Academic literature on the topic 'Substitution ciphers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Substitution ciphers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Substitution ciphers"
Lysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii, and Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution." Radioelectronic and Computer Systems, no. 3 (September 29, 2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Full textPan, Yining. "The Scope of Application of Letter Frequency Analysis in Substitution Cipher." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2386/1/012015.
Full textBandjur, Milos. "Novel method of discrete message ciphering with equal length of message and cryptogram." Facta universitatis - series: Electronics and Energetics 16, no. 2 (2003): 251–58. http://dx.doi.org/10.2298/fuee0302251b.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textRatseev, S. M., and V. M. Ratseev. "ON PERFECT IMITATION RESISTANT CIPHERS BASED ON COMBINATORIAL OBJECTS." Vestnik of Samara University. Natural Science Series 22, no. 1-2 (April 24, 2017): 46–50. http://dx.doi.org/10.18287/2541-7525-2016-22-1-2-46-50.
Full textRatseev, S. M. "ON PERFECT IMITATION RESISTANT CIPHERS OF SUBSTITUTION WITH UNBOUNDED KEY." Vestnik of Samara University. Natural Science Series 19, no. 9.1 (June 5, 2017): 42–48. http://dx.doi.org/10.18287/2541-7525-2013-19-9.1-42-48.
Full textTran Thi, Luong. "PROVING THE SECURITY OF AES BLOCK CIPHER BASED ON MODIFIED MIXCOLUMN." Journal of Computer Science and Cybernetics 40, no. 2 (June 10, 2024): 187–203. http://dx.doi.org/10.15625/1813-9663/18058.
Full textSayyed, Karishma Shaukat, Prof S. R. Ganolkar, and Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Full textZahid, Amjad, Muhammad Arshad, and Musheer Ahmad. "A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation." Entropy 21, no. 3 (March 5, 2019): 245. http://dx.doi.org/10.3390/e21030245.
Full textEt al., Al-Bahrani. "A New Cipher Based on Feistel Structure and Chaotic Maps." Baghdad Science Journal 16, no. 1 (March 17, 2019): 0270. http://dx.doi.org/10.21123/bsj.16.1.(suppl.).0270.
Full textDissertations / Theses on the topic "Substitution ciphers"
Porto, Victor Monteiro Ferreira. "Criptografia: Da origem aos dias atuais." Universidade do Estado do Rio de Janeiro, 2015. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=9182.
Full textThis research was conducted with the intention of motivating the study of cryptography, showing that mathematics and the communication are present at various times, both past and present. This work shows the origin of cryptanalysis and all its evolution giving emphasis on coding and decoding mechanisms through practical examples. In addition, some methods cryptographic are highlighted as the monoalphabetic substitution cipher, the Vigenere cipher, RSA encryption that is the best known method of public key cryptography , ciphers Hill, the method of linear transformations and the Rabin method, due to its great importance for the evolution of computer systems and signatures digital among others. Finally, we show the importance and the need for cryptographic resources these days, in an attempt to prevent hackers and people who make bad use of mathematical knowledge can cause damage to society, whether by a simple message or through more situations reckless as improper banking transactions
Vozák, Petr. "Knihovna algoritmů pro šifrování textu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237044.
Full textBayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.
Full textClark, Andrew J. "Optimisation heuristics for cryptology." Thesis, Queensland University of Technology, 1998. https://eprints.qut.edu.au/15777/1/Andrew_Clark_Thesis.pdf.
Full textClark, Andrew J. "Optimisation Heuristics for Cryptology." Queensland University of Technology, 1998. http://eprints.qut.edu.au/15777/.
Full textFojtová, Lucie. "Softwarová podpora výuky klasické kryptoanalýzy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218739.
Full textSmékal, David. "Zabezpečení vysokorychlostních komunikačních systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220420.
Full textChiu, Hung-Yu, and 邱虹瑜. "Cracking Monoalphabetic Substitution Ciphers By Reinforcement Learning." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/e5ezc8.
Full text國立交通大學
資訊科學與工程研究所
108
Monoalphabetic Substitution Cipher is the basis of many cryptography, for example, Data Encryption Standard(DES) and Advanced Encryption Standard(AES). Studying how to crack a cipher contributes to designing a more secure cryptography. Many cryptanalysis of monoalphabetic substitution cipher relies on frequency analysis. For instance, Hill Climbing Algorithm, Simulated Annealing, Genetic Algorithm, Tabu Search and Particle Swarm Optimization. The differences between those methods are the way they generate a new key and the way they update the best key. It is worth noting that they all used fitness function to evaluate how good the current key is, which was designed according to unigram and bigram frequency analysis. However, the distribution of the alphabets in plaintext is unknown and we could not guarantee that it will be similar to the distribution of the statistics. Especially, when the cipher is very short, the distribution of alphabets in the cipher might be extremely different from the statistics. Therefore, the methods which rely on frequency analysis usually crack the cipher partially. Sometimes human effort is needed to complete the cryptanalysis. For the above reasons, we proposed a method to crack monoalphabetic substitution ciphers based on reinforcement learning. We model the cryptanalysis as a multi-armed bandit problem. At the stage of exploit and explore, we generate the new key according to the pattern. The pattern was designed on the basis of the length of a word and the repeated alphabets in a word. Through trial and error and the update of action value, the key becomes better and better. To evaluate how good the key is, a reward function was designed. The reward means the correctness of the alphabet in the key according to the mapping result of a dictionary with twenty thousand words. The experiment results showed that our method reached about 96% average correctness in 100 times of testing with different ciphers, which is readable. And the highest correctness for a single testing is 100%. To our best knowledge, we are the first to crack monoalphabetic substitution ciphers by multi-armed bandit. Last but not least, our method does not rely on unigram or bigram frequency analysis.
Xu, Jianhong. "Design and implementation of an advanced substitution-permutation encryption network /." 1997.
Find full textSu, Dong-Po, and 蘇東波. "A Study on Symmetric Block Cipher Scheme with Preimplemented Substitution Boxes." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/46193517794089583865.
Full text國防大學
資訊管理學系
103
Information technology is rapidly developing nowadays; it is a trend for people to use more digitialized documentations in their life and jobs. Therefore, it becomes important that how to protect these digitialized documentations. Data encryption is a good solution to protect confidentiality of these digitialized documentations. However, there exists a process overhead for data encryption. This study proposes an encryption scheme with preimplemented substitution boxes / inverse substitution boxes to enhance data encryption performance. In this study, we use random numbers to generate a million of different substitution boxes / inverse substitution boxes and store them in files. The proposed encryption scheme will base on these preimplemented substitution boxes / inverse substitution boxes to perform a data encryption process. Moreover, for realizing encryption performance of the proposed encryption scheme, we execute a comparison of data encryption processes without preimplemented substitution boxes / inverse substitution boxes. This study implements the proposed encryption scheme with C. We base on several possible scenarios, different sizes of substitution boxes / inverse substitution boxes and different types of files, to perform many data encryption processes and collect the encryption / decryption performance data. Analyzing the collected encryption / decryption performance data, we found that the proposed encryption scheme can receive better performance with a large size (16 * 16) of substitution boxes / inverse substitution boxes.
Books on the topic "Substitution ciphers"
Conan, Doyle A. El círculo rojo: Y otros casos de Sherlock Holmes. Madrid: Siruela, 2012.
Find full textConan, Doyle Arthur. The Adventure of the Dancing Men: And Other Sherlock Holmes Stories. Mineola, N.Y., USA: Dover Publications, 1997.
Find full textConan, Doyle A. The Valley of Fear and Selected Cases. London, England: Penguin Books, 2001.
Find full textConan, Doyle Arthur. Favorite Sherlock Holmes Detective Stories. Mineola, N.Y., USA: Dover Publications, 2000.
Find full textConan, Doyle A. The Extraordinary Cases of Sherlock Holmes. London, England: Puffin Books, 1994.
Find full textConan, Doyle A. Treize enquêtes élémentaires de Sherlock Holmes. Paris: Librio, 2009.
Find full textBook chapters on the topic "Substitution ciphers"
Rubinstein-Salzedo, Simon. "Substitution Ciphers." In Springer Undergraduate Mathematics Series, 9–23. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94818-8_3.
Full textSalomon, David. "Monoalphabetic Substitution Ciphers." In Data Privacy and Security, 21–37. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_2.
Full textSalomon, David. "Polyalphabetic Substitution Ciphers." In Data Privacy and Security, 59–92. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_4.
Full textNeuenschwander, Daniel. "1 Classical Polyalphabetic Substitution Ciphers." In Probabilistic and Statistical Methods in Cryptology, 9–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25942-8_2.
Full textGarici, Mohamed Amine, and Habiba Drias. "Cryptanalysis of Substitution Ciphers Using Scatter Search." In Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach, 31–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11499305_4.
Full textKarri, Ramesh, Grigori Kuznetsov, and Michael Goessel. "Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers." In Lecture Notes in Computer Science, 113–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45238-6_10.
Full textCogliati, Benoît, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam, and Zhe Zhang. "Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks." In Lecture Notes in Computer Science, 722–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96884-1_24.
Full textJithendra, K. B., and T. K. Shahana. "Elastic Serial Substitution Box for Block Ciphers with Integrated Hash Function Generation." In Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 658–71. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56991-8_48.
Full textLucks, Michael. "A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers." In Advances in Cryptology — CRYPTO’ 88, 132–44. New York, NY: Springer New York, 1990. http://dx.doi.org/10.1007/0-387-34799-2_11.
Full textJain, Ashish, and Narendra S. Chaudhari. "A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers." In Neural Information Processing, 206–15. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26535-3_24.
Full textConference papers on the topic "Substitution ciphers"
Aldarrab, Nada, and Jonathan May. "Segmenting Numerical Substitution Ciphers." In Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.emnlp-main.44.
Full textKotov, Yu A. "Software simulation of substitution ciphers." In 2016 13th International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering (APEIE). IEEE, 2016. http://dx.doi.org/10.1109/apeie.2016.7802272.
Full textCarlson, Albert, Sai Ranganath Mikkilineni, Michael W. Totaro, Richard B. Wells, and Robert E. Hiromoto. "Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications." In 2022 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2022. http://dx.doi.org/10.1109/isncc55209.2022.9851719.
Full textBorodzhieva, Adriana. "MATLAB-BASED SOFTWARE TOOL FOR IMPLEMENTATION OF TRIFID CIPHERS USING 64-SYMBOL ALPHABET." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-050.
Full textAldarrab, Nada, and Jonathan May. "Can Sequence-to-Sequence Models Crack Substitution Ciphers?" In Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.acl-long.561.
Full textKambhatla, Nishant, Anahita Mansouri Bigvand, and Anoop Sarkar. "Decipherment of Substitution Ciphers with Neural Language Models." In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics, 2018. http://dx.doi.org/10.18653/v1/d18-1102.
Full textStachowiak, Sylwia, Miroslaw Kurkowski, and Artur Sobon. "SAT vs. Substitution Boxes of DES like Ciphers." In 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2021. http://dx.doi.org/10.1109/wetice53228.2021.00032.
Full textAhmad, Musheer, Hammad Haleem, and Parvez Mahmood Khan. "A new chaotic substitution box design for block ciphers." In 2014 International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2014. http://dx.doi.org/10.1109/spin.2014.6776958.
Full textMishra, Ruby, Sayantani Dutta, Manish Okade, and Kamalakanta Mahapatra. "Substitution Permutation Network based Lightweight Ciphers with Improved Substitution Layers for Secure IoT Applications." In 2021 2nd International Conference on Range Technology (ICORT). IEEE, 2021. http://dx.doi.org/10.1109/icort52730.2021.9581374.
Full textUddin, Mohammad, and Amr Youssef. "An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers." In 2006 Canadian Conference on Electrical and Computer Engineering. IEEE, 2006. http://dx.doi.org/10.1109/ccece.2006.277769.
Full textReports on the topic "Substitution ciphers"
Foxon, Floe. Finding Probable Frequency Sums to Reduce the Key Space of Homophonic Substitution Ciphers. Journal of Young Investigators, July 2020. http://dx.doi.org/10.22186/jyi.38.1.1-5.
Full text