To see the other types of publications on this topic, follow the link: Polyalphabetic substitution cipher.

Journal articles on the topic 'Polyalphabetic substitution cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 journal articles for your research on the topic 'Polyalphabetic substitution cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Astuti, Lestari Fidi, Kiswara Agung Santoso, and Ahmad Kamsyakawuni. "PENGAMANAN POLYALPHABETIC DENGAN AFFINE CIPHER BERDASARKAN BARISAN FIBONACCI." Majalah Ilmiah Matematika dan Statistika 19, no. 2 (2019): 95. http://dx.doi.org/10.19184/mims.v19i2.17274.

Full text
Abstract:
Affine cipher is a classic cryptographic algorithm substitution technique. Substitution technique is the encryption process for every character in the plaintext will be subtituted by another character. Affine cipher uses two types of keys. Each character of plaintext to be encrypted substituted by the same key. This research discusses about modify one of the key affine cipher, to produce a different key that will be substituted with each plaintext character. Key modifications are made by the Fibonacci sequence rules. This study also compares affine cipher and key modification affine cipher by
APA, Harvard, Vancouver, ISO, and other styles
2

Agustini, Siti, Weny Mistarika Rahmawati, and Muchamad Kurniawan. "Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher." International Journal of Artificial Intelligence & Robotics (IJAIR) 1, no. 1 (2019): 25. http://dx.doi.org/10.25139/ijair.v1i1.2029.

Full text
Abstract:
The rapid progression of exchange data by public networks is important, especially in information security. We need to keep our information safe from attackers or intruders. Furthermore, information security becomes needed for us. Many kind cipher methods of cryptography are improved to secure information such as monoalphabetic cipher and polyalphabetic cipher. Cryptography makes readable messages becoming non-readable messages. One of the popular algorithms of a polyalphabetic cipher is Vigenere cipher. Vigenere cipher has been used for a long time, but this algorithm has weaknesses. The calc
APA, Harvard, Vancouver, ISO, and other styles
3

Kartha, Ranju S., and Varghese Paul. "Polyalphabetic Substitution Cipher Using Multiple Random Table." International Journal of Computer Sciences and Engineering 6, no. 5 (2018): 51–58. http://dx.doi.org/10.26438/ijcse/v6i5.5158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Basheer, Ghusoon. "Application of Polyalphabetic Substitution Cipher using Genetic Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 5, no. 1 (2008): 57–68. http://dx.doi.org/10.33899/csmj.2008.163949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Som, Sukalyan, and Sabyasachi Ghosh. "A Simple Algebraic Model based Polyalphabetic Substitution Cipher." International Journal of Computer Applications 39, no. 8 (2012): 53–56. http://dx.doi.org/10.5120/4844-7111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ibraheem, Noor, and Mokhtar Hasan. "Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure." Baghdad Science Journal 17, no. 4 (2020): 1320. http://dx.doi.org/10.21123/bsj.2020.17.4.1320.

Full text
Abstract:
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution
APA, Harvard, Vancouver, ISO, and other styles
7

Clark, Andrew, and Ed Dawson. "A PARALLEL GENETIC ALGORITHM FOR CRYPTANALYSIS OF THE POLYALPHABETIC SUBSTITUTION CIPHER." Cryptologia 21, no. 2 (1997): 129–38. http://dx.doi.org/10.1080/0161-119791885850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hoa, Nguyen Huu, Dang Quach Gia Binh, Do Yeong Kim, Young Namgoong та Si Choon Noh. "Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델". Jouranl of Information and Security 22, № 3 (2022): 33–39. http://dx.doi.org/10.33778/kcsa.2022.22.3.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Imam Riadi, Abdul Fadlil, and Fahmi Auliya Tsani. "Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 33–45. http://dx.doi.org/10.14421/jiska.2022.7.1.33-45.

Full text
Abstract:
Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher. This classic algorithm is classified as a polyalphabetic substitution cipher-based algorithm. Therefore, this algorithm tends to only handle data in text form. By this research, a console-based application has been developed which is made from PHP programming language to be able to encrypt and decrypt digital image media using Vigenere Cipher. The encryption process is done by first converti
APA, Harvard, Vancouver, ISO, and other styles
10

Kravchenko, Oleksandr. "GENERAL TECHNOLOGY OF ENCRYPTION AND INTEGRATION OF DATA IN A PATTERN OF A PICTURE OF IMAGES THAT IS RESISTANT TO JPEG COMPRESSION." Bulletin of the National Technical University "KhPI". Series: Innovation researches in students’ scientific work, no. 2 (December 16, 2021): 22–28. http://dx.doi.org/10.20998/2220-4784.2021.02.04.

Full text
Abstract:
The object of the thesis is the use of steganographic methods for organizing a covert communication channel in a public channel, providing resistance to lossy compression. The aim of the thesis is to develop an algorithm for embedding data into bitmap images that is resistant to JPEG compression and attacks on the container. In this thesis, the features of the JPEG algorithm are investigated, steganographic methods of information protection are analyzed, and a steganographic algorithm is designed that is resistant to JPEG compression and attacks on the container. Additional security is provide
APA, Harvard, Vancouver, ISO, and other styles
11

Fadlil, Abdul, Imam Riadi, and Achmad Nugrahantoro. "Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 1 (2020): 81–95. http://dx.doi.org/10.31849/digitalzone.v11i1.3945.

Full text
Abstract:
Kriptografi pengubahan pesan asli menjadi disamarkan berguna menjaga kerahasiaan, integritas, keaslian, autentikasi pesan ketika proses komunikasi. Kriptografi klasik dengan subtitusi polialfabetik Vigenere memiliki tabel alphabet 26 baris yang relatif sederhana menjamin kerahasiaan. Kini pendekatan pembelajaran mesin Jaringan Syaraf Tiruan (JST) menjadi solusi layak untuk kriptografi dengan membentuk kunci rahasia dalam bobot jaringan sulit terpecahkan. Kunci dihasilkan dari bidirectional learning, dua pohon paritas saling tersinkronisasi dengan paramater hidden neuron, input neuron dan bobot
APA, Harvard, Vancouver, ISO, and other styles
12

King, John C. "AN ALGORITHM FOR THE COMPLETE AUTOMATED CRYPTANALYSIS OF PERIODIC POLYALPHABETIC SUBSTITUTION CIPHERS." Cryptologia 18, no. 4 (1994): 332–55. http://dx.doi.org/10.1080/0161-119491882928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kaeding, Thomas. "Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers." Cryptologia 44, no. 3 (2019): 205–22. http://dx.doi.org/10.1080/01611194.2019.1655504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cassal-Quiroga, B. B., and E. Campos-Cantón. "Generation of Dynamical S-Boxes for Block Ciphers via Extended Logistic Map." Mathematical Problems in Engineering 2020 (March 19, 2020): 1–12. http://dx.doi.org/10.1155/2020/2702653.

Full text
Abstract:
In this work, we present a simple algorithm to design n × n-bits substitution boxes (S-boxes) based on chaotic time series of the logistic map for different carrying capacities. The use of different carrying capacities in the chaotic map leads to low computational complexity, which is desirable to get high-speed communication systems. We generate a main sequence by means of two auxiliary sequences with uniform distribution via the logistic map for different carrying capacities. The elements of the main sequence are useful for generating the elements of an S-box. The auxiliary sequences are gen
APA, Harvard, Vancouver, ISO, and other styles
15

Permanasari, Yurika, and Erwin Harahap. "Kriptografi Polyalphabetic." Matematika 17, no. 1 (2018). http://dx.doi.org/10.29313/jmtm.v17i1.4065.

Full text
Abstract:
Abstrak. Kriptografi polyalphabetic merupakan improvisasi dari teknik substitusi monoalphabetic. Polyalphabetic substitution chiper melakukan teknik kriptografi monoalphabetic satu kali proses untuk suatu plainteks pesan. Algoritma polyalphabetic cipher membuat ciperteks lebih kuat untuk dapat dipecahkan karena karakter plainteks yang sama tidak dienkripsi dengan cipherteks yang sama. Kunci enkripsi polyalphabetic cipher dapat berbeda sehingga mempunyai kemungkinan kombinasi yang lebih bervariasi dan lebih sulit dipecahkan. Metode Vigenere cipher menjadi dasar dari polyalphabetic substitution
APA, Harvard, Vancouver, ISO, and other styles
16

"New Polyalphabetic Substitution Scheme for Secure Communication." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (2020): 3303–10. http://dx.doi.org/10.35940/ijitee.c9043.019320.

Full text
Abstract:
The internet is a very powerful and useful tool for communication, information and connectivity. So it is very important to keep yourself safe and secure online. The best way of secure information is encryption; there are many cryptographic algorithms available for encryption. These cryptographic algorithms are classified according to their encrypting process; as substitution cipher or transposition cipher. In Polyalphabetic ciphers, the substitution rule changes continuously from character to character according to the keyword and plaintext. Vigenere cipher is considered to be the most effici
APA, Harvard, Vancouver, ISO, and other styles
17

Muhammad Aziz Fatchu Rachman, Rizqi Sukma Kharisma,. "PEMBUATAN APLIKASI NOTES MENGGUNAKAN ALGORITMA KRIPTOGRAFI POLYALPHABETIC SUBSTITUTION CIPHER KOMBINASI KODE ASCII DAN OPERASI XOR BERBASIS ANDROID." Respati 12, no. 2 (2017). http://dx.doi.org/10.35842/jtir.v12i2.176.

Full text
Abstract:
Di era digital ini, teknologi berbasis android berkembang begitu cepat. Maka dari itu faktor keamanan sangat berperan penting, sehingga seluruh aplikasi berbasis mobile butuh keamanan. Saat ini menyimpan catatan singkat baik bersifat umum dan pribadi tidak membutuhkan buku dan pena lagi. Kita dapat menyimpannya di smartphone karena hampir semua masyarakat memilikinya. Kerahasiaan informasi catatan tersebut tentunya tidak ingin diketahui dan dicuri oleh orang lain. Maka dari itu dibutuhkannya suatu sistem keamanan yang dapat menjaga informasi tersebut yaitu aplikasi note menggunakan kriptografi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!