Main Article Content
Abstract
The Vigenère cipher is a polyalphabetic encryption method that follows specific patterns and can be adapted for the Dari alphabet. Due to its simplicity and effectiveness in text encryption, it has gained significant attention. This study applies the Vigenère cipher to Dari text by utilizing a modified Vigenère square table for encryption and decryption. Encrypted sentences are systematically converted back to their original form using a text-based key, with the process demonstrated through structured tables. The primary objective of this analytical and comparative research is to assess the feasibility and effectiveness of applying this method to Dari text encryption. Given its unique characteristics, the Vigenère cipher serves as a viable approach for enhancing information security. The findings indicate that implementing this method can significantly improve the security of files, online communications, and electronic authentication.
Keywords
Article Details
Copyright (c) 2024 Reserved for Kabul University

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
- تورج، ا. (۱۴۰۰). اصول و مفاهیم رمزنگاری. انتشارات نشر بید.
- حیدری، م ، خ. (۱۳۹۹). نظریه تطابق. مطبعه پوهنتون کابل، افغانستان.
- کریمی، س،س. (۱۴۰۰). آموزش اصول و مفاهیم تست نفوذ. انتشارات سها. تهران.
- یوسفی راد، ا. فروزان، ب. شکری، م. (1398(. رمزنگاری، موسسه فرهنگی هنری دیباگران تهران.
- Beutelspacher, A., & Schwenk. (2001). Moderne Verfahren der Kryptographie. Vieweg, Braunschweig. ISBN: 3704016632.
- Brassard, G. (1988). Modern Cryptology. Lecture Notes in Computer Science. Springer-Verlag, Berlin. ISBN: 10- 0387968423.
- Broemeling, L. D. (2011). An Account of Early Statistical Inference in Arab Cryptology. 2297-0584The American Statistician,65(4).
- Bruen, A. A., & Forcinito, M.A. (2004). CRYPTOLOGY INFORMATION THEORY AND ERROR CORRECTION: A Handbook for the 21 st Century, John Wiley & Sons Inc, New Jersey. ISBN 0-471-65317-9.
- Delfs, H, & Knebl, H. (2015). Principles and Applications (Information Security and Cryptography) 3rd ed. ISBN-10 3662479737.
- Shparlinski, I. (2003). Cryptographic Applications of Analytic Number Theory. Birkhäuser-Verlag, Basel. ISBN: 2297-0584.
- Talbot, J., & Welsh, D. (2005). Complexity and Cryptography. Cambridge University Press. ISBN-13 978-0-511-14070-9.
- Katz, J. (2015). Introduction to Modern Cryptography. Taylor & Francis Gtoup. ISBN-13: 978-1-4665-7027-6.
- Lennon, B. (2018). Philology, Security, Authentication. Harvard University Press, Cambridge. DOI:10.1086/712124 .
- Naser, S. M. (2021). CRYPTOGRAPHY. Department of Mathematics, Bangladesh University of Engineering and Technology, International Journal of Mathematics and Statistics Studies. https://papers.ssrn.com
- Klima, R, E, & Sigmon, N, P. (2013). Cryptology. Appalachian State University Boone, North Carolina, USA. By Taylor & Francis Group. ISBN: 13: 798-1-4665-6904-1.
- Koblitz, N. (1998). Algebraic Aspects of Cryptography. Springer-Verlag, Berlin.
- Goldreich, O. (1999). Modern Cryptography, Springer-Verlag, Berlin.
- Paar, C., & Pelzl, J. (2010). Understanding Cryptograph: A Textbook for Students and Practitioners, Springer, Hedelberg Dordrecht London New York. DOIhttps://doi.org/10.1007/978-3-642-04101-3.
- Philippe Aumasson, J. (2017). Serious Cryptography. No Starch Press. ISBN-10 1593278268.
- Preneel, B. (2010). Understanding Cryptography. Springer-Verlag Berlin Heidelberg. ISBN 978-3-642-04100-6.
- Rosulek, M. (2021). The Joy Cryptography. School of Electrical Engineering & Computer Science Oregon State University, Corvallis, Oregon, USA.
- Schmeh, K. (2003). Cryptography and Public Key Infrastructure on the Internet. John Wiley, New Yor. ISBN: 978-0-470-86248-3.
- Stinson, D R., & Paterson, M B. (2019). Cryptography Theory and Practice. Taylor & Francis Group, LLC. ISBN-13: 978-1-1381-9701-5.
- Swenson, C. (2008). Modern Cryptanalysis. Wiley Publishing, Indianapolis. ISBN-10 047013593X.
- Thomas, W., & Pantelimon, S. (2009). Cryptographic BooleanFunctions and Applications. Academic Press. ISBN: 978-0-1237-4890-4.
References
تورج، ا. (۱۴۰۰). اصول و مفاهیم رمزنگاری. انتشارات نشر بید.
حیدری، م ، خ. (۱۳۹۹). نظریه تطابق. مطبعه پوهنتون کابل، افغانستان.
کریمی، س،س. (۱۴۰۰). آموزش اصول و مفاهیم تست نفوذ. انتشارات سها. تهران.
یوسفی راد، ا. فروزان، ب. شکری، م. (1398(. رمزنگاری، موسسه فرهنگی هنری دیباگران تهران.
Beutelspacher, A., & Schwenk. (2001). Moderne Verfahren der Kryptographie. Vieweg, Braunschweig. ISBN: 3704016632.
Brassard, G. (1988). Modern Cryptology. Lecture Notes in Computer Science. Springer-Verlag, Berlin. ISBN: 10- 0387968423.
Broemeling, L. D. (2011). An Account of Early Statistical Inference in Arab Cryptology. 2297-0584The American Statistician,65(4).
Bruen, A. A., & Forcinito, M.A. (2004). CRYPTOLOGY INFORMATION THEORY AND ERROR CORRECTION: A Handbook for the 21 st Century, John Wiley & Sons Inc, New Jersey. ISBN 0-471-65317-9.
Delfs, H, & Knebl, H. (2015). Principles and Applications (Information Security and Cryptography) 3rd ed. ISBN-10 3662479737.
Shparlinski, I. (2003). Cryptographic Applications of Analytic Number Theory. Birkhäuser-Verlag, Basel. ISBN: 2297-0584.
Talbot, J., & Welsh, D. (2005). Complexity and Cryptography. Cambridge University Press. ISBN-13 978-0-511-14070-9.
Katz, J. (2015). Introduction to Modern Cryptography. Taylor & Francis Gtoup. ISBN-13: 978-1-4665-7027-6.
Lennon, B. (2018). Philology, Security, Authentication. Harvard University Press, Cambridge. DOI:10.1086/712124 .
Naser, S. M. (2021). CRYPTOGRAPHY. Department of Mathematics, Bangladesh University of Engineering and Technology, International Journal of Mathematics and Statistics Studies. https://papers.ssrn.com
Klima, R, E, & Sigmon, N, P. (2013). Cryptology. Appalachian State University Boone, North Carolina, USA. By Taylor & Francis Group. ISBN: 13: 798-1-4665-6904-1.
Koblitz, N. (1998). Algebraic Aspects of Cryptography. Springer-Verlag, Berlin.
Goldreich, O. (1999). Modern Cryptography, Springer-Verlag, Berlin.
Paar, C., & Pelzl, J. (2010). Understanding Cryptograph: A Textbook for Students and Practitioners, Springer, Hedelberg Dordrecht London New York. DOIhttps://doi.org/10.1007/978-3-642-04101-3.
Philippe Aumasson, J. (2017). Serious Cryptography. No Starch Press. ISBN-10 1593278268.
Preneel, B. (2010). Understanding Cryptography. Springer-Verlag Berlin Heidelberg. ISBN 978-3-642-04100-6.
Rosulek, M. (2021). The Joy Cryptography. School of Electrical Engineering & Computer Science Oregon State University, Corvallis, Oregon, USA.
Schmeh, K. (2003). Cryptography and Public Key Infrastructure on the Internet. John Wiley, New Yor. ISBN: 978-0-470-86248-3.
Stinson, D R., & Paterson, M B. (2019). Cryptography Theory and Practice. Taylor & Francis Group, LLC. ISBN-13: 978-1-1381-9701-5.
Swenson, C. (2008). Modern Cryptanalysis. Wiley Publishing, Indianapolis. ISBN-10 047013593X.
Thomas, W., & Pantelimon, S. (2009). Cryptographic BooleanFunctions and Applications. Academic Press. ISBN: 978-0-1237-4890-4.