A CIPHER MODEL FOR TEXT AND IMAGE DATA USING VIGENÈRE WITH ADVANCED ENCRYPTION STANDARD (AES)

ERONDU, UDOCHUKWU IHEANACHO (2022) A CIPHER MODEL FOR TEXT AND IMAGE DATA USING VIGENÈRE WITH ADVANCED ENCRYPTION STANDARD (AES). Masters thesis, Landmark University, Omu Aran, Kwara State.

[img] Text
ERONDU, A CIPHER MODEL FOR TEXT AND IMAGE DATA USING VIGENÈRE WITH ADVANCED ENCRYPTION STANDARD_V2.docx

Download (2MB)

Abstract

In recent times, data exchange and transfer have increased in exponential dimensions, thus making the task of securing information and information infrastructure a critical one. Cryptography has been used extensively as to a viable technique for securing information assets and infrastructure. Cryptography protects data and communications channels to ensure that only the intended audience may access, read, and process it. Cryptosystems deploy mathematical models and computational transpositions to change plain messages to unintelligible ones known as ciphers. The Vigenère cipher is a widely used cryptographic method for encrypting and decrypting messages. The recurring nature of the Vigenère cipher's key is its biggest drawback. The ciphertext can be viewed as a series of interconnected Caesar ciphers, each of which is straightforward to decipher if a cryptanalyst accurately predicts the length of the key. The primary goal of this research is to improve upon existing encryption and decryption methods by combining a variant of the Vigenère cipher and the Advanced Encryption Standard (AES) algorithm to create a system with increased attack resistance. In this research, a Vigenère cipher variant using AES to protect data from cryptanalysis and pattern prediction was developed. The created model was put through its paces on both text and image datasets, with testing done with an eye toward both speed and memory consumption. When compared to previous methods, the improved Vigenère-AES fared better in terms of encryption/decryption time, computational resources utilized, and key generation methodologies. The model can be used to protect sensitive data from hackers.

Item Type: Thesis (Masters)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
Depositing User: Mr DIGITAL CONTENT CREATOR LMU
Date Deposited: 26 Mar 2025 15:48
Last Modified: 26 Mar 2025 15:48
URI: https://eprints.lmu.edu.ng/id/eprint/5632

Actions (login required)

View Item View Item