1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

Key-Amplified Cipher

Ahhyun Ahn1, Ahhyun Ahn2, and Taeseon Yoon2
1.Hankuk Academy of Foreign Studies/International, Seoul, Korea
2.Hankuk Academy of Foreign Studies/Natural Science, Yong-in, Korea
Abstract—The Vigenère encryption is a method that enciphers original text by adding a continuously changing correspondence of keys into plain text by means of one to one correspondence. A simple example would be to match A with 0, B with 1, and so on until Z is matched with 25. The weakness of the Vigenère encryption is that the code can be broken without the key by guessing its length. We attempted to strengthen the Vigenère encryption by multiplying the length of "key groups" so that the length of the final key would be amplified. This study reveals that the security of the Vigenère cipher, once thought to be low, can be supplemented through the use of an effective key.

Index Terms—vigenère cipher, divided keys, ASCII, key length, least common multiple, kasiski, friedman, key-amplified

Cite: Ahhyun Ahn, Dooyoung Kim, and Taeseon Yoon, "Key-Amplified Cipher," Lecture Notes on Information Theory, Vol. 2, No. 1, pp. 54-60, March 2014. doi: 10.12720/lnit.2.1.54-60
Copyright © 2012-2018 Lecture Notes on Information Theory, All Rights Reserved