A Robust Encryption Technique Using Enhanced Vigenre Cipher

Document Type : Research Paper


1 Computer Science Department, College of Science, University of Diyala, Diyala, Iraq

2 Supervision and Scientific Education Apparatus, International Accreditation Department, Ministry of Higher Education, Iraq


A lot of data in this world are very important and no matter how simple it can be. Hence the number of data conveyed through the internet still increasing due to the rapid development of computer technology. In order to save the data over the internet, cryptography is a technique for conveying information securely between two parties without interference from outside elements. The Vigenre cipher is a technique of encrypting alphabetic text via using a sequence of different Caesar ciphers depend on the letters of a keyword. It is a simple form of polyalphabetic replacement. In this paper, the traditional way for the Vigenre method is enhanced by using two keys for text encryption. The first key is used to format the table of the alphabet (26 characters) and second keys are used to encrypt the plain text like the original Vigenre cipher. The result shows the proposed method is efficient and stronger against the kasiski and Friedman attack to find the length of the key.


[1] A. Amin and U. Rasheed, An enhanced Vigen`ere cipher for data security, Int. J. Sci. Tech. Rese. 5(03) (2016).
[2] A. Bruen and M. Forcinito, Cryptography, Information Theory, and Error-Correction: a Handbook for the 21st Century, John Wiley & Sons, 2011.
[3] B. Forouzan, Cryptography and network security, McGraw-Hill, Inc, 2007.
[4] Y. Gerhana, E. Insanudin, U. Syarifudin and M. Zulmi, Design of digital image application using Vigen`ere cipher algorithm, In 2016 4th International Conference on Cyber and IT Service Management. IEEE. (2016) 1–5.
[5] Q. Kester, A cryptosystem based on Vigen`ere cipher with varying key, Int. J. Ad. Res. Comput. Engin. Tech. 1(10) (2012) 108–113.
[6] K. Martin, Everyday cryptography, The Australian Mathematical Society, 231(6) ((2012.
[7] S. Nasution, L. Ginting, M. Syahrizal and R. Rahim, Data security using Vigen`ere cipher and Goldbach codes algorithm, Int. J. Eng. Res. Technol, 6(1) (2017) 360–363.
[8] A. Saraswat, C. Khatri, P. Thakral and P. Biswas, An extended hybridization of Vigen`ere and Caesar cipher techniques for secure communication, Procedia Computer Sci. 92 (2016) 355–360.
[9] K. Senthil, K. Prasanthi and R. Rajaram, A modern avatar of Julius Ceasar and Vigen`ere cipher, IEEE International Conference on Computational Intelligence and Computing Research (2013) 1–3.
[10] A. Soofi, I. Riaz and U. Rasheed, An enhanced Vigen`ere cipher for data security, Int. J. Sci. Technol. Res, 5(3) (2016) 141–145.
[11] Z. Wang, S. Zhang, H. Liu and Y. Qin, Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code, Optics Comm. 332 (2014) 36–41.
[12] R. Wobst, Cryptology unlocked, John Wiley & Sons.
Volume 12, Issue 2
November 2021
Pages 447-454
  • Receive Date: 05 March 2021
  • Revise Date: 02 April 2021
  • Accept Date: 29 April 2021