{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T12:44:42Z","timestamp":1743425082535},"reference-count":18,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T00:00:00Z","timestamp":1615766400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"DOI":"10.1007\/s11277-021-08295-5","type":"journal-article","created":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T10:03:26Z","timestamp":1615802606000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Encryption Approach Based on Vigen\u00e8re Cipher for Secure Data Communication"],"prefix":"10.1007","author":[{"given":"N.","family":"Uniyal","sequence":"first","affiliation":[]},{"given":"G.","family":"Dobhal","sequence":"additional","affiliation":[]},{"given":"A.","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"A.","family":"Sikander","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,15]]},"reference":[{"issue":"4","key":"8295_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C. E. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4), 656\u2013715.","journal-title":"Bell Systems Technical Journal"},{"issue":"3B","key":"8295_CR2","first-page":"140","volume":"6","author":"PI Wilson","year":"2006","unstructured":"Wilson, P. I., & Garcia, M. (2006). A Modified Version of the Vigen\u00e8re Algorithm. IJCSNS International Journal of Computer Science and Network Security, 6(3B), 140\u2013143.","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"8295_CR3","unstructured":"Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal 27, 379\u2013423, 623\u2013656 (Reprinted in C.E. Shannon and W. Weaver The Mathematical Theory of Communication; University Illinois Press: Champaign, IL, USA, 1949)."},{"key":"8295_CR4","first-page":"12","volume-title":"The Mathematical Theory of Communication","author":"CE Shannon","year":"2009","unstructured":"Shannon, C. E., & Warren, W. (2009). The Mathematical Theory of Communication (pp. 12\u201329). University of Illinois Press."},{"issue":"10","key":"8295_CR5","first-page":"108","volume":"1","author":"QA Kester","year":"2012","unstructured":"Kester, Q. A. (2012). A cryptosystem based on Vigen\u00e8re cipher with varying key. International Journal of Advanced Research in Computer Engineering and Technology, 1(10), 108\u2013113.","journal-title":"International Journal of Advanced Research in Computer Engineering and Technology"},{"issue":"3","key":"8295_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.5121\/acij.2012.3311","volume":"3","author":"M Khalid","year":"2012","unstructured":"Khalid, M., Wadhwa, N., & Malhotra, V. (2012). Alpha-qwerty cipher. International Journal of Advanced Computing, 3(3), 107\u2013118.","journal-title":"International Journal of Advanced Computing"},{"issue":"1","key":"8295_CR7","first-page":"141","volume":"3","author":"QA Kester","year":"2013","unstructured":"Kester, Q. A. (2013). A hybrid cryptosystem based on Vigen\u00e8re cipher and columnar transposition cipher. International Journal of Advanced Technology and Engineering Research, 3(1), 141\u2013147.","journal-title":"International Journal of Advanced Technology and Engineering Research"},{"issue":"5","key":"8295_CR8","first-page":"34","volume":"5","author":"OE Omolara","year":"2014","unstructured":"Omolara, O. E., Oludare, A. I., & Abdulahi, S. E. (2014). Developing a modified hybrid caesar cipher and vigenere cipher for secure data communication. International Journal of Computer Engineering and Intelligent Systems, 5(5), 34\u201346.","journal-title":"International Journal of Computer Engineering and Intelligent Systems"},{"issue":"1","key":"8295_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/17486-7998","volume":"100","author":"FMS Ali","year":"2014","unstructured":"Ali, F. M. S., & Sarhan, F. H. (2014). Enhancing security of vigenere cipher by stream cipher. International Journal of Computer Applications, 100(1), 1\u20134.","journal-title":"International Journal of Computer Applications"},{"issue":"5","key":"8295_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.25046\/aj020501","volume":"2","author":"A Subandi","year":"2017","unstructured":"Subandi, A., Mieyanti, R., Sandy, C. L. M., & Sembiring, R. W. (2017). Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification. Advances in Science, Technology and Engineering Systems Journal, 2(5), 1\u20135.","journal-title":"Advances in Science, Technology and Engineering Systems Journal"},{"key":"8295_CR11","unstructured":"Singh, G. (2014). Modified vigenere encryption algorithm and its hybrid implementation with base64 and AES. In IEEE Journal."},{"key":"8295_CR12","doi-asserted-by":"crossref","unstructured":"Song, Y., Zhu, Z., Zhang, W., Yu, H., & Zhao, Y. (2019). Efficient and secure image encryption algorithm using a novel key-substitution architecture. In IEEE Journal.","DOI":"10.1109\/ACCESS.2019.2923018"},{"key":"8295_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-540-85538-5_4","volume-title":"Pairing 2008. LNCS","author":"T Okamoto","year":"2008","unstructured":"Okamoto, T., & Takashima, K. (2008). Homomorphic encryption and signatures from vector decomposition. In S. D. Galbraith & K. G. Paterson (Eds.), Pairing 2008. LNCS (Vol. 5209, pp. 57\u201374). Springer."},{"issue":"2","key":"8295_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson, N. F. (1998). Exploring steganography: Seeing the unseen. IEEE Transaction on Computer, 31(2), 26\u201334.","journal-title":"IEEE Transaction on Computer"},{"key":"8295_CR15","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.procs.2015.07.552","volume":"59","author":"P Benni","year":"2015","unstructured":"Benni, P., & Hetty Rohayani, A. H. (2015). A new modified Caesar cipher cryptography method with legible ciphertext from a message to be encrypted. Procedia Computer Science, 59, 195\u2013204.","journal-title":"Procedia Computer Science"},{"issue":"5","key":"8295_CR16","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.35940\/ijrte.E6326.018520","volume":"8","author":"N Uniyal","year":"2020","unstructured":"Uniyal, N., Dobhal, G., & Semwal, P. (2020). Enhanced security of encrypted text by KDMT: Key-domain maximization technique. IJRTE, 8(5), 1385\u20131388.","journal-title":"IJRTE"},{"key":"8295_CR17","doi-asserted-by":"crossref","unstructured":"Othman, A. A. (2013). Binary LU encryption. In IEEE Journal.","DOI":"10.1109\/ICCEEE.2013.6633931"},{"issue":"7","key":"8295_CR18","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.1175\/1520-0442(1997)010<1762:OTUOTS>2.0.CO;2","volume":"10","author":"Q Hu","year":"1997","unstructured":"Hu, Q. (1997). On the uniqueness of the Singular value decomposition in meteorological applications. Journal of Climate, 10(7), 1762\u20131766.","journal-title":"Journal of Climate"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08295-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-021-08295-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08295-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,15]],"date-time":"2021-03-15T11:28:32Z","timestamp":1615807712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-021-08295-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,15]]},"references-count":18,"alternative-id":["8295"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08295-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,15]]},"assertion":[{"value":"11 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}