Jason P. Sermeno*, Kenrick Agustin S. Secugal, Nelly E. Mistio

College of Computer Studies, University of Antique, Antique, Philippines


 

Download Citation: |
Download PDF


ABSTRACT


Security is a practice of defending our computers, servers, networks, mobile devices, electronic systems, and digital information against accidental and malicious attacks in the field of Information Technology. One way to protect such valuable information is to use cryptography. Cryptography or encryption algorithm is the process of transforming sensitive data into confounding data in such a way that the person or the machine with a key can decode the hidden information. In this article, a hybrid approach of the Vigenere cryptosystem was used in encrypting and decrypting the data. This approach will be integrated with the learning management system using matrix manipulation and the Base94 encoding scheme. The experimental result of the study shows a significant high avalanche effect compared to the original Vigenere cryptosystem.


Keywords: Vigenere cryptosystem, Encryption algorithm, Table manipulation, Symmetric-key algorithm, Security cryptography.


Share this article with your colleagues

 


REFERENCES


  1. Aakash, Soni, J.K., Sharma, B. 2017. A.J. Cipher. 2017 2nd International Conference on Telecommunication and Networks (TEL-NET), Noida, 1–6, doi: 10.1109/TEL-NET.2017.8343547.

  2. Danuputuri, C., Mantoro, T., Hardjianto, M. 2015. Data security using LSB steganography and vigenere cipher in an adroid environment. 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), Jakarta, Indonesia, 22–27, doi: 10.1109/CyberSec.2015.14.

  3. Fahrianto, F., Masruroh, S.U., Ando, N.Z. 2014. Encrypted SMS application on android with combination of caesar cipher and vigenere algorithm.  2014 International Conference on Cyber and IT Service Management (CITSM), November 3–6, 2014, South Tangerang, Indonesia, 31–33, doi: 10.1109/CITSM.2014.7042170.

  4. Gerhana, Y.A., Insanudin, E., Syarifudin, U., Zulmi, M.R. 2016. Design of digital image application using vigenere cipher algorithm. 2016 4th International Conference on Cyber and IT Service Management, Bandung, Indonesia, 1–5, doi: 10.1109/CITSM.2016.7577571.

  5. Hossain, M.S., Islam, M.T. 2018. An extension of vigenere technique to enhance the security of communication. 2018 International Conference on Innovations in Science, Engineering and Technology (ICISET), Chittagong, Bangladesh, 79–85, doi: 10.1109/ICISET.2018.8745638.

  6. Sermeno, J., Secugal, K.A., Mistio, N. 2020. Modified vigenere cryptosystem using matrix manipulation and base94 encoding scheme. 2020 International Conference on Innovative Technology Convergence (ICITC 2020). Journal of Innovative Technology Convergence, 2, ISSN No. 2704–4440.

  7. Thorsteinson, P., Ganesh, G.G., 2003. NET security and cryptography (First Edition). USA, Prentice Hall, ISBN: 013100851X.

  8. Touil, H., Akkad, N.E., Satori, K. 2020. Text encryption: Hybrid cryptographic method using vigenere and hill ciphers. 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, 1–6, doi: 1109/ISCV49265.2020.9204095.

  9. Trappe, W., Washington, L.C. 2006. Introduction to cryptographic with coding theory (2nd edition). Prentice Hall.

  10. Triandi, B., Ekadiansyah, E., Puspasari, R., Iwan, L.T., Rahmad, F. 2018. Improve security algorithm cryptography vigenere cipher using chaos functions. 2018 6th International Conference on Cyber and IT Service Management (CITSM), Parapat, Indonesia, 1–5, doi: 10.1109/CITSM.2018.8674376.


ARTICLE INFORMATION


Received: 2021-02-01
Revised: 2021-03-29
Accepted: 2021-04-09
Available Online: 2021-06-21


Cite this article:

Sermeno, J.P., Secugal, K.A.S., Mistio, N.E. 2021. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system. International Journal of Applied Science and Engineering, 18, 2021038. https://doi.org/10.6703/IJASE.202106_18(4).003

  Copyright The Author(s). This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are cited.