000 05239nam a2201225Ia 4500
000 03066ntm a2200205 i 4500
001 90049
003 0
005 20250920173705.0
008 240221n 000 0 eng d
010 _z
_z
_o
_a
_b
015 _22
_a
016 _2
_2
_a
_z
020 _e
_e
_a
_b
_z
_c
_q
_x
022 _y
_y
_l
_a2
024 _2
_2
_d
_c
_a
_q
028 _a
_a
_b
029 _a
_a
_b
032 _a
_a
_b
035 _a
_a
_b
_z
_c
_q
037 _n
_n
_c
_a
_b
040 _e
_erda
_a
_d
_b
_c
041 _e
_e
_a
_b
_g
_h
_r
043 _a
_a
_b
045 _b
_b
_a
050 _a
_a
_d
_b2
_c0
051 _c
_c
_a
_b
055 _a
_a
_b
060 _a
_a
_b
070 _a
_a
_b
072 _2
_2
_d
_a
_x
082 _a
_a
_d
_b2
_c
084 _2
_2
_a
086 _2
_2
_a
090 _a
_a
_m
_b
_q
092 _f
_f
_a
_b
096 _a
_a
_b
097 _a
_a
_b
100 _e
_e
_aJohn Paul G. Perez, Sean Kevin P. Sigua.
_d
_b4
_u
_c0
_q16
110 _e
_e
_a
_d
_b
_n
_c
_k
111 _a
_a
_d
_b
_n
_c
130 _s
_s
_a
_p
_f
_l
_k
210 _a
_a
_b
222 _a
_a
_b
240 _s
_s
_a
_m
_g
_n
_f
_l
_o
_p
_k
245 0 _a
_aEnhancement of extended vigenere cipher algorithm to increase obscurity and security of local storage data stored in browser in an advice sharing application /
_d
_b
_n
_cJohn Paul G. Perez, Sean Kevin P. Sigua.
_h6
_p
246 _a
_a
_b
_n
_i
_f6
_p
249 _i
_i
_a
250 _6
_6
_a
_b
260 _e
_e
_a
_b
_f
_c
_g
264 _3
_3
_a
_d
_b
_cJune 2022.46
300 _e
_e
_c28 cm.
_a174 pp.
_b
310 _a
_a
_b
321 _a
_a
_b
336 _b
_atext
_2rdacontent
337 _3
_30
_b
_aunmediated
_2rdamedia
338 _3
_30
_b
_avolume
_2rdacarrier
340 _2
_20
_g
_n
344 _2
_2
_a0
_b
347 _2
_2
_a0
362 _a
_a
_b
385 _m
_m
_a2
410 _t
_t
_b
_a
_v
440 _p
_p
_a
_x
_v
490 _a
_a
_x
_v
500 _a
_aUndergraduate Thesis: (Bachelor of Science in Computer Science) Pamantasan ng Lungsod ng Maynila, 2022.
_d
_b
_c56
504 _a
_a
_x
505 _a
_a
_b
_t
_g
_r
506 _a
_a5
510 _a
_a
_x
520 _b
_b
_c
_aThe extended 95x95 Vigenere Cipher Algorithm is a symmetric cryptography algorithm built on the foundations of the Original Vigenere Cipher. The Viginere Cipher Technique is a secure algorithm that encrypts a string of alphabetized text using a succession of interwoven Caesar ciphers. It is classified as a polyalphabetic substitution cipher because it makes use of numerous substitution alphabets. Despite its widespread use, the Vigenere encryption is considered simple, making it extremely easy to crack for outsiders or attackers. To overcome the weakness of the Vigenere cipher used in the previous study, the authors enhanced numerous processes. The existing algorithm did not encrypt special characters or other characters such as emojis. Thus, the authors extended the ASCII table to 190 characters, converting the tabula recta into a 190x190 matrix capable of receiving and encrypting a variety of special characters based on the extended ASCII table. Additionally, due to the additional step provided in the proposed technique, it is effective encrypting characters such as emojis. The algorithm;s vulnerability to attacks such as frequency analysis is due to the repeating nature of the key. To solve this problem, the authors implemented the new key generation process using a a pseudo-random number generator based on XORShift and the Fisher-Yates shuffling algorithm. The results demonstrate that the proposed method, tested through Kasiski attack, frequency analysis, and monobit examination, eliminates the algorithm's key repeating nature, and the generated key may be utilized to encrypt a broader set of characters. The ciphertext has a low index of coincidence (IC) value of 0.11, which similar to a random string and polyalphabetic cipher IV values of 0.038, but not equal to a monoalphabetic cipher with IC values of 0.065. Additionally, the authors proposed a multi-layer cryptographic techniques that included ROT13 with the other proposed methods to further enhance the proposed algorithm. Finally, various use cases demonstrated that the updated algorithm provided increased security by encrypting a more diversified range of characters.
_u
521 _a
_a
_b
533 _e
_e
_a
_d
_b
_n
_c
540 _c
_c
_a5
542 _g
_g
_f
546 _a
_a
_b
583 _5
_5
_k
_c
_a
_b
590 _a
_a
_b
600 _b
_b
_v
_t
_c2
_q
_a
_x0
_z
_d
_y
610 _b
_b
_v
_t2
_x
_a
_k0
_p
_z
_d6
_y
611 _a
_a
_d
_n2
_c0
_v
630 _x
_x
_a
_d
_p20
_v
648 _2
_2
_a
650 _x
_x
_a
_d
_b
_z
_y20
_v
651 _x
_x
_a
_y20
_v
_z
655 _0
_0
_a
_y2
_z
700 _i
_i
_t
_c
_b
_s1
_q
_f
_k40
_p
_d
_e
_a
_l
_n6
710 _b
_b
_t
_c
_e
_f
_k40
_p
_d5
_l
_n6
_a
711 _a
_a
_d
_b
_n
_t
_c
730 _s
_s
_a
_d
_n
_p
_f
_l
_k
740 _e
_e
_a
_d
_b
_n
_c6
753 _c
_c
_a
767 _t
_t
_w
770 _t
_t
_w
_x
773 _a
_a
_d
_g
_m
_t
_b
_v
_i
_p
775 _t
_t
_w
_x
776 _s
_s
_a
_d
_b
_z
_i
_t
_x
_h
_c
_w
780 _x
_x
_a
_g
_t
_w
785 _t
_t
_w
_a
_x
787 _x
_x
_d
_g
_i
_t
_w
800 _a
_a
_d
_l
_f
_t0
_q
_v
810 _a
_a
_b
_f
_t
_q
_v
830 _x
_x
_a
_p
_n
_l0
_v
942 _a
_alcc
_cBK
999 _c25292
_d25292