0% found this document useful (0 votes)
54 views5 pages

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm With Keystream Generator Modification

This paper proposes modifications to the Vigenere cipher classic cryptography algorithm and implements a three-pass protocol. The paper modifies the Vigenere cipher to generate unique keys when the key length is shorter than the plaintext, addressing a weakness. It also applies a three-pass protocol which allows encryption and decryption with different keys without needing to distribute the key.

Uploaded by

Jp Xtyrael
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views5 pages

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm With Keystream Generator Modification

This paper proposes modifications to the Vigenere cipher classic cryptography algorithm and implements a three-pass protocol. The paper modifies the Vigenere cipher to generate unique keys when the key length is shorter than the plaintext, addressing a weakness. It also applies a three-pass protocol which allows encryption and decryption with different keys without needing to distribute the key.

Uploaded by

Jp Xtyrael
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Advances in Science, Technology and Engineering Systems Journal Vol. 2, No.

5, 1-5 (2017)
ASTESJ
www.astesj.com
ISSN: 2415-6698
2nd International Conference of Computer, Environment, Social Science, Health Science,
Agriculture & Technology (ICEST) 2017 5-7 May 2017, Medan, Indonesia

Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with


Keystream Generator Modification

Amin Subandi*,1, Rini Meiyanti1, Cut Lika Mestika Sandy1, Rahmat Widia Sembiring2
1
Faculty of Computer and Information Technology, “ Universitas Sumatera Utara”, Medan, 20155, Indonesia,
2
Politeknik Negeri Medan, Medan, 20155, Indonesia,
Emails: [email protected], [email protected], [email protected], [email protected]

ARTICLE INFO ABSTRACT


Article history: Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric
Received: 15 March, 2017 key cryptography algorithm, where to encryption and decryption process use the same key.
Accepted: 20 April, 2017 Vigenere Cipher has the disadvantage that if key length is not equal to the length of the
Online: 12 June, 2017
plaintext, then the key will be repeated until equal to the plaintext length, it course allows
Keywords: cryptanalysts to make the process of cryptanalysis. And weaknesses of the symmetric key
Three-Pass Protocol cryptographic algorithm is the safety of key distribution factor, if the key is known by others,
Classic Cryptography Algorithm, then the function of cryptography itself become useless. Based on two such weaknesses, in
Vigenere Cipher
this study, we modify the key on Vigenere Cipher, so when the key length smaller than the
length of plaintext entered, the key will be generated by a process, so the next key character
will be different from the previous key character. In This study also applied the technique
of Three-pass protocol, a technique which message sender does not need to send the key,
because each using its own key for the message encryption and decryption process, so the
security of a message would be more difficult to solved.

1. Introduction Vigenere Cipher is a classic cryptographic algorithm, classical


A security issue is one of the most important aspects of an cryptography is generally included into the symmetric key
information system. A message that contains important algorithm, where to do the encryption and decryption process use
information can be misused by irresponsible people, therefore a the same key. In this case, key security and key distribution
message contains important information, in order to secure an become the main factor, when the key and the ciphertext is known,
important message it is necessary a technique to secure it, then, of course, plaintext will be known also. This is one of the
cryptography is the science and art to maintain the security of a drawbacks of symmetric key algorithms.
message [11].
The development of cryptography itself has already begun a
long time ago, there are two types of cryptography, classical and
modern cryptography, classical cryptography works based on Plaintext Ciphertext Plaintext
character mode, and modern cryptography works based on bit
mode. And if viewed from the key, cryptographic algorithm using Encryption Decryption
symmetric and asymmetric key do not revise any of the current
designations.
Key < - Same Key -> Key
*
Corresponding Author: Amin Subandi, Faculty of Computer and Information
Technology, Universitas Sumatera Utara, Medan, 20155, Indonesia
Email: [email protected] Figure 1: Symmetric key algorithm scheme
www.astesj.com 1
A. Subandi et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 1-5 (2017)
classic problem of the symmetric key algorithm which should
send a key to the recipient. A message sender only needs to send
Plaintext Ciphertext Plaintext a message to the recipient, and the important one (the key) does
not need to distribute.
Encryption Decryption
Here is a schematic representation Three-Pass protocol:
Key Different Keys Key
Sender Receiver

Figure 2: Asymmetric key algorithm scheme 1


Plaintext Ciphertext
Vigenere Cipher itself also has drawbacks which have been
Encryption Encryption
solved by a kasiski method, The drawback is if the key length is With Key(b)
With Key(a)
not the equal to the length of plaintext, then the key will be 2
Ciphertext Ciphertext
repeated continuously until the same as the plaintext length, it can
cause the occurrence of what is called the histogram, which is the
same ciphertext or repetitive content, kasiski method collect all
the repeated histogram to calculated the distance between the 3
Ciphertext Ciphertext
histogram to find the length of the initial key.
Decryption Decryption
With the existence of these flaws, we interested to try and With Key(a) With Key(b)

examine how to minimize weaknesses. And we try to modify Ciphertext Plaintext


Vigenere Cipher algorithm with the Key Stream Generator
method, which if key length is not the same length of the plaintext,
then the next key will be generated by a process, this will cause Figure 3: Three-Pass Protocol Process Scheme
key to getting the same length as the plaintext length becomes
2.2. Vigenere Cipher
unrepetitive and it is expected to thus it would be more difficult
to solve by kasiski method. Vigenere Cipher is one of the classic cryptographic algorithms
that included into the category of polyalphabetic substitution [3]
Furthermore, this paper also will apply what the so-called
and a symmetric key cryptographic algorithm, whereby for
Three-Pass protocol, a method for securing messages without
encryption and decryption process used same keys. In the process
having to distribute keys, because neither the sender nor the
of encryption and decryption, Vigenere Cipher using a table called
recipient can use owned key each to encryption and decryption
tabula recta [11], it is a 26 x 26 matrix containing alphabet letters.
process. It is expected also that by applying the layered method
(Vigenere Cipher key modification and use Three-Pass protocol This Algorithm was discovered by Blaise de Vigenere of France
methods), can increase the security level of classical cryptography in the century to sixteen, in 1586 and this algorithm cannot be
algorithms Vigenere Cipher. solved until 1917 [3] [11] Friedman and Kasiski solved it [3].
- - PLAINTEXT - -
2. Theories A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
2.1. Three-Pass Protocol
C C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
The Three-Pass protocol is a framework that allows a party E E F G H I J K L M N O P Q R S T U V W X Y Z A B C D

may send a message encrypted securely to the other party without F F G H I J K L M N O P Q R S T U V W X Y Z A B C D E


G G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
having provided the key [2], this is possible because between the H H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
sender and receiver using a key belonging to the respective to I I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
perform the encryption and decryption process. Called the K K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
K
Three-pass protocol as do three exchange time before a message L L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
E M M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
decrypted into meaningful messages. Three-Pass protocol N N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
Y
invented by Adi Shamer about 1980 [2]. in applying Three-Pass O O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
protocol does not always have to use a cryptographic algorithm, Q Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
because basically, this technique has its own function, namely to R R S T U V W X Y Z A B C D E F G H I J K L M N O P Q
S S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
use the function exclusive-OR (XOR) [1], but in practice, to T T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
improve the reliability of this technique combined with U U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
cryptographic algorithms.
W W X Y Z A B C D E F G H I J K L M N O P Q R S T U V

The implementation of this technique is still less attention [1],


Figure 4: Vigenere Cipher table
In the previous study, This technique can be a solution to the
www.astesj.com 2
A. Subandi et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 1-5 (2017)
Mathematically, the process of encryption and decryption
Vigenere Cipher can be seen in the following equation:
Internal State
Ci = E ( Pi + Ki ) mod 26 (1)

Pi = D ( Ci – Ki ) mod 26 (2)
U
Which C is the ciphertext, P is the plaintext, K is the Key, E is Next-State Function

Encryption than D is Decryption. For the encryption process,


every plaintext alphabet combined with the alphabet keys, the
alphabet which intersected (by table) between the plaintext and
Output Function
ciphertext is the alphabet ciphertext. If the key alphabet is smaller
than the plaintext, then the key will be repeated until equal to the
length of the plaintext. Keystream Ki
For example, supposing that the plaintext "THIS IS MY Figure 5: Key Stream Generator Process
PAPER" with the keyword "UP", then, based on the table square
vigenere, illustrations encryption can be seen as follows: 3. Methodology
Plaintext : THIS IS MY PAPER In this paper, it will be implemented how to implement
Keyword : UPUP UP UP UPUPU cryptographic algorithms classic Vigenere Cipher by the key
Ciphertext : NWCH CH GN JPJTL modification and how it is applied in the Three-pass protocol that
the sender and the receiver do not have to exchange keys.
For the decryption process, with vigenere cipher table and
used the same key, then the resulting plaintext from the ciphertext Start A
comparison with the keys, the alphabet corresponding to the key
and the ciphertext, then the alphabet is the plaintexts. Plaintext
Decryption1
Ciphertext : NWCH CH GN JPJTL
Keyword : UPUP UP UP UPUPU Encryption1
Ciphertext3
Plaintext : THIS IS MY PAPER
The drawback of Algorithm Vigenere Cipher is if the key Ciphertext1
Decryption2
length is smaller than the plaintext length, then the key will be
repeated, because it most likely will produce the same ciphertext Encryption2
as long as the same plaintext, in the example above, the character Plaintext

"IS" in the encryption into ciphertext the same as "CH" , this can Ciphertext2
be exploited by cryptanalysts to break off the ciphertext. Kasiski Stop

method is a method of cryptanalysis that broke Vigenere Cipher A


algorithms, methods kasiski collect the same characters of
ciphertext to calculate the distance to ultimately find a number of
the key length. After a long key is found, the next step is Figure 6: Flowchart of Three-Pass Protocol scheme
determining what the keywords to use exhaustive key search [11]. The key modification of Vigenere Cipher in this study, we use
the key stream generator, the key will be generated when the key
2.3. Keystream Generator length is not equal to the length of the plaintext, when the key
length equal to the length of the plaintext, the key generating
KeyStream Generator is a process for generating the key by process is not necessary.
using a function, so that be randomly generated the key. With the
random key, it will further increase the reliability of a In generating the keys, we use the following equation:
cryptographic algorithm because it would be difficult to solve. Ki = (Ki-1 + n) mod 26 (3)
The function used may be any function by use of bait as an where Ki is a character key that will be generated, Ki-1 is the index
input that is not the same for each process, so it will produce of the previous key character and n is the length of the keys to the
Ki-1.
different output depending on that input.
Alphabet in the alphabet A to Z can be described as an index
Process keystream generator receives the initial fill of U (as a of a row of numbers from 0 to 25 with 0 = A and 25 = Z, an
user key), and then processed to generate keys Ki, the next insert illustration of the process of generating the key is illustrated as
is from the previous process, and so on until the process reached follows: suppose the length of plaintext is 10, and the length of
Kn. the is key 6, suppose the key text "MYCODE", when the standard
www.astesj.com 3
A. Subandi et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 1-5 (2017)
key Vigenere Cipher, key will be "MYCODEMYCO", then by assumed as a key owned by the sender "KEY" and keys owned by
using the above functions, the whole key generate to the recipient "BUNG".
"MYCODEKRZI", where "K" is generated from the summation
First, the sender will encrypt the plaintext with his own key
of index "E"= 4 plus the length of the key of "M" to "E"= 6 equals
and produce the first ciphertext, then the first ciphertext sent to
10 then in modulo with 26 generating a character to 10 ="K", and
the recipient, the recipient encrypts back the first ciphertext with
so on.
his own key and produce the second ciphertext, and then the
For encryption and decryption is then performed as usual. second ciphertext is sent back by the recipient to the sender, then
Flowchart for encryption and decryption process vigenere cipher sender decrypt the second ciphertext and generates the third
can be seen as follows: ciphertext, the third ciphertext is sent back to the recipient to
decrypt into plaintext.
Start For the illustrations can be seen as follows:
First Encryption by Sender:
Plaintext P Plaintext : THE FAMILY AND THE FAV
Sender Key : KEY BFKQXF OYJ VIW LBS
First Ciphertext : DLC GFWYID OLM OPA QBN
Key K
Second Encryption by Recipient:
First Ciphertext : DLC GFWYID OLM OPA QBN
Recipient Key : BUN GKPVCK TDO ANB QGX
Y Second Ciphertext : EFP MPLTKN HOA OCB GHK
len (K) = Encryption
len (P) ?
First Decryption by Sender:
N Second Ciphertext : EFP MPLTKN HOA OCB GHK
Ciphertext Sender Key : KEY BFKQXF OYJ VIW LBS
Generate Key Third Ciphertext : UBR LKBDNI TQR TUF VGS
Ki
Stop Second Decryption by Recipient:
Third Ciphertext : UBR LKBDNI TQR TUF VGS
Recipient Key : BUN GKPVCK TDO ANB QGX
Figure 7: Vigenere Cipher Encryption Process Plaintext : THE FAMILY AND THE FAV
In the above process, we can see that there have been three
Start exchanges between the sender and the recipient, the first exchange
is the sender sends the first ciphertext, the second exchange is the
recipient sends back the second ciphertext to the sender, the last
Ciphertext C exchange is the sender sends the third ciphertext, and finally the
recipient decrypts the message to be plaintext.
For comparison, let's see how if the message decrypted by
Key K
standard Vigenere cipher algorithm method. Where the sender
sends the key to the recipient for decrypt the ciphertext
simultaneously through different paths and assuming that the key
Y delivered safely.
len (K) = Decryption
len (C) ?
Encryption by Sender:
N Plaintext : THE FAMILY AND THE FAV
Plaintext Key : KEY KEYKEY KEY KEY KEY
Generate Key Ciphertext : DLC PEKSPW KRB DLC PET
Ki
Stop Decryption by Recipient:
Ciphertext : DLC PEKSPW KRB DLC PET
Key : KEY KEYKEY KEY KEY KEY
Figure 8: Vigenere Cipher Decryption processed Plaintext : THE FAMILY AND THE FAV

In this paper, to prove each process, we use python, we made For encryption process using the key that has been modified,
it to both encryption and decryption process in plaintext manual it appears that the ciphertext generated more random, the word
input or plaintext taken from a file with .txt extension. "THE" produce different cipher word, it will be different if we
decrypt without key modification, the word "THE" will be
4. Testings And Implementations decrypted the same word "DLC", then "FA" equal to "PE", this
As a test, we will do the encryption and decryption of a will be loopholes for cryptanalyst to make the cryptanalysis
message with a cryptographic algorithm classic Vigenere Cipher process using kasiski methods. By modifying the key, kasiski
that reads "THE FAMILY AND THE FAV" uses two keys are method will be more difficult to do, moreover, the key also has to
www.astesj.com 4
A. Subandi et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 1-5 (2017)
distributed, this, of course, requires us to ensure that the
distribution of the key should be completely safe. But when we
applying the method of Three-Pass protocol, the key does not
need to be distributed.
5. Conclusions

From the research, it seemed that by modifying keys, classical


algorithm Vigenere Cipher actually has better reliability
compared with standard Vigenere Cipher, this is due to the
modification of the keys that are generated from a process that is
done, so that when the key length is not equal to the length of the
plaintext, then the key will not be repeated, but will be generated
by a function, this has resulted in a more random keys rather than
having to repeat the key as in the standard Vigenere Cipher
algorithm.
And Vigenere Cipher can also be applied to the method of
Three-Pass protocol, so although Vigenere Cipher included into
the algorithm symmetric key, the sender of the message does not
have to send the key used to encrypt the message, because each
can use its own key both to encrypt and decrypt, of course, this is
very useful when the key distribution security more vulnerable to
tapping, and moreover, if the distribution of key is secure, the
message sent does not have to be encrypted, isn’t it ?.
In this study, we simply apply safeguards messages using the
standard alphabet consists of 26 characters, for further research,
may be applied to a more complex character.
References
[1] Robbi Rahim, Ali Ikhwan, “Study of Three Pass Protocol on data Security”
International Journal of Science and Research (IJRS) 5 (11), November
2016.
[2] Boni Oktaviana, Andysah Putera Utama Siahaan, “Three-Pass Protocol
Implementation in Caesar Cipher Classic Cryptography” IOSR Journal of
Computer Engineering (IOSR-JCE) 18(4) III (Jul-Aug, 2016): 26-29.
[3] Al-Amin Mohammed Aliyu, Abdulrahman Olaniyan “Vigenere Cipher:
Trends, Review and Possible Modifications” International Journal of
Computer Applications (0975-8887) 135(11), February 2016.
[4] Saloni Garg, Sonam Khera, Archana Aggarwal, “Extended Vigenere Cipher
with Stream Cipher” International Journal of Engineering Science and
Computing (IJESC) 6 (5), May 2016.
[5] Nimai Agarwal, Poonam Choudhari, Manivannan S S, “A Cryptosystem
based on Vigenere Cipher with Enhanced Key Mechanism for data Security
a Crypto System Based on Vigenere Cipher to Enhance Data Security”,
International Journal of Pharmacy & Technology 8 (4), Dec 2016.
[6] Andysah Putera Utama Siahaan “Three-Pass Protocol Concept in Hill Cipher
Encryption Technique”, Seminar Nasional Aplikasi Teknologi Informasi
(SNATi), Yogyakarta, 6 Agustus 2016.
[7] Hendro Eko Prabowo, Arimaz, “Hangga Method of Vigenere Cipher Double
Columnar Transposition as Modified Cryptographic Technique in Key
Establishment ", National Seminar of the 6th SNST of 2015.
[8] Syaiful Anwar, Indra Nugroho, Asep Ahmadi "Cryptography
Implementation With Shift Vigenere Cipher Encryption And Checksum
Using CRC32 on Text", Journal of Information Systems 2, 2015.
[9] Benni Purnama, "Securing a Secret Message Through Vigenere Cipher
Cryptography with a Layered Key", Journal of Media Processor 9 (3),
October 2014.
[10] Imam Saputra, Mesran, Nelly Astuti Hasibuan, Robbi Rahim, “Vigenere
Cipher Algorithm with Grayscale Image Key Generator for Secure Text
File” International Journal of Engineering Research & Technology (IJERT)
6 (01), January 2017.
[11] Dony Ariyus "Introduction to Cryptography, Theory, Analysis and
Implementation", Andi Publisher, Yogyakarta, 2008.
[12] Saifuldun Mostafa, Hayder Saad, Mustafa Musa Jaber, Mohammed Hasan
Ali, Karam Dhafer: The Design Trends of Keystream Generator For Stream
Cipher For High Immunity Attacks”, Researchgate, January 2016.
www.astesj.com 5

You might also like