Strengthening Web-Based Login Security Using Vigenère Cipher and AES ENCRYPT() Method in MySQL
DOI:
https://doi.org/10.37802/joti.v7i1.954Keywords:
Cryptography, Data Security, Vigenère Cipher, AES_ENCRYPT(), Dual-Layer EncryptionAbstract
As technology advances further, more crimes are being committed on social media. These days, people can connect to the internet using technological devices like PCs (Personal Computers) or portable electronic devices like smartphones or tablets. This study presents a dual-layer encryption system combining the Vigenère Cipher and MySQL’s AES_ENCRYPT() to enhance the security of web-based login systems. The system encrypts user credentials on the client side using the Vigenère Cipher and applies additional encryption on the server side with AES_ENCRYPT(). This approach ensures secure data transmission and storage, reducing risks of plaintext exposure and unauthorized access. Comparative testing demonstrated that the dual-layer encryption method significantly improves resistance to brute-force attacks and database breaches compared to conventional techniques like SHA-256. Encrypted credentials remain secure even in the event of a database compromise, as decryption requires the correct secret keys. The system’s design also highlights the importance of robust key management to maintain data confidentiality and integrity. While this method introduces minor performance overhead and requires careful implementation, its advantages in safeguarding sensitive user information outweigh these limitations. This dual-layer approach is particularly suited for applications demanding high-security standards, making it a viable solution for mitigating contemporary cyber threats effectively.
Downloads
References
V. Smith, M. Mendoza, and I. Ullah, “Data Security Techniques Using Vigenere Cipher And Steganography Methods In Inserting Text Messages In Images,” vol. 3, no. 3, pp. 92–100, 2024.
M. A. Putra, F. Rustan, L. M. Liwe, and K. M. Suryaningrum, “Securing Text File Using Combination of Vigenere and One - Time Pad Cipher Algorithm,” Procedia Comput. Sci., vol. 227, pp. 1030–1038, 2023, doi: 10.1016/j.procs.2023.10.612.
S. S. Omran, A. S. Al-Khalid, and D. M. Al-Saady, “A cryptanalytic attack on Vigenère cipher using genetic algorithm,” 2011 IEEE Conf. Open Syst. ICOS 2011, no. 1, pp. 59–64, 2011, doi: 10.1109/ICOS.2011.6079312.
A. Al-Sabaaw, “Cryptanalysis of Vigenère Cipher: Method Implementation,” 2021 IEEE Asia-Pacific Conf. Comput. Sci. Data Eng. CSDE 2021, pp. 1–4, 2021, doi: 10.1109/CSDE53843.2021.9718432.
A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, “An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication,” Procedia Comput. Sci., vol. 92, pp. 355–360, 2016, doi: 10.1016/j.procs.2016.07.390.
D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, “An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher,” Proc. 2nd Int. Conf. Trends Electron. Informatics, ICOEI 2018, 2018, doi: 10.1109/ICOEI.2018.8553910.
B. Triandi, E. Ekadiansyah, R. Puspasari, L. T. Iwan, and F. Rahmad, “Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions,” 2018 6th Int. Conf. Cyber IT Serv. Manag. CITSM 2018, no. Citsm, pp. 1–5, 2019, doi: 10.1109/CITSM.2018.8674376.
K. Nahar and P. Chakraborty, “A Modified Version of Vigenere Cipher using 95 95 Table,” Int. J. Eng. Adv. Technol., vol. 9, no. 5, pp. 1144–1148, 2020, doi: 10.35940/ijeat.e9941.069520.
Y. K. Singh, “Generalization of Vigenere cipher,” ARPN J. Eng. Appl. Sci., vol. 7, no. 1, pp. 39–44, 2012.
A. Subandi, R. Meiyanti, C. L. Mestika Sandy, and R. W. Sembiring, “Three-pass protocol implementation in vigenere cipher classic cryptography algorithm with keystream generator modification,” Adv. Sci. Technol. Eng. Syst., vol. 2, no. 5, pp. 1–5, 2017, doi: 10.25046/aj020501.
H. N. Abed, Z. M. Ali, and A. L. Ahmed, “A robust encryption technique using enhanced vigenère cipher,” Int. J. Nonlinear Anal. Appl., vol. 12, no. 2, pp. 447–454, 2021, doi: 10.22075/ijnaa.2021.5071.
A.-A. Mohammed and A. Olaniyan, “Vigenere Cipher: Trends, Review and Possible Modifications,” Int. J. Comput. Appl., vol. 135, no. 11, pp. 46–50, 2016, doi: 10.5120/ijca2016908549.
A. A. Soofi, I. Riaz, and U. Rasheed, “An Enhanced Vigenere Cipher For Data Security,” Int. J. Sci. Technol. Res., vol. 5, no. 3, pp. 141–145, 2016.
D. Nazelliana, “Message Security in Classical Cryptography Using the Vigenere Cipher Method,” vol. 4, no. April, pp. 350–357, 2024.
R. Syahputra, “Penerapan Algoritma Vigenere Cipher Pada Aplikasi Tabungan Siswa Berbasis Web,” vol. 01, no. 06, pp. 19–23, 2024.
L. Voleti, R. M. Balajee, S. K. Vallepu, K. Bayoju, and D. Srinivas, “A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm,” Proc. - Int. Conf. Artif. Intell. Smart Syst. ICAIS 2021, pp. 1005–1010, 2021, doi: 10.1109/ICAIS50930.2021.9395794.
E. Irianti et al., “Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa,” vol. 01, pp. 8–15, 2023.
D. K. Maulana, S. M. Tanjung, R. S. Ritonga, and A. Ikhwan, “Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi,” vol. 3, no. 1, pp. 47–52, 2023.
K. Senthil, K. Prasanthi, and R. Rajaram, “A modern avatar of Julius Ceasar and Vigenere cipher,” 2013 IEEE Int. Conf. Comput. Intell. Comput. Res. IEEE ICCIC 2013, pp. 13–15, 2013, doi: 10.1109/ICCIC.2013.6724170.
B. A. Buhari, R. Sulaiman, M. M. Umar, S. Shehu, A. Almu, and A. M. Abubakar, “Performance and Security Analysis of Symmetric Data Encryption Algorithms : AES , 3DES and Blowfish,” vol. 6486, pp. 6473–6486, 2025.
Downloads
Issue
Section
License
Copyright (c) 2025 Journal of Technology and Informatics (JoTI)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.