334 results on '"Substitution cipher"'
Search Results
2. A Multi-stage Encryption Technique Using Asymmetric and Various Symmetric Ciphers
- Author
-
Rahman, Habibur, Alam, Kazi Md. Rokibul, Morimoto, Yasuhiko, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Chauhan, Naveen, editor, Yadav, Divakar, editor, Verma, Gyanendra K., editor, Soni, Badal, editor, and Lara, Jorge Morato, editor
- Published
- 2024
- Full Text
- View/download PDF
3. History of Cryptography to the 1800s
- Author
-
Easttom, Chuck and Easttom, William
- Published
- 2022
- Full Text
- View/download PDF
4. Never Underestimate Substitution Cipher with Diffusion
- Author
-
Ali, Md Rasid, Roy Chowdhury, Dipanwita, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Shakya, Subarna, editor, Balas, Valentina Emilia, editor, Kamolphiwong, Sinchai, editor, and Du, Ke-Lin, editor
- Published
- 2022
- Full Text
- View/download PDF
5. Invo-Substitute: Three Layer Encryption For Enhanced E-Commerce Website Security Using Substitution Cipher And Involution Function.
- Author
-
Kumar, Biresh, Roy, Sharmistha, Sinha, Anurag, Kumar, Vikas, and verma, Ashish kumar
- Subjects
- *
BLOCK ciphers , *WEBSITE security , *CIPHERS , *CRYPTOGRAPHY , *ELECTRONIC commerce , *INFORMATION sharing - Abstract
The use of cryptography, or the art of secret writing, to secure information exchanged via an open medium is an ancient technique, but its significance in the modern world has greatly expanded. It has become necessary to search for ever-better cryptographic primitives that offer a level of security while limiting the time needed to encrypt and decode the data as eavesdroppers' computational power has increased. Each letter in the message is swapped out for a different letter using a substitution cipher that follows a predetermined mapping. A, B, and C are shown as an image of two alphabets with a mapping between them: D, E, and F. the Caesar cipher is an easy illustration of a substitution cipher. When more than one independent layer of encryption is used, it is known as double encryption and it serves as a safeguard against the compromising of any one layer. The dangers associated with encrypting data are reduced by using two levels of encryption. Concurrent Error Detection (CED) for cryptographic chips also offers a huge potential for detecting (intentional) fault injection attacks when errors are injected into a cryptographic chip to break the key. For a family of symmetric block ciphers whose round functions are involutions, we present in this study a temporal redundancy based CED approach that is low cost, low latency, and effective. Nearly little more time is required for this CED approach to identify both ongoing and passing errors. F(F(x))=x indicates that a function F is an involution. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Isomorphic Unordered Labeled Trees up to Substitution Ciphering
- Author
-
Ingels, Florian, Azaïs, Romain, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Flocchini, Paola, editor, and Moura, Lucia, editor
- Published
- 2021
- Full Text
- View/download PDF
7. An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.
- Author
-
Padinjappurathu Gopalan, Shynu, Chowdhary, Chiranji Lal, Iwendi, Celestine, Farid, Muhammad Awais, and Ramasamy, Lakshmana Kumar
- Subjects
- *
ARTIFICIAL neural networks , *ELLIPTIC curve cryptography , *DOWNLOADING , *MOBILE health , *FISHER discriminant analysis , *FERTILITY preservation - Abstract
With the Internet of Things (IoT), mobile healthcare applications can now offer a variety of dimensionalities and online services. Disease Prediction Systems (DPS) increase the speed and accuracy of diagnosis, improving the quality of healthcare services. However, privacy is garnering an increasing amount of attention these days, especially concerning personal healthcare data, which are sensitive. There are a variety of prevailing privacy preservation techniques for disease prediction that are rendered. Nonetheless, there is a chance of medical users being affected by numerous disparate diseases. Therefore, it is vital to consider multi-label instances, which might decrease the accuracy. Thus, this paper proposes an efficient privacy-preserving (PP) scheme for patient healthcare data collected from IoT devices aimed at disease prediction in the modern Health Care System (HCS). The proposed system utilizes the Log of Round value-based Elliptic Curve Cryptography (LR-ECC) to enhance the security level during data transfer after the initial authentication phase. The authorized healthcare staff can securely download the patient data on the hospital side. Utilizing the Herding Genetic Algorithm-based Deep Learning Neural Network (EHGA-DLNN) can test these data with the trained system to predict the diseases. The experimental results demonstrate that the proposed approach improves prediction accuracy, privacy, and security compared to the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. SECURING COMMUNICATION IN CHATTER APPLICATION.
- Author
-
Morić, Zlatan, Pinjuh, Jure, and Kurelic, Sanjin
- Subjects
- *
BLOCK ciphers , *RSA algorithm , *STREAM ciphers , *STOCK exchanges , *WEB-based user interfaces , *FINANCIAL markets , *CIPHERS - Abstract
Chatter is an Angular web application that offers registered users' ability to chat with other registered users. Users can chat with multiple users in a secure fashion. The main problem in designing a good backend for the Chatter application is dealing with message exchange security. In this paper, we will present a few security protocols and suggestions for exchanging secure messages. From single substitution ciphers (Caesar and Atbash) and multi-alphabet substitution ciphers (Vigenère and Playfair) to more complex like symmetric (XOR stream cipher and DES block ciphers) and asymmetric algorithms (using private and public key mechanisms with Diffie-Hellman key exchange and RSA algorithm with hash functions - SHA). We will present the pros and cons of using each algorithm by using man-in-the-middle attack and choose a secure asymmetric algorithm as the main security for exchanging messages at the end. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers.
- Author
-
Sabonchi, Arkan Kh Shakr and Akay, Bahriye
- Subjects
METAHEURISTIC algorithms ,CRYPTOGRAPHY ,SUBSTITUTION (Logic) ,PROBABILITY density function ,STATISTICAL correlation - Abstract
This paper presents state-of-art cryptanalysis studies on attacks of the substitution and transposition ciphers using various metaheuristic algorithms. Traditional cryptanalysis methods employ an exhaustive search, which is computationally expensive. Therefore, metaheuristics have attracted the interest of researchers in the cryptanalysis field. Metaheuristic algorithms are known for improving the search for the optimum solution and include Genetic Algorithm, Simulated Annealing, Tabu Search, Particle Swarm Optimization, Differential Evolution, Ant Colony, the Artificial Bee Colony, Cuckoo Search, and Firefly algorithms. The most important part of these various applications is deciding the fitness function to guide the search. This review presents how these algorithms have been implemented for cryptanalysis purposes. The paper highlights the results and findings of the studies and determines the gaps in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. Introduction – A Revolutionary Cipher
- Author
-
Dooley, John F., Alberts, Gerard, Series Editor, Campbell-Kelly, Martin, Founded by, Copeland, Jack, Advisory board, Hashagen, Ulf, Advisory board, Schafer, Valérie, Advisory Editor, Tucker, John V., Advisory board, Yost, Jeffrey R, Advisory board, and Dooley, John F.
- Published
- 2018
- Full Text
- View/download PDF
11. Substitution Ciphers
- Author
-
Rubinstein-Salzedo, Simon, Chaplain, M.A.J., Series Editor, MacIntyre, Angus, Series Editor, Scott, Simon, Series Editor, Snashall, Nicole, Series Editor, Süli, Endre, Series Editor, Tehranchi, M.R., Series Editor, Toland, J.F., Series Editor, and Rubinstein-Salzedo, Simon
- Published
- 2018
- Full Text
- View/download PDF
12. A Novel Ant Colony Optimization Based Cryptanalysis of Substitution Cipher
- Author
-
Grari, Hicham, Azouaoui, Ahmed, Zine-Dine, Khalid, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Abraham, Ajith, editor, Haqiq, Abdelkrim, editor, Ella Hassanien, Aboul, editor, Snasel, Vaclav, editor, and Alimi, Adel M., editor
- Published
- 2018
- Full Text
- View/download PDF
13. Classic and Modern Encryption
- Author
-
Sinha, Sanjib and Sinha, Sanjib
- Published
- 2018
- Full Text
- View/download PDF
14. The Mystery of the Dancing Men.
- Author
-
Kaur, Manmohan
- Subjects
- *
MODULAR arithmetic , *MATHEMATICS education , *GENERAL education , *CIPHERS - Abstract
In this paper I describe an activity based on a 1903 Sherlock Holmes murder mystery, in which a substitution cipher is used to encrypt secret messages. The story provides a fun and interesting way to talk about frequency analysis, and can be used as a segue into mathematical constructs such as modular arithmetic and computation. The activity is accessible to ages twelve and above, and has been successfully used in mathematics outreach and popularization efforts as well as in general education and mathematics courses. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
15. A Proposed Method for Achieving the Confidentiality of Arabic Texts
- Author
-
Yaseen Hikmat Ismaiel
- Subjects
transposition cipher ,substitution cipher ,arabic text cryptography ,Science (General) ,Q1-390 - Abstract
Due to the rapid development of distributed computing systems, the use of local networks, and the huge expansion of the Internet, the process of maintaining the confidentiality of information becomes important and necessary. Encryption is one of the most important ways to keep information confidential and to prevent unauthorized people from disclosing this information. Many cryptographic algorithms have appeared in different ways and methods. But most of these algorithms have been devoted for encrypting texts in the English language. Because of the increasing important and sensitive information exchange in the Arabic language by users on the Internet, an urgent need has appeared to build dedicated encryption systems for the Arabic language. The aim of this research is to provide a proposed encryption method that uses the idea of combining the methods of transposition and substitution cipher for the purpose of Arabic texts confidentiality. This research depends on using diacritics in the Arabic language to perform the process of substitution cipher. The efficiency of the proposed method has been tested on different texts; the method provides high speed execution, the length of the encrypted texts is almost close to the clear text length, and the confidentiality of the resulting encrypted texts is high.
- Published
- 2019
- Full Text
- View/download PDF
16. An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems
- Author
-
Shynu Padinjappurathu Gopalan, Chiranji Lal Chowdhary, Celestine Iwendi, Muhammad Awais Farid, and Lakshmana Kumar Ramasamy
- Subjects
Internet of Things ,authentication ,secure data transfer ,disease prediction system (DPS) ,substitution cipher ,log of round value-based elliptic curve cryptography (LR-ECC) ,Chemical technology ,TP1-1185 - Abstract
With the Internet of Things (IoT), mobile healthcare applications can now offer a variety of dimensionalities and online services. Disease Prediction Systems (DPS) increase the speed and accuracy of diagnosis, improving the quality of healthcare services. However, privacy is garnering an increasing amount of attention these days, especially concerning personal healthcare data, which are sensitive. There are a variety of prevailing privacy preservation techniques for disease prediction that are rendered. Nonetheless, there is a chance of medical users being affected by numerous disparate diseases. Therefore, it is vital to consider multi-label instances, which might decrease the accuracy. Thus, this paper proposes an efficient privacy-preserving (PP) scheme for patient healthcare data collected from IoT devices aimed at disease prediction in the modern Health Care System (HCS). The proposed system utilizes the Log of Round value-based Elliptic Curve Cryptography (LR-ECC) to enhance the security level during data transfer after the initial authentication phase. The authorized healthcare staff can securely download the patient data on the hospital side. Utilizing the Herding Genetic Algorithm-based Deep Learning Neural Network (EHGA-DLNN) can test these data with the trained system to predict the diseases. The experimental results demonstrate that the proposed approach improves prediction accuracy, privacy, and security compared to the existing methods.
- Published
- 2022
- Full Text
- View/download PDF
17. Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.
- Author
-
Harjo, Budi and Ignatius Moses Setiadi, De Rosal
- Subjects
IMAGE encryption ,CIPHERS ,MEASURING instruments ,CRYPTOGRAPHY ,ENTROPY ,ALGORITHMS - Abstract
This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenère and Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with 8-bits integer values, while the second random key is a matrix that contains binary values. The modulus operation is used in the main process of substitution methods. In this study, 24-bits true-color images were used as a dataset for the testing experiment. Measurement of encryption quality is measured by Entropy, MSE, PSNR, SSIM, UACI, and NPCR, whereas tic toc functions for measuring the computational time needed. To ensure the decryption process runs perfectly, measuring instruments such as SSIM, MSE, and PSNR are used to compare the decrypted image with the original image, the tic toc function is also used to measure computing performance. Based on the results of testing the quality of image encryption proved to have excellent results where the entropy value is very close to 8, the ideal NPCR and UACI values, as well as excellent visual values based on MSE, PSNR, and SSIM measurements. The image can also be decrypted perfectly with relatively fast computing time in the encryption and decryption process. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure.
- Author
-
Ibraheem, Noor A. and Hasan, Mokhtar M
- Subjects
CIPHERS ,INFORMATION technology security ,TELECOMMUNICATION ,TELECOMMUNICATION systems ,COMPUTER network security ,DATA structures - Abstract
Copyright of Baghdad Science Journal is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
19. Finding the key length of a Vigenère cipher: How to improve the twist algorithm.
- Author
-
Park, Seongmin, Kim, Juneyeun, Cho, Kookrae, and Yum, Dae Hyun
- Subjects
- *
CIPHERS , *BLOCK ciphers , *ALGORITHMS , *CRYPTOGRAPHY - Abstract
A Vigenère cipher applies a single short key repeatedly to encrypt a plaintext. If a cryptanalyst correctly finds out the key length, the ciphertext can be divided into multiple instances of shift cipher and be broken by frequency analysis. To determine the key length, the twist algorithm, an alternate method to the standard Kasiski and Friedman tests, was recently proposed. In this article, we propose the twist+ algorithm, an improved twist algorithm, which can estimate the key length more accurately than the original twist algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
20. Data security based on homographic function.
- Author
-
ALI-PACHA, Hana, HADJ-SAID, Naima, and ALI-PACHA, Adda
- Subjects
- *
DATABASE security , *PIXELS , *IMAGE encryption , *PRIME numbers , *DIGITAL images , *FINITE fields - Abstract
• The first main idea and it is not used before, is to use homographic function. • The second original idea is to work in finite field Z/257Z, 257 is prime number. • Our cryptosystem based on homographic function is a kind of substitution cipher. In this paper, we adapt a homographic function to encrypt digital images, which takes into account the value of the pixel as well as its position in the image. The homographic function is a function represented as a quotient of two affine functions in a switching field K; it is represented by four different coefficients of zeros, which must verify certain conditions. One take the field K equal Z/257Z switching field (257 is a prime number), (all its non-zero elements are invertible, we take into account the following condition if we have 0 as the pixel value we put 256), 256 is the inverse of 256 in Z/257Z. We will show that this a homophonic substitution, which can represent the confusion part in a modern cryptographic system. We strengthened this proposal by a diffusion method and, we have used the Hénon attractor of is 2-dimensional; each pixel will be permuted to another position of the encrypted image. We managed to build a cryptosystem who passed all the statistic tests, and that has a secret key of 253 bits in length. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. Randomized Cryptosystem Based on Linear Transformation
- Author
-
Reddy, K. Adi Narayana, Vishnuvardhan, B., Prasad, G. Shyama Chandra, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Satapathy, Suresh Chandra, editor, Mandal, Jyotsna Kumar, editor, Udgata, Siba K., editor, and Bhateja, Vikrant, editor
- Published
- 2016
- Full Text
- View/download PDF
22. Enhancing Cloud Security Using VIJANA Cloud Data Jacket Protocol
- Author
-
Janaki, M., Ganaga Durga, M., Shetty, N. R., editor, Prasad, N Hamsavath, editor, and Nalini, N., editor
- Published
- 2016
- Full Text
- View/download PDF
23. SUBSTITUTION- SHIFTING- FOLDING CIPHER ALGORITHM WITH DYNAMIC SYMMETRIC ENCRYPTION KEY.
- Author
-
Ibrahim, NuhaJameel and El-Hussien, Farah TawfiqAbd
- Subjects
CRYPTOGRAPHY ,INFORMATION storage & retrieval systems ,ALGORITHMS ,PROBLEM solving ,DATA analysis - Abstract
Copyright of AL-yarmouk Journall is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
24. AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHER USING HILL CLIMBING WITH WELL DESIGNED HEURISTIC FUNCTION.
- Author
-
BULATOVIĆ, LUKA, MIJANOVIĆ, ANĐELA, ASANOVIĆ, BALŠA, TRAJKOVIĆ, NIKOLA, and BOŽOVIĆ, VLADIMIR
- Subjects
CRYPTOGRAPHY ,HILL climbing algorithms ,HEURISTIC ,ALGORITHMS ,SIGNS & symbols - Abstract
In this paper, we propose new method for automated cryptanalysis of substitution cryptosystem using Hill climbing algorithm. New heuristic function is proposed in order to drastically improve overall fitness of the standard Hill climbing algorithm. Several fitness functions have been tested and we try to detremine which of them perform better in specific situations using our suggested time-dependent measure goodness. We conclude which of those functions should be used in case we are dealing with short or long texts. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Crypto Goes to War: 1861–1865
- Author
-
Dooley, John F., Zdonik, Stan, Series editor, Ning, Peng, Series editor, Shekhar, Shashi, Series editor, Katz, Jonathan, Series editor, Wu, Xindong, Series editor, Jain, Lakhmi C, Series editor, Padua, David, Series editor, Shen, Xuemin (Sherman), Series editor, Furht, Borko, Series editor, Subrahmanian, V.S., Series editor, Hebert, Martial, Series editor, Ikeuchi, Katsushi, Series editor, Siciliano, Bruno, Series editor, and Dooley, John F.
- Published
- 2013
- Full Text
- View/download PDF
26. The Interwar Period 1919–1939
- Author
-
Dooley, John F., Zdonik, Stan, Series editor, Ning, Peng, Series editor, Shekhar, Shashi, Series editor, Katz, Jonathan, Series editor, Wu, Xindong, Series editor, Jain, Lakhmi C, Series editor, Padua, David, Series editor, Shen, Xuemin (Sherman), Series editor, Furht, Borko, Series editor, Subrahmanian, V.S., Series editor, Hebert, Martial, Series editor, Ikeuchi, Katsushi, Series editor, Siciliano, Bruno, Series editor, and Dooley, John F.
- Published
- 2013
- Full Text
- View/download PDF
27. Cryptography
- Author
-
Wallis, W. D. and Wallis, W.D.
- Published
- 2013
- Full Text
- View/download PDF
28. Substitution Cipher
- Author
-
Tyers, Ben and Tyers, Ben
- Published
- 2017
- Full Text
- View/download PDF
29. A Proposed Method for Achieving the Confidentiality of Arabic Texts.
- Author
-
Yaseen Hikmat Ismaiel
- Subjects
ARABIC language ,CONFIDENTIALITY agreements ,DISTRIBUTED computing ,CRYPTOGRAPHY ,ENGLISH language - Abstract
Copyright of Journal of University of Anbar for Pure Science is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
30. Probabilistic Methods for a Japanese Syllable Cipher
- Author
-
Ravi, Sujith, Knight, Kevin, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Li, Wenjie, editor, and Mollá-Aliod, Diego, editor
- Published
- 2009
- Full Text
- View/download PDF
31. Steganography Technique and Modification of Substitution Cipher Using ASCII Code and Fibonacci Sequences
- Author
-
Pujo Hari Saputro, Musthofa Galih Pradana, and Bondan Wahyu Pamekas
- Subjects
Steganography ,business.industry ,Computer science ,Substitution cipher ,Science ,Cryptography ,Plaintext ,Caesar cipher ,General Medicine ,QA75.5-76.95 ,ASCII ,Vigenère cipher ,Electronic computers. Computer science ,Key (cryptography) ,QA1-939 ,Arithmetic ,business ,caesar cipher, vigenere cipher, modification, steganography, cryptography ,Mathematics - Abstract
Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic cryptographic algorithms that need to be modified so that they become more optimal in the data security process. The first modification is to modify the Vigenere key using Fibonacci. In general, Vigenere Cipher will repeat the same keyword to complete the number of characters that are lacking so that the number of characters is the same as the number of characters in the plaintext. The second modification is to change or convert plaintext letters into ASCII letters so that the code is more difficult to solve. After the ASCII conversion process is done, the next results will be converted back in Hexa letters. In addition to the two modifications made, the steganography technique is also added by hiding the code behind the media in the form of images. Images that are sampled will be renamed and stored in different places.
- Published
- 2021
32. The Mystery of the Dancing Men
- Author
-
Manmohan Kaur
- Subjects
Outreach ,Substitution cipher ,Sociology ,Visual arts - Abstract
In this paper I describe an activity based on a 1903 Sherlock Holmes murder mystery, in which a substitution cipher is used to encrypt secret messages. The story provides a fun and interesting way to talk about frequency analysis, and can be used as a segue into mathematical constructs such as modular arithmetic and computation. The activity is accessible to ages twelve and above, and has been successfully used in mathematics outreach and popularization efforts as well as in general education and mathematics courses.
- Published
- 2021
- Full Text
- View/download PDF
33. Medieval Language Philosophy
- Author
-
Higley, Sarah L. and Higley, Sarah L.
- Published
- 2007
- Full Text
- View/download PDF
34. Applying hierarchical clustering to homophonic substitution ciphers using historical corpora
- Author
-
Anna Lehofer
- Subjects
Computer science ,business.industry ,Applied Mathematics ,Substitution cipher ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing ,Computer Science Applications ,Hierarchical clustering - Published
- 2021
- Full Text
- View/download PDF
35. Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method
- Author
-
Budi Harjo and De Rosal Ignatius Moses Setiadi
- Subjects
General Computer Science ,Computer science ,Substitution cipher ,Color image encryption ,General Engineering ,Chaotic ,Modulus ,Algorithm - Published
- 2021
- Full Text
- View/download PDF
36. NETWORK SECURITY BY BLOCK CIPHERS
- Author
-
Mohamed M. A. Hussein and Mohamed Ibrahim Abu Hassan
- Subjects
Triple DES ,Block cipher mode of operation ,Multiple encryption ,Vigenère cipher ,Computer science ,business.industry ,Substitution cipher ,Caesar cipher ,Cryptography ,Arithmetic ,business ,Block cipher - Abstract
This paper reviews some of the encryption models through the block cipher technique used for the data encryption process. As an introduction, we explained Classical Substitution Ciphers by two example models (Caesar Cipher and Vigenere Cipher). They are followed by a block cipher which is presented by multiple encryption triple DES and block cipher modes of operation. Multiple encryption DES algorithms are using two or three keys to make the encryption process more complex. But still using a 64-bit fixed blocks message and also wasted a lot of time during the encryption and decryption process. So we need some ways to encrypt and decrypt arbitrary quantities of data. This paper presents five block cipher modes of operation to cover a wide variety of applications and can be used with any block cipher. يستعرض هذا البحث بعض نماذج التشفير من خلال تقنية تشفير الکتل المستخدمة لعملية تشفير البيانات. کمقدمة، أوضحنا شفرات الاستبدال الکلاسيکي من خلال نموذجين من الأمثلة (سيزر، فيجنر). ينتقل البحث ليوضح تشفير کتلةمن البيانات عن طريق التشفير المتعدد الثلاثي وأنماط تشغيل تشفير الکتلة. تستخدم الخوارزميات متعددة التشفير ذات مفتاحين أو ثلاثة لجعل عملية التشفير أکثر تعقيدا. ولکن لا تزال هذه الخوارزمية تستخدم کتلة بيانات بحجم ثابت 64 بت ، کما أنه أهدر الکثير من الوقت أثناء عملية التشفير وفک التشفير. لذلک نحن بحاجة إلى بعض الطرق لتشفير وفک تشفير کميات البيانات العشوائية والمتغيرة الإحجام. يقدم هذا البحث خمسة أنماط تشفير کتلة لتغطية مجموعة واسعة من التطبيقات ويمکن استخدامها مع أي تشفير لکتلة البيانات. NETWORK SECURITY BY BLOCK CIPHERS
- Published
- 2020
- Full Text
- View/download PDF
37. An Efficient IoT-Based Patient Monitoring and Heart Disease Prediction System Using Deep Learning Modified Neural Network
- Author
-
Simanta Shekhar Sarmah
- Subjects
General Computer Science ,Remote patient monitoring ,Computer science ,Wearable computer ,Cloud computing ,02 engineering and technology ,Encryption ,advanced encryption standard (AES) ,modified Huffman algorithm (MHA) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Disease prediction ,Authentication ,Artificial neural network ,business.industry ,Deep learning ,Substitution cipher ,020208 electrical & electronic engineering ,General Engineering ,Internet of Things (IoT) ,020202 computer hardware & architecture ,healthcare monitoring system ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Artificial intelligence ,business ,lcsh:TK1-9971 ,deep learning modified neural network (DLMNN) ,Computer network - Abstract
The leading causes of death worldwide are chronic illnesses suchlike diabetes, Heart Disease (HD), cancer as well as chronic respiratory malady. It is remarkably intricate to diagnose HD with disparate symptoms or features. With the augmentation in popularity of smart wearable gadgets, a chance to render an Internet of Things (IoT) solution has turned out to be more. Unfortunately, the survival rates are low for the people suffering from sudden heart attacks. Consequently, a patient monitoring scheme intended for heart patients utilizing IoT centered Deep Learning Modified Neural Network (DLMNN) is proposed to assist in the HD diagnosis, and medication is given accordingly. This proposed technique is executed via `3' steps: I) Authentication, ii) Encryption, and iii) Classification. First, by utilizing the substitution cipher (SC) together with the SHA-512, the heart patient of the specific hospital is authenticated. Subsequently, the wearable IoT sensor device, which is fixed to the patient's body, concurrently transmits the sensor data to the cloud. This sensor data is encrypted and securely transmitted to the cloud utilizing the PDH-AES technique. After that, the encrypted data is finally decrypted, and by employing the DLMNN classifier, the classification is done. The classified outcomes comprise `2'types of data: i) normal and ii) abnormal. It denotes the patient's heart condition and if the outcome is abnormal, an alert text is passed to the physician for treating the patient. The investigational outcomes are estimated and the DLMNN for HD diagnosis shows improvement as compared to existing algorithms. Additionally, the proposed PDH-AES used in support of secure data transmission results in the highest level of security i.e. 95.87%, and it is achieved in the lowest time for encryption along with decryption when weighted against the existent AES.
- Published
- 2020
- Full Text
- View/download PDF
38. A Review on Metaheuristic Techniques in Automated Cryptanalysis of Classical Substitution Cipher
- Author
-
Santosh K. Vishwakarma, Ashish Jain, Nirmal K. Gupta, and Prakash C. Sharma
- Subjects
Mathematical optimization ,Computer science ,law ,Metaheuristic optimization ,Substitution cipher ,Genetic algorithm ,Simulated annealing ,Cryptanalysis ,Metaheuristic ,Tabu search ,law.invention - Abstract
Between the year 1993 and 2019, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical substitution cipher. This paper compares the performance of these new and different metaheuristic techniques. Three main comparison measures are considered to assess the performance of presented metaheuristics: efficiency, effectiveness, and success rate. To the best of author knowledge, first time this kind of review has been carried out. It is noteworthy that among the presented metaheuristics, the performance of genetic algorithm technique is best with respect to effectiveness and success rate.
- Published
- 2021
- Full Text
- View/download PDF
39. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.
- Author
-
Manasrah, Ahmad M. and Al-Din, Basim Najim
- Subjects
CIPHERS ,TELECOMMUNICATION security ,DATA encryption ,CRYPTOSYSTEMS ,COMPUTER storage devices ,MATRICES (Mathematics) - Abstract
Caesar cipher is a mono alphabetic cipher. It is also a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet. However, Caesar cipher method did not last long because of its simplicity and lack of communication security. Therefore, we believe that strengthen the key mechanism should increase its complexity against the various cryptanalysis attacks. This paper proposes an enhanced Caesar cipher method through adopting two private keys that are tied to the character positions (i.e. odd and even) for encryption and/or decryption. The two private keys are mapped into one public key to be transferred to the recipient. At the end, the results show that the new cryptosystem is inevitable to cryptanalysis attack. And the cipher text is reduced in size and thus, memory space. The public key generation process is proven to be a one-way function utilizing binary matrices that are generated and shared between the two communicating parties. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
40. A Classical Cipher-Playfair Cipher and Its Improved Versions
- Author
-
Yuzhe Wang
- Subjects
business.industry ,Computer science ,Substitution cipher ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Information security ,Classical cipher ,Encryption ,Computer security ,computer.software_genre ,law.invention ,Cipher ,Playfair cipher ,law ,Data_GENERAL ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,computer ,Transposition cipher - Abstract
In today's communications world, protecting data security cannot be ignored. Cryptography, which plays a pivotal role in information security, has become an indispensable and important part of information security. Cryptography is to study secret communication for adopting a kind of secret protection for the information to be transmitted. It is a technical science that studies the preparation and deciphering of codes. Classical encryption can be divided into two categories: transposition ciphers and substitution ciphers. This paper will mainly study a kind of substitution ciphers-Playfair cipher and review three improved versions of the 3D Playfair cipher. Then, a conclusion was drawn for these three improved versions of Playfair cipher. Finally looks forward to the future development of Playfair cipher and cryptography.
- Published
- 2021
- Full Text
- View/download PDF
41. Educational Application for Information Protection with the use of Cryptographic Methods - part I
- Author
-
Svetlin Shopov and Simona Filipova-Petrakieva
- Subjects
Computer science ,business.industry ,Substitution cipher ,Caesar cipher ,Cryptography ,Polyalphabetic cipher ,Computer security ,computer.software_genre ,Information protection policy ,Disk formatting ,Cipher ,business ,computer ,Transposition cipher - Abstract
The main purpose of this paper is to protect the transmission of important information from hacker attacks. This is achieved by encrypting the messages before transmission and decrypting them after their receipt, respectively. A Windows desktop application has been developed for purely educational purpose. For this reason, only basic substitution and transposition methods are implemented in it. Namely: Caesar cipher (simple monoalphabetic substitution), direct substitution cipher, polyalphabetic substitution cipher and matrix substitution cipher; a transposition cipher with text blocks or with text formatting. Three roles are implemented in the suggested application: administrator, teacher and student. The interface of the application consists of 2 parts: presentation and logical. Additionally, it contains a data section, including text files that the application can work with. This type of applications can be used in different areas of human life. For example, to protect information in custom text files (.doc,. txt,. pdf etc.) that can be written to various storage devices (hard drives, flash drives, DVDs, CDs etc.) or sent via e-mail or stored in cloud space. The information can be related to management, finance or military purposes. The transmitted data may be to banks, insurance companies or other corporations making responsible economic and financial transactions.
- Published
- 2021
- Full Text
- View/download PDF
42. Improved Color Image Encryption using Modified Modulus Substitution Cipher, Dual Random Key and Chaos Method
- Author
-
Abu Salam, Eko Hari Rachmawanto, Christy Atika Sari, and De Rosal Ignatius Moses Setiadi
- Subjects
Modulo operation ,General Computer Science ,business.industry ,Computer science ,Substitution cipher ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Substitution method ,Cryptography ,Encryption ,Digital image ,Entropy (information theory) ,business ,Beaufort cipher ,Algorithm - Abstract
This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenereand Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with 8-bits integer values, while the second random key is a matrix that contains binary values. The modulus operation is used in the main process of substitution methods. In this study, 24-bits true-color image was used as a dataset for the testing experiment. Measurement of encryption quality is measured by Entropy, MSE, PSNR, SSIM, UACI, and NPCR, whereas tic toc functions for measuring the computational time needed. To ensure the decryption process runs perfectly, measuring instruments such as SSIM, MSE, and PSNR are used to compare the decrypted image with the original image, the tic toc function is also used to measure computing performance. Based on the results of testing the quality of image encryption proved to have excellent results where the entropy value is close to 8, the ideal NPCR and UACI values, as well as excellent visual values based on MSE, PSNR and SSIM measurements. The image can also be decrypted perfectly with relatively fast computing time in the encryption and decryption process.
- Published
- 2021
- Full Text
- View/download PDF
43. Experimental Analysis of the Dorabella Cipher with Statistical Language Models
- Author
-
Anirudh S. Sundar, Scott Smallwood, Grzegorz Kondrak, Bradley Hauer, Colin Choi, and Abram Hindle
- Subjects
business.industry ,Computer science ,Substitution cipher ,computer.software_genre ,nobody ,Cipher ,Simple (abstract algebra) ,DECIPHER ,Decipherment ,Artificial intelligence ,Language model ,business ,computer ,Natural language processing ,Natural language - Abstract
The Dorabella cipher is a symbolic message written in 1897 by English composer Edward Elgar. We analyze the cipher using modern computational and statistical techniques. We consider several open questions: Is the underlying message natural language text or music? If it is language, what is the most likely language? Is Dorabella a simple substitution cipher? If so, why has nobody managed to produce a plausible decipherment? Are some unusual-looking patterns in the cipher likely to occur by chance? Can stateof-the-art algorithmic solvers decipher at least some words of the message? This work is intended as a contribution towards finding answers to these questions.
- Published
- 2021
- Full Text
- View/download PDF
44. TRANSPOLY HILL CIPHER -- AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER.
- Author
-
Pandey, Ashish, Pandey, Stuti, and Agarwal, Abhay Kumar
- Subjects
CIPHER & telegraph codes ,DATA encryption ,SYMMETRIC matrices ,CRYPTOGRAPHY ,LINEAR equations - Abstract
Every encryption technique is based on any one of two facts-substitution or transposition. Sometimes the combination of both techniques is used. Substitution technique is based on replacement of given plaintext letters by other letters or symbols to get the ciphertext. The basic concept behind this paper is to improve the strength of Hill cipher, 'a multiple-letter substitution cipher' against known plaintext attack. This paper presents a modified approach which is an enhancement over traditional Hill cipher by using symmetric matrix of plaintext letters. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. Finding the key length of a Vigenère cipher: How to improve the twist algorithm
- Author
-
Kookrae Cho, Juneyeun Kim, Seongmin Park, and Dae Hyun Yum
- Subjects
Computer science ,Applied Mathematics ,Substitution cipher ,Plaintext ,Data_CODINGANDINFORMATIONTHEORY ,Polyalphabetic cipher ,Computer Science Applications ,law.invention ,Vigenère cipher ,law ,Ciphertext ,Key (cryptography) ,Arithmetic ,Cryptanalysis ,Key size - Abstract
A Vigenere cipher applies a single short key repeatedly to encrypt a plaintext. If a cryptanalyst correctly finds out the key length, the ciphertext can be divided into multiple instances of shift ...
- Published
- 2019
- Full Text
- View/download PDF
46. An Improved Genetic Algorithm and A New Discrete Cuckoo Algorithm for Solving the Classical Substitution Cipher
- Author
-
Ashish Jain and Narendra S. Chaudhari
- Subjects
Statistics and Probability ,021103 operations research ,Control and Optimization ,biology ,Computer science ,Substitution cipher ,0211 other engineering and technologies ,02 engineering and technology ,biology.organism_classification ,Computer Science Applications ,Computational Mathematics ,Computational Theory and Mathematics ,Modeling and Simulation ,Genetic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Decision Sciences (miscellaneous) ,Algorithm ,Cuckoo - Abstract
Searching secret key of classical ciphers in the keyspace is a challenging NP-complete problem that can be successfully solved using metaheuristic techniques. This article proposes two metaheuristic techniques: improved genetic algorithm (IGA) and a new discrete cuckoo search (CS) algorithm for solving a classical substitution cipher. The efficiency and effectiveness of the proposed techniques are compared to the existing tabu search (TS) and genetic algorithm (GA) techniques using three criteria: (a) average number of key elements correctly detected, (b) average number of keys examined before determining the required key, and (c) the mean performance time. As per the results obtained, the improved GA is comparatively better than the existing GA for criteria (a) and (c), while the proposed CS strategy is significantly better than rest of the algorithms (i.e., GA, IGA, and TS) for all three criteria. The obtained results indicate that the proposed CS technique can be an efficient and effective option for solving other similar NP-complete combinatorial problems also.
- Published
- 2019
- Full Text
- View/download PDF
47. Automated cryptanalysis of substitution cipher using Hill climbing with well designed heuristic function
- Author
-
Anđela Mijanović, Luka Bulatović, Vladimir Božović, Balša Asanović, and Nikola Trajković
- Subjects
law ,Computer science ,Substitution cipher ,Heuristic function ,Cryptanalysis ,Hill climbing ,Algorithm ,law.invention - Published
- 2019
- Full Text
- View/download PDF
48. Cryptography and Secret Communications in Ancient World
- Author
-
Sergey Vladimirovich Zapechnikov
- Subjects
pre-scientific cryptography ,substitution cipher ,permutation cipher ,Information technology ,T58.5-58.64 ,Information theory ,Q350-390 - Abstract
We study the historical evidences of early cryptography in Ancient World. The constructions and using practices of the most important protocryptographic techniques are analyzed. Basing on these facts, we offer our versions about functions of the pre-scientific ciphers in Ancient World. We also conclude about their properties and ways of improvement.
- Published
- 2014
49. Isomorphic unordered labeled trees up to substitution ciphering
- Author
-
Romain Azaïs, Florian Ingels, Reproduction et développement des plantes (RDP), École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche pour l’Agriculture, l’Alimentation et l’Environnement (INRAE), Simulation et Analyse de la morphogenèse in siliCo (MOSAIC), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), and École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL)
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,0102 computer and information sciences ,[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM] ,01 natural sciences ,Combinatorics ,010104 statistics & probability ,Cardinality ,Computer Science - Data Structures and Algorithms ,[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO] ,FOS: Mathematics ,Mathematics - Combinatorics ,Data Structures and Algorithms (cs.DS) ,[INFO]Computer Science [cs] ,0101 mathematics ,Graph isomorphism ,[MATH]Mathematics [math] ,Time complexity ,Mathematics ,Substitution cipher ,Substitution (logic) ,Labeled unordered trees ,Tree (graph theory) ,Cipher ,010201 computation theory & mathematics ,Combinatorics (math.CO) ,Isomorphism ,Tree isomorphism ,Computer Science - Discrete Mathematics - Abstract
Conférence online.; International audience; Given two messages - as linear sequences of letters, it is immediate to determine whether one can be transformed into the other by simple substitution cipher of the letters. On the other hand, if the letters are carried as labels on nodes of topologically isomorphic unordered trees, determining if a substitution exists is referred to as marked tree isomorphism problem in the literature and has been show to be as hard as graph isomorphism. While the left-to-right direction provides the cipher of letters in the case of linear messages, if the messages are carried by unordered trees, the cipher is given by a tree isomorphism. The number of isomorphisms between two trees is roughly exponential in the size of the trees, which makes the problem of finding a cipher difficult by exhaustive search. This paper presents a method that aims to break the combinatorics of the isomorphisms search space. We show that in a linear time (in the size of the trees), we reduce the cardinality of this space by an exponential factor on average.
- Published
- 2021
- Full Text
- View/download PDF
50. A novel visual cryptography scheme based on substitution cipher.
- Author
-
Yadav, Gyan Singh and Ojha, Aparajita
- Abstract
Security of information communication through open channels has been the prime concern during the last few decades. Apart from many conventional cryptographic schemes, visual cryptographic techniques have also been in use for data and information security. Visual Cryptography is basically a cryptographic method in which decryption is performed by human visual system. In this paper, we present a novel visual cryptography scheme based on a substitution cipher and random grid. The scheme uses two-fold encryption. In the first fold of encryption, Caeser cipher is used to encrypt the image row wise and then column wise using a key of the size equal to the greatest common devisor of the number of rows and columns in the secret image. Then a random matrix is generated and the transformed secret image is XORed with this random matrix to enhance the security. The scheme is shown to be secure and decryption is also lossless. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.