ENCRYPTION OF TEXTUAL ELEMENTS USING THE VIGENÈRE METHOD

Authors

Gafurov Mirshafi Khamitovichcandidate of technical sciences, associate professor of the Faculty of Digital Technologies, Systems and Information Protection of the Tajik technical university named after аcademician M.S. Osimi, Dushanbe, Republic of Tajikistan, mirugaf56@gmail.com

Abstract

This work presents the development of a novel method for encrypting text objects to enhance information security and provide protection against cybercriminals (crackers, hackers). The proposed approach moves away from the traditional use of single-character (unigram) numbering in the encryption alphabet. Instead, it utilizes numbered linguistic elementssuch as word roots, syllables, bigrams, and trigrams-as the foundation for creating a unique (private) alphabet. The algorithm details the process of decomposing plaintext into these elements, their arbitrary numbering, and the subsequent application of a private key (using the Vigenère cipher as an example). It is demonstrated that the use of unique, multi-component alphabets significantly increases the cryptographic strength of the ciphertext. While the proposed encryption method is universal in its applicability to various languages, its specific implementation and effectiveness are closely dependent on the grammatical and linguistic features of the source language.

Keywords

object, encryption, enciphering, deciphering, private alphabet, element, symbol, key, variant, stability, cybercrime.

References

1. Alferov, A. P., Zubov, A. Yu., Kuzmin, A. S., & Cheremushkin, A. V. (2001). Fundamentals of Cryptography. Moscow: Helios ARV. 479 p.

2. Basalova, G. V. (2009). Fundamentals of Cryptography. Tula: Tula State University Publishing House.

3. Bauer, F. (2007). Deciphered Secrets: Methods and Principles of Cryptology. Moscow: Mir. 550 p.

4. Burnett, S., & Paine, S. (2007). Cryptography: RSA Security’s Official Guide. Moscow: Binom.


5. Gafurov, M. Kh. (2023). Implementation of the operator-matrix method and double key in object substitution. Bulletin of PITTU named after Academician M.S. Osimi, No. 1 (26), pp. 13-19.

6. Gafurov, M. Kh. (2024). Application of matrix and operator-matrix methods for substitution of text objects using bigrams and trigrams. Bulletin of PITTU named after Academician M.S. Osimi, No. 4 (33), pp. 8-22.

7. Gafurov, M. Kh. (2024). Operator application of encryption of language elements with Polybius square. Bulletin of the Technological University of Tajikistan, No. 1 (56), pp. 159-164.

8. Gafurov, M. Kh. (2025). On a method of encrypting text objects using the numbering of its elements. Reports of the National Academy of Sciences of Tajikistan, Vol. 68, No. 7, pp. 655-664.

9. Gafurov, M. Kh., & Giyosov, R. B. (2025). Application of bigrams in the encryption of text objects using Polybius square and a double key. News of the National Academy of Sciences of Tajikistan. Department of Physical, Mathematical, Chemical, Geological, and Technical Sciences, No. 3(200), pp. 59-66.

10. Kosimov, A. A. (2017). Evaluation of the effectiveness of using trigrams in text identification. News of the Academy of Sciences of the Republic of Tajikistan. Department of Physical, Mathematical, Chemical, Geological, and Technical Sciences, No. 1 (166), pp. 51-57.

11. Levin, M. (2005). Cryptography Without Secrets: A User Guide. Moscow: New Publishing House.

12. Mao, W. (2005). Modern Cryptography: Theory and Practice. Moscow: Williams.763 p.

13. Romanets, Yu. V., Timofeev, P. A., & Shangin, V. F. (2001). Information Security in Computer Systems and Networks. Moscow: Radio i Svyaz.

14. Ryabko, B. Ya., & Fionov, A. N. (2005). Cryptographic Methods of Information Security. Moscow: Goryachaya Liniya-Telekom.

15. Schneier, B. (2003). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Moscow: Triumph. 806 p.

16. Schneier, B., & Ferguson, N. (2005). Practical Cryptography. Moscow: Dialektika.

17. Shannon, C. (1963). Communication Theory of Secrecy Systems. In Works on Information Theory and Cybernetics (pp. 333-369). Moscow: IL.

18. Singh, S. (2006). The Code Book: The Secret History of Codes and Codebreaking. Moscow: Ast, Astrel. 447 p.

19. Usmanov, Z. D., & Dovudov, G. M. (2009). On the formation of the prefix base of the Tajik literary language. Reports of the Academy of Sciences of the Republic of Tajikistan, Vol. 52, No. 6, pp. 431-436.

20. Usmanov, Z. D., & Dovudov, G. M. (2015). Morphological Analysis of Tajik Word Forms: Monograph. Dushanbe: “Donish”. 130 p.

21. Usmanov, Z. D., Soliev, O. M., & Dovudov, G. M. (2009). On the set of postfixes of the Tajik literary language. Reports of the Academy of Sciences of the Republic of Tajikistan, Vol. 53, No. 2, pp. 99-103.

22. Yashchenko, V. V. (2000). Introduction to Cryptography. Moscow: MCCME: “CheRo”.

23. Zubov, A. Yu. (2005). Cryptographic Methods of Information Security: Perfect Ciphers. Moscow: Helios ARV.


Publish date

2026-04-03