
0)
for
(G
B
WDØMB
ZNIN
U)
,
(
1010
010110
011100
001111
010110
101011
010001
011010
100000
000011
10)
for
(UWOD
ØØW
RNI
AO),
a
nd
(01
110011
100111
000011
011011
010001
110100
010110
110110
101010
0110)
for
(OOOD
NUOR
N
WVG)
.
F
urt
he
rm
or
e,
the
fin
al
ste
p
is
pad
di
n
g
the
s
har
e
d
key
j
wh
ic
h,
in
this
exam
ple,
sta
rts
from
five
an
d
conseq
ue
ntly
i
ncr
ease
d
by
one
afte
r
each
m
essage
acco
r
ding
to
Algo
rithm
1;
le
ading
to
the
resu
lt
s:
(
1
0011
0
0
0000
1
1
1011
0
0
0001
1
0
1101
0
0
0110
0
0
0000
1
0
1100
1
0
0110
1
0
0100
0
0
0110
1
0
1010
0)
w
he
n
the
sh
are
d
ke
y
is
j
=5,
(
1
1010
0
1
1011
0
0
0111
0
0
0001
1
0
1101
0
0
1101
0
0
1011
0
0
1000
1
0
0110
1
0
0100
0
0
0000
0
0
0111
0
)
wh
e
n
j
=6,
a
nd
(
1
01110
1
0111
0
1
0111
0
0
0001
1
0
0110
1
0
1010
0
0
0111
0
0
1000
1
0
0110
1
0
1011
0
0
1010
1
0
0011
0)
wh
e
n
j
=
7.
The
m
essage is
different
from
o
ne ro
und t
o
a
noth
er as sh
own
in Fi
gure
2
.
Figure
2. Com
par
is
on b
et
wee
n
e
ncr
y
pted
m
essages
Anothe
r
c
om
par
iso
n
in
T
a
bl
e
3
s
hows
that
the
pro
pose
d
m
et
ho
d
CLS
-
V
-
MSB
is
bette
r
tha
n
[
6],
[12],
[13],
[24], [2
5]
in term
s o
f
secu
rity
goa
ls as the
f
ollowi
ng
:
Au
t
hen
ti
cat
io
n:
The
authe
ntica
ti
on
is
abse
nt
in
the
Vige
ner
e
al
gorit
hm
and
[
3]
,
[
6]
,
[7]
,
[
13]
becau
se
there
is
nothin
g
that
pro
ves
t
he
enc
rypted
m
essage
is
co
m
ing
from
an
auth
or
iz
e
d
pa
r
ty
.
Fo
r
e
xam
pl
e,
wh
e
n
Alic
e send
s a m
essage
to Bob
and Eve gains
this
m
e
ssage.
T
he
ne
xt
tim
e
w
hen
E
ve
sen
ds
the sa
m
e
m
essage
to
Bo
b
with
ou
t
al
te
r
ing
it
,
the
la
st
par
ty
will
receive
the
m
essa
ge
thin
king
it
's
com
e
fr
om
a
le
gitim
at
e p
arty
, and
he
w
il
l e
xch
a
nge m
essages
with E
ve.
Finall
y, the int
ruder Eve
can
get the al
gorit
hm
after
s
wappin
g
s
om
e
m
essages.
B
ut,
in
t
he
pr
opos
e
d
a
lgorit
hm
CLS
-
V
-
MSB
when
the
m
essage
is
app
e
nded
with
a
sh
a
red
key
wh
ic
h
is
j
;
the
le
gitim
at
ed
la
s
t
par
ty
will
che
ck
the
sh
a
red
ke
y
j
.
If
t
he
key
j
is n
ot equivale
nt,
it
w
il
l
know that the m
essage c
om
es f
ro
m
Ev
e
or a m
al
iciou
s
p
a
rty
.
Confide
nti
al
it
y: all
algo
rithm
s achieve
this
goal
; beca
us
e t
he
y sen
d
am
big
uous
m
essages
.
In
te
gr
it
y:
al
l
al
gorithm
s
achieve
this
goal
;
beca
us
e
they
sen
d
e
ncr
ypt
ed
m
essages,
and
the
receiv
er
fo
ll
ows t
he
sa
m
e steps for de
crypti
ng the
m
essage.
Fr
es
hn
es
s:
The
fr
es
hn
es
s
is
abse
nt
in
the
Vigen
e
re
al
gorith
m
and
[6
]
,
[
12
]
,
[1
3],
[
24]
be
cause
they
are
rep
eat
in
g
t
he
s
ent
m
essage
as
sho
wn
in
T
abl
e
2.
F
or
e
xam
ple,
w
he
n
Alic
e
twic
e
sen
ds
th
e
sam
e
m
essage
to
Bob
;
this
wi
ll
be
incom
patib
le
with
the
fresh
ness
goal
.
On
the
oth
e
r
ha
nd
,
in
the
pro
po
s
ed
al
gorith
m
;
the
sam
e
m
ess
age
will
be
se
nt
with
dif
fer
e
nt
outp
uts
as
s
how
n
in
Ta
ble
2.
M
or
e
over,
there
is
a
s
hared
key j pa
dded
to
the
resu
lt
a
nd
add
e
d
t
o
the
ori
gin
al
d
i
ff
e
ren
t
outp
ut m
essages for the sam
e m
essage.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
23
, N
o.
1
,
Ju
ly
20
21
:
431
-
437
436
Non
-
re
pudiati
on:
The
Vi
ge
ne
re
al
gorithm
a
nd
[
3],
[
6],
[7
]
,
[13]
are
inco
m
pat
ible
with
this
go
al
beca
use
they
cannot
be
authen
ti
cat
ed
.
Conversely
,
in
the
pro
pose
d
al
go
rithm
CL
S
-
V
-
MSB
,
the
receiver
c
hec
ks
the
sh
are
d
key
.
If
it
'
s
no
t
equi
valent,
he
dis
card
s
the
m
essage
as
m
entione
d
in
Algorith
m
2,
to
resu
lt
i
n
that t
he
m
essage
has
c
om
e from
a legit
i
m
a
t
e p
a
rty
.
Table
3.
C
om
par
iso
n betwee
n t
he pr
opos
e
d
a
lgorit
hm
CLS
-
V
-
MSB
a
nd
ot
her al
gorithm
s in
sec
ur
it
y t
er
m
s
Alg
o
rith
m
s
Au
th
en
ticatio
n
Co
n
f
i
d
en
tiality
Integ
rity
Fresh
n
ess
No
n
-
Rep
u
d
ia
tio
n
Vig
en
ere
No
Yes
Yes
No
No
[
1
2
]
No
Yes
Yes
No
No
[
1
3
]
No
Yes
Yes
No
No
[
6
]
No
Yes
Yes
No
No
[
2
4
]
No
Yes
Yes
No
No
CLS
-
V
-
MSB
Yes
Yes
Yes
Ye
s
Yes
The
tr
ouble
with
Eve
is
t
hat
s
he
does
n'
t
have
any
inf
orm
ation
a
bout
the
ke
y'
s
le
ng
th,
the
refor
e
,
she
'
s
ei
ther
gu
es
sin
g
or
s
earc
hing
for
cl
ues
in
the
m
essage.
S
ever
al
ways
a
re
pr
ov
i
ded
to
obta
in
hin
ts
about
knowin
g
the
le
ng
t
h
of
t
he
key.
Kasis
ki
a
n
d
F
riedm
an
wor
k
with
al
pha
bets
on
ly
.
T
heir
exa
m
inati
on
s
were
the
first
tria
l
at
that,
and
he
re
is
the
idea:
so
m
e
le
tt
er
co
m
bin
at
ion
s
or
w
ord
s
m
ay
be
duplica
te
d
in
the
m
essage
su
c
h
as
(TH,
RR
,
CH,
et
c.).
The
key
in
the
pr
op
os
e
d
al
gorithm
CLS
-
V
-
MSB
sh
ifte
d
w
it
h
each
m
es
sage
to
resu
lt
in
it
a
un
i
qu
e
m
essag
e
wh
ic
h
ne
ver
rep
eat
e
d
as
s
how
n
in
Ta
ble
2.
F
ur
t
her
m
or
e,
the
CLS
-
V
-
MSB
al
gorithm
send
s
a
series
of
bi
nar
y
bits
rat
he
r
than
le
tt
ers
t
hat
causes
it
s
r
esi
sta
nce
to
K
asi
sk
i
an
d
Fr
ie
dm
an
at
ta
cks.
5.
CONCL
US
I
O
N
Th
ou
gh
the
Vi
gen
e
re
ci
pher
i
s
no
t
sa
fe
f
or
e
ncr
y
pting
unpa
dd
e
d
m
essages,
it
with
oth
e
r
s
ub
sti
tuti
on
ci
ph
e
rs
can
be
m
ade
as
sta
bl
e
as
oth
er
bl
ock
ci
ph
e
rs
by
inserting
ra
ndom
paddin
g
bits
to
each
bl
ock
t
o
distrib
ute
the
l
angua
ge
c
har
a
ct
erist
ic
s.
This
pa
dd
i
ng
te
c
hn
iqu
e
w
ou
l
d
be
pe
rf
ect
ly
safe
as
the
cal
cula
ti
on
of
discrete
lo
ga
rithm
is
te
dio
us
,
and
it
is
ha
rd
to
se
par
at
e
a
dd
ed
s
har
e
d
key
bits
from
conv
erted
ci
ph
e
rtex
t
bits.
This
sh
a
red
ke
y
pad
di
ng
m
ay
al
so
be
app
li
e
d
to
i
m
pr
ove
a
blo
ck
ci
pher'
s
pr
otect
io
n
or
bu
il
d
on
ly
a
pad
to
encode
each
m
essage
unti
l
use
an
oth
e
r
key.
More
ov
e
r,
the
key
will
be
s
hi
fted
a
fter
each
m
essage.
T
he
ou
t
pu
t
of
the
e
ncr
y
pt
ed
m
essage
w
il
l
be
inse
rted
an
d
c
od
e
d
i
n
the
m
essage
to
al
low
the
ke
y
to
be
tra
nsfer
red
secur
el
y.
Th
e
m
essage
is
no
t
re
peate
d
ti
ll
the
sh
are
d
key
re
aches
(
2l
(p
)
-
1),
an
d
the
final
sen
ds
a
m
essage
that
include
s
a
seri
es
of
bin
a
ry
bits
rathe
r
th
an
a
lph
a
bet
c
har
act
ers.
The
analy
s
is
of
the
pr
opose
d
al
gorithm
CLS
-
V
-
MSB
pro
ve
s
that
it
achie
ves
the
secu
rity
go
al
s
(au
t
he
ntica
ti
on
,
C
onf
identia
li
ty
,
In
t
egr
it
y,
f
res
hn
e
ss,
a
nd
non
-
re
pudiati
on)
, a
nd it
m
uch
secu
re a
gainst
Kasiski a
nd F
ri
edm
an
at
ta
cks.
REFERE
NCE
S
[1]
G.
W
u,
K.
W
ang,
J.
Zha
ng
a
nd
J.
He
,
“
A
l
ight
weight
and
eff
icient
en
cr
y
p
ti
on
sch
eme
ba
sed
on
LFS
R,
”
Inte
rnational
Jo
urnal
of Embedd
ed
Syst
ems
,
vol
.
10,
no
.
3
,
pp
.
22
5
-
232,
2018
,
doi
:
10.
1504
/IJES.
2
018.
091785.
[2]
S
.
R
.
-
S
a
l
z
e
d
o
,
“
T
h
e
v
i
g
e
n
e
r
e
c
i
p
h
e
r
,
”
i
n
C
r
y
p
t
o
g
r
a
p
h
y
,
S
p
r
i
n
g
e
r
,
C
h
a
m
,
2
0
1
8
,
p
p
.
4
1
-
5
4
,
d
o
i
:
1
0
.
1
0
0
7
/
9
7
8
-
3
-
3
1
9
-
9
4
8
1
8
-
8
_
5
.
[3]
A.
E.
Om
ola
ra
and
A.
Ja
nta
n
,
“
Modifie
d
hone
y
en
cr
y
pt
ion
sc
heme
for
enc
od
ing
nat
ur
al
l
ang
uage
m
essage
,
”
Inte
rnational
Jo
urnal
of
El
e
ct
ri
cal
and
Comput
er
Engi
ne
ering
(
IJE
CE)
,
vol.
9,
no.
3,
pp.
1871
-
1878,
2019,
do
i:
10.
11591/ijece.
v
9i3.
pp1871
-
187
8.
[4]
S.
Budi,
A.
B.
Purba,
and
J.
Mu
l
y
ana,
“
Secur
e
document
fi
le
s
using
a
combina
ti
on
of
subs
ti
tu
tion
m
et
hods
and
vige
ner
e
ci
ph
er
in
Baha
sa
Pen
gamana
n
file
dokum
en
m
engg
unaka
n
kom
bina
si
m
et
ode
subtit
usi
dan
vige
n
e
re
ci
pher
,
”
ILKO
M
Jurnal
Ilmiah
,
v
ol.
11
,
no
.
3
,
pp
.
222
-
230,
2019
,
doi:
10
.
330
96/il
kom
.
v11i3.
477.
2
22
-
230.
[5]
N.
A.
Kako,
H.
T.
Sade
eq,
and
A.
R.
Abrahi
m
,
“
New
s
y
m
m
et
ric
ke
y
ci
ph
er
c
apa
bl
e
of
digr
ap
h
to
single
le
t
ter
conve
rsion
u
ti
l
i
zi
ng
bin
ar
y
s
y
s
te
m
,
”
Indon
esia
n
Journal
of
El
e
ct
rica
l
Eng
i
nee
ring
and
Computer
Scienc
e
(
IJE
ECS)
,
vol. 1
8
,
no
.
2
,
pp
.
102
8
-
1034,
2020
,
d
oi:
10
.
11591/ije
e
cs.
v18.
i2
.
pp102
8
-
1034.
[6]
K
.
N
a
h
a
r
a
n
d
P
.
C
h
a
k
r
a
b
o
r
t
y
,
“
A
M
o
d
i
f
i
e
d
V
e
r
s
i
o
n
o
f
V
i
g
e
n
e
r
e
C
i
p
h
e
r
u
s
i
n
g
9
5
×
9
5
T
a
b
l
e
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
E
n
g
i
n
e
e
r
i
n
g
a
n
d
A
d
v
a
n
c
e
d
T
e
c
h
n
o
l
o
g
y
(
I
J
E
A
T
)
,
v
o
l
.
9
,
n
o
.
5
,
p
p
.
1
1
4
4
-
11
4
8
,
2
0
2
0
,
d
o
i
:
1
0
.
3
5
9
4
0
/
i
j
e
a
t
.
E
9
9
4
1
.
0
6
9
5
2
0
.
[7]
T.
M.
Aung,
H.
H.
Naing
,
and
N
.
N.
Hla
,
“
A
co
m
ple
x
tra
nsform
at
ion
of
m
onoalphabe
t
ic
ci
ph
er
t
o
pol
y
a
lpha
be
tic
ci
pher
:(Vige
nè
re
-
Affine
c
iphe
r)
,
”
Int
ernati
onal
Journal
of
Mac
hine
Learning
a
nd
Computing
,
vol.
9
,
no
.
3
,
p
p.
296
-
303,
2019
,
doi:
10
.
18178/ij
m
lc
.
2019.
9
.
3.
80
1.
[8]
A.
Majeed,
“
Clu
ster
form
ing
b
ase
d
on
spa
ti
a
l
inf
orm
at
ion
using
HM
AC
in
W
SN,
”
Ti
krit
Journal
of
Pure
S
ci
en
ce
,
vol.
22
,
no
.
6
,
pp
.
131
-
139
,
2017
.
[9]
M
.
T
.
I
s
l
a
m
a
n
d
M
.
S
.
H
o
s
s
a
i
n
,
“
H
y
b
r
i
d
i
z
a
t
i
o
n
o
f
v
i
g
e
n
e
r
e
t
e
c
h
n
i
q
u
e
w
i
t
h
t
h
e
c
o
l
l
a
b
o
r
a
t
i
o
n
o
f
R
S
A
f
o
r
s
e
c
u
r
e
c
o
m
m
u
n
i
c
a
t
i
o
n
,
”
A
u
s
t
r
a
l
i
a
n
J
.
o
f
E
n
g
.
a
n
d
I
n
n
o
v
a
t
i
v
e
T
e
c
h
.
,
v
o
l
.
1
,
n
o
.
6
,
p
p
.
6
-
1
3
,
2
0
1
9
,
d
o
i
:
1
0
.
3
4
1
0
4
/
a
j
e
i
t
.
0
1
9
.
0
6
0
1
3
.
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
An
i
mp
r
ove
d
vi
gen
e
r
algorit
hm
ba
se
d o
n
ci
r
cular
-
le
ft
-
sh
if
t
key a
nd M
SB b
ina
ry
for…
(
As
o
A
hmed
Ma
je
ed
)
437
[10]
A.
Subandi,
R
.
Mei
y
ant
i
,
C
.
L
.
M.
Sand
y
,
and
R.
W
.
Sem
biri
n
g,
“
Thre
e
-
p
ass
pro
toc
ol
impleme
nta
ti
on
in
vig
en
ere
ci
pher
cl
assic
cr
y
ptogr
aph
y
a
lgo
rit
hm
with
ke
y
s
t
rea
m
gene
r
at
or
m
odifi
ca
t
ion,
”
A
dvanc
es
in
S
ci
e
nce
,
Te
chnol
og
y
and
Engi
n
ee
ring
Syste
ms
Journal
,
vol
.
2
,
no
.
5
,
pp
.
1
-
5
,
2017
,
doi
: 10.25046/
a
j0205
01.
[11]
B.
B.
Aham
ed
and
M.
Krish
namoorth
y
,
“
SM
S
Enc
r
y
pti
on
an
d
Dec
r
y
p
ti
on
Us
ing
Modifie
d
Vigene
re
Ciph
e
r
Algorit
hm
,
”
J. O
per.
R
es.
So
c. C
hina
,
pp
.
1
-
14
,
2
020,
doi
:
10
.
100
7/s40305
-
020
-
00320
-
x.
[12]
A.
A.
Soofi,
I.
Ria
z
,
and
U.
Rashee
d,
“
An
Enha
n
ce
d
Vigene
r
e
Ci
pher
for
Data
Secur
ity
,
”
Int
ernat
ional
Journal
of
Sci
en
ti
fic
&
Technol
ogy Re
searc
h
,
vol
.
5
,
no
.
3
,
p
p.
141
-
145
,
201
6.
[13]
S.
D.
Nasution,
G.
L.
Ginti
ng
,
M.
Sy
ahr
i
za
l
,
an
d
R.
Rahi
m
,
“
D
at
a
Secur
ity
Us
ing
Vigene
re
Cip
her
and
Goldba
c
h
Codes
Algorit
h
m
,
”
Int
.
J. E
ng.
Re
s.
Te
chnol
,
vo
l.
6
,
no
.
1
,
p
p
.
36
0
-
363,
2017
.
[14]
N.
H.
Htet
and
Z.
M.
A
y
e
,
“
Innova
ti
on
Secu
rity
of
Bea
ufort
Cip
her
b
y
Str
ea
m
Ciphe
r
Us
ing
M
y
anmar
-
Vigener
e
Ta
bl
e
and
Unic
ode
Ta
bl
e,”
in
Proce
ed
ings
of
the
10th
Int
e
rnational
Work
shop
on
Comp
ute
r
Sci
en
ce
an
d
Engi
ne
ering
(
WCSE
2020)
,
202
0,
pp
.
52
-
56
,
doi
:
10.
18178
/wcse
.
2020.
02.
009
.
[15]
T
.
M
.
A
u
n
g
a
n
d
N
.
N
.
H
l
a
,
“
A
C
o
m
p
l
e
x
P
o
l
y
a
l
p
h
a
b
e
t
i
c
C
i
p
h
e
r
T
e
c
h
n
i
q
u
e
M
y
a
n
m
a
r
P
o
l
y
a
l
p
h
a
b
e
t
i
c
C
i
p
h
e
r
,
”
2
0
1
9
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
C
o
m
p
u
t
e
r
C
o
m
m
u
n
i
c
a
t
i
o
n
a
n
d
I
n
f
o
r
m
a
t
i
c
s
(
I
C
C
C
I
)
,
2
0
1
9
,
p
p
.
1
-
9
,
d
o
i
:
1
0
.
1
1
0
9
/
I
C
C
C
I
.
2
0
1
9
.
8
8
2
1
7
9
7
.
[16]
P
.
A
.
M
.
H
a
r
a
a
n
d
H
.
M
a
n
u
r
u
n
g
,
a
n
d
D
.
F
i
l
i
n
a
,
“
V
i
g
e
n
e
r
e
C
i
p
h
e
r
a
n
d
H
i
l
l
C
i
p
h
e
r
A
l
g
o
r
i
t
h
m
i
n
D
a
t
a
S
e
c
u
r
i
t
y
A
p
p
l
i
c
a
t
i
o
n
s
i
n
D
o
c
u
m
e
n
t
F
i
l
e
s
i
n
B
a
h
a
s
a
A
l
g
o
r
i
t
m
a
V
i
g
e
n
e
r
e
C
i
p
h
e
r
D
a
n
H
i
l
l
C
i
p
h
e
r
D
a
l
a
m
A
p
l
i
k
a
s
i
K
e
a
m
a
n
a
n
D
a
t
a
P
a
d
a
F
i
l
e
D
o
k
u
m
e
n
,
”
J
u
r
n
a
l
T
e
k
n
i
k
I
n
f
o
r
m
a
t
i
k
a
K
a
p
u
t
a
m
a
,
v
o
l
.
1
,
n
o
.
1
,
p
p
.
2
6
-
3
3
,
2
0
1
7
,
d
o
i
:
1
0
.
3
1
2
2
7
/
o
s
f
.
i
o
/
7
h
3
6
y
.
[17]
N.
Ahm
ad,
“
Design
of
a
W
eb
-
Based
Goods
Inve
ntor
y
Da
ta
Se
cur
ity
S
y
stem
a
t
Nanda
Stores
Us
in
g
the
Vigen
er
e
Ciphe
r
Cr
y
ptogr
aph
y
Method
in
Baha
sa
Per
anca
ngan
Sis
te
m
Ke
amana
n
Dat
a
In
vent
or
y
Ba
ran
g
Di
Toko
Nanda
Berba
sis
W
eb
Menggunaka
n
Metode
Kriptog
raf
i
Vigen
ere
C
i
pher
,
”
Jurnal
T
ek
nolog
i
Informas
i
MURA
,
vo
l.
11,
no.
1
,
pp
.
29
-
36
,
2019
,
doi:
10.
32
767/JTI.
V11I1.4
51
.
[18]
Z.
Shabr
iz
qi
,
“
Applic
a
ti
on
of
t
he
Vigen
ere
C
i
pher
and
Verna
m
Ciphe
r
Algor
it
hm
s
in
Secur
i
t
y
of
T
ext
Fil
es
in
Pener
apa
n
Algo
rit
m
a
Vege
n
ere
Ciphe
r
Dan
Ver
nam
Ciphe
r
Dal
am
Penggamana
n
Fil
e
T
ext
,”
J
URIKOM
(
Jurn
a
l
Ri
set
Komputer)
,
vol
.
6
,
no
.
3
,
pp
.
326
-
332
,
2019
.
[19]
H
.
H
.
S
a
m
i
a
n
d
A
.
S
.
M
a
h
m
o
o
d
,
“
E
n
c
o
d
i
n
g
S
y
r
i
a
c
L
e
t
t
e
r
s
i
n
P
a
r
t
i
t
i
o
n
T
h
e
o
r
y
U
s
i
n
g
E
x
t
e
n
d
e
d
V
i
g
e
n
e
r
e
C
i
p
h
e
r
,
”
E
a
s
t
e
r
n
-
E
u
r
o
p
e
a
n
J
o
u
r
n
a
l
o
f
E
n
t
e
r
p
r
i
s
e
T
e
c
h
n
o
l
o
g
i
e
s
,
v
o
l
.
1
,
n
o
.
2
,
p
p
.
37
-
4
6
,
2
0
2
0
,
d
o
i
:
1
0
.
1
5
5
8
7
/
1
7
2
9
-
4
0
6
1
.
2
0
2
0
.
1
9
6
8
3
1
.
[20]
R
.
D
a
m
a
r
a
A
r
d
y
,
O
.
R
.
I
n
d
r
i
a
n
i
,
C
.
A
.
S
a
r
i
,
D
.
R
.
I
.
M
.
S
e
t
i
a
d
i
,
a
n
d
E
.
H
.
R
a
c
h
m
a
w
a
n
t
o
,
“
D
i
g
i
t
a
l
i
m
a
g
e
s
i
g
n
a
t
u
r
e
u
s
i
n
g
t
r
i
p
l
e
p
r
o
t
e
c
t
i
o
n
c
r
y
p
t
o
s
y
s
t
e
m
(
R
S
A
,
V
i
g
e
n
e
r
e
,
a
n
d
M
D
5
)
,
”
2
0
1
7
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
S
m
a
r
t
C
i
t
i
e
s
,
A
u
t
o
m
a
t
i
o
n
&
I
n
t
e
l
l
i
g
e
n
t
C
o
m
p
u
t
i
n
g
S
y
s
t
e
m
s
(
I
C
O
N
-
S
O
N
I
C
S
)
,
2
0
1
7
,
p
p
.
8
7
-
9
2
,
d
o
i
:
1
0
.
1
1
0
9
/
I
C
O
N
-
S
O
N
I
C
S
.
2
0
1
7
.
8
2
6
7
8
2
7
.
[21]
A.
A.
Agarka
r
,
M.
Kar
y
aka
r
te
a
nd
H.
Agrawal
,
“
Pos
t
Quantum
Secur
ity
Solut
io
n
for
Data
Aggr
ega
t
ion
in
W
irel
es
s
Sensor
Netw
orks,”
2020
I
EEE
Wirel
ess
Comm
unic
ati
ons
and
Net
working
Con
fe
renc
e
(
WCNC)
,
2020,
pp.
1
-
8,
doi:
10.
1109/WCN
C45663.
2020.
912
0843
.
[22]
I.
Saputra,
N.
A.
Hasibua
n,
Mesr
an,
and
R.
Rah
i
m
,
“
Vigene
re
c
i
pher
al
gor
it
hm
with
gra
y
sca
le
i
m
age
ke
y
gen
erator
for
sec
ur
e
t
ext
fi
le
,
”
In
te
rnationa
l
Journal
of
Enginee
ring
Re
searc
h
&
Technol
ogy
,
vol. 6, no. 1, pp. 266
-
269,
2017.
[23]
W
.
Ita
ni
,
A.
Ka
yss
i,
and
A.
Cheh
ab.
“
W
ire
le
ss
B
od
y
Sensor
Net
works
:
Secur
ity
,
Privacy
,
and
En
erg
y
Eff
i
cienc
y
i
n
the
Era
of
Clo
ud
Com
puti
ng
,
”
in
Cybe
r
Law
,
Priv
acy,
and
Sec
urit
y:
Concepts,
Me
thodol
og
ie
s,
Tools
,
and
Appl
ic
a
ti
ons
,
Mana
gement
A
ss
oci
at
ion
,
Info
rm
at
ion
Resour
ce
s,
Penns
y
lv
a
nia
,
US
A
:
IGI
Global,
2019
,
pp.
731
-
763
,
doi
:
1
0.
4018
/978
-
1
-
5225
-
8897
-
9.
ch
035
.
[24]
A.
Sara
sw
at
,
C.
Khatr
i,
Sudhaka
r,
P.
Tha
kra
l,
an
d
P.
Biswas,
“
An
Ext
end
ed
H
y
b
ridi
z
at
ion
o
f
Vig
ene
re
and
C
ae
sa
r
Ciphe
r
T
ec
hniq
ues
for
Secur
e
Com
m
unic
at
ion,”
in
Proc
edi
a
Computer
Sci
en
ce
,
vo
l.
92
,
pp.
355
-
360,
2016
,
doi:
10
.
1016/j.pr
ocs.
2016.
07
.
390
.
[25]
F.
M.
S.
Ali
and
F.
H.
Sarha
n
,
“
Enha
nc
ing
sec
ur
ity
of
vig
ene
r
e
c
iphe
r
b
y
str
ea
m
ci
pher
,
”
In
te
rnat
ional
Journal
o
f
Computer
Appli
cat
ions
,
vol
.
100
,
no
.
1
,
pp
.
1
-
4
,
2014.
BIOGR
AP
HI
ES OF
A
UTH
ORS
As
o
A
hmed
Ma
jee
d
is
cur
r
ent
l
y
an
instruc
tor
at
the
Univer
sit
y
o
f
Kirkuk
Kirkuk
,
Ira
q.
He
rec
e
ive
d
a
B
.
Sc.
in
software
eng
ine
er
ing
from
Te
chnica
l
Co
ll
eg
e
,
Kirkuk,
Ira
q
in
2004
and
M.Sc.
in
Com
pute
r
Engi
ne
eri
n
g
from
Cankaya
Univer
si
t
y
,
Ankara
,
Turk
e
y
i
n
2015.
H
e
publi
shed
his
r
e
sea
rch
in
th
e
fo
ll
owing
ar
ea
s:
d
at
a
s
ec
uri
t
y
,
s
ecurit
y
in
wire
l
es
s
sensor
s
net
work, and
AI
.
Ban
a
z
An
w
er
Qader
is
cur
ren
tly
an
instructor
at
the
Univ
ersity
of
Kirkuk,
Ki
rkuk,
Ira
q
.
She
rec
e
ive
d
a
B.
SC
.
in
Com
pute
r
Sci
enc
e
from
Coll
eg
e
of
Science
,
Kirkuk
,
Ir
a
q
in
2006
and
M.Sc.
in
Com
pute
r
Scie
n
ce
from
Univer
sit
y
of
Anbar,
Anbar,
Ira
q
in
2014.
She
publi
shed
her
r
ese
arc
h
es
in
th
e
foll
owing
areas:
dat
a
m
ini
ng
,
dee
p
l
ea
rning
,
AI,
dat
a
distri
buti
on
.
Evaluation Warning : The document was created with Spire.PDF for Python.