To see the other types of publications on this topic, follow the link: Transposition cipher.

Journal articles on the topic 'Transposition cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Transposition cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

G. M. Karpura Dheepan. "Advanced Nonlinear Analysis Technique in Modern Transposition Ciphers." Communications on Applied Nonlinear Analysis 31, no. 6s (2024): 653–69. http://dx.doi.org/10.52783/cana.v31.1250.

Full text
Abstract:
Particularly with modern transposition ciphers, the evolving field of cryptography requires advances in safe encryption methods. The key problem fixed is the absence of robust security against advanced cryptanalytic methods provided by traditional transposition ciphers. This work uses chaos theory to automate the production of substitution boxes (S-boxes), which are fundamental to transposition ciphers, so addressing this constraint. Strong nonlinearity and resistance to differential and linear cryptanalysis are produced by the proposed method by combining chaos-driven algorithms. The experime
APA, Harvard, Vancouver, ISO, and other styles
2

Ostia, Mary Grace, Alessa Crisostomo, David Jhozel Lucas, et al. "An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher." International Journal of Computing Sciences Research 8 (January 1, 2024): 3202–16. https://doi.org/10.25147/ijcsr.2017.001.1.214.

Full text
Abstract:
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption performance. Method –Proposedadjustmentsincludeexpandingthegridto14x14,usingtableshuffling instead of random character insertion, and strategically inserting random special characters in odd-length plaintexts. Results –The algorithm demonstrated improved encryption, producing more random ciphertext sequences and successfully recovering original characters during decryption. Conclusion –The developed algorithm outperforms the
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Zizhen. "Historical research on classification of Classical Cryptography." Theoretical and Natural Science 11, no. 1 (2023): 165–71. http://dx.doi.org/10.54254/2753-8818/11/20230403.

Full text
Abstract:
Cryptography is now being applied frequently in peoples daily lives. Their bank passcode, computer password, and digital signature all are applications of cryptography. Inside cryptography, Classical Cipher is a basic and important area as modern cryptography is developed from Classical Cryptography. By making a consummate system of Classical Cryptography, it increases peoples interest in exploring basic cryptography principles. This essay focuses mainly on the topic of classification of Classical Cipher. By reading related materials like books, journals, magazines and so on, the historical re
APA, Harvard, Vancouver, ISO, and other styles
4

Garg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (2017): 22–25. http://dx.doi.org/10.25046/aj020504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hassan, A., A. Garko, S. Sani, U. Abdullahi, and S. Sahalu. "Combined Techniques of Hill Cipher and Transposition Cipher." Trends Journal of Sciences Research 1, no. 1 (2023): 57–64. http://dx.doi.org/10.31586/jml.2023.822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.

Full text
Abstract:
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be no longer safe. Therefore, a security is needed that can make data safe from groups that are not concerned. Caesar Cipher Algorithm, which is the position of the original letter location changed through the alphabet. Transposition algorithm, which uses character permutations. Caesar Cipher and Transposition can secure data and restore data without changing the original form (plaintext).Keywords - Data Theft, Security, Caesar Chiper, Cipher Transposition Abstrack - Adanya pencurian data dan penya
APA, Harvard, Vancouver, ISO, and other styles
8

Agustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 5 (2023): 195–200. http://dx.doi.org/10.18860/jrmm.v2i5.21036.

Full text
Abstract:
The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two
APA, Harvard, Vancouver, ISO, and other styles
9

Agustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 4 (2023): 132–37. http://dx.doi.org/10.18860/jrmm.v2i4.14470.

Full text
Abstract:
The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstu
APA, Harvard, Vancouver, ISO, and other styles
10

Wahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.

Full text
Abstract:
Pada penelitian ini, digunakan algoritma columnar transposition sebagai metode transposisi dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang sebagai metode substitusi. Penyandian pesan menggunakan metode super enkripsi dengan algoritma columnar transposition dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang menghasilkan pesan akhir yang tidak mengubah, menambah maupun mengurangi pesan awal, sehingga dapat di implementasikan pada pesan dengan baik. Penyandian ini melipat gandakan keamanan suatu pesan, dimana keamanan pertama terletak p
APA, Harvard, Vancouver, ISO, and other styles
11

MR.SAGAR, RAJMANE, and VALSANG PROF.AARTI. "MODIFYING THE SECURITY OF CLASSICAL CAESAR CIPHER TECHNIQUE USING SOME RANDOMIZED APPROACH." IJIERT - International Journal of Innovations in Engineering Research and Technology NITET-18 (March 17, 2018): 11. https://doi.org/10.5281/zenodo.1451310.

Full text
Abstract:
<strong>Cryptography is about constructing and analyzing protocol that prevents third parties or the publi c from reading private messages. There are two techniques for converting data into no readable form:1) Transposition technique 2) Substitution technique. Caesar cipher is an example of substitution method. Caesar cipher has various limitations. In this pa per we have focused on the well known Caesar cipher techniques. Here in this paper our aim was to induce some strength to the Caesar cipher encryption technique. This proposed technique blended classical encryption with the some more tec
APA, Harvard, Vancouver, ISO, and other styles
12

S, G. Srikantaswamy Dr. H. D. Phaneendra. "Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption." International Journal on Cryptography and Information Security (IJCIS) 2, no. 4 (2012): 11. https://doi.org/10.5281/zenodo.6622413.

Full text
Abstract:
Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation ope
APA, Harvard, Vancouver, ISO, and other styles
13

S, G. Srikantaswamy1 and Dr. H. D. Phaneendra2. "Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption." International Journal on Cryptography and Information Security (IJCIS) 2, no. 4 (2012): 39–49. https://doi.org/10.5281/zenodo.6921108.

Full text
Abstract:
Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation ope
APA, Harvard, Vancouver, ISO, and other styles
14

Agustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 3 (2023): 84–89. http://dx.doi.org/10.18860/jrmm.v2i3.16335.

Full text
Abstract:
The issue of message security or an information is very important. A science that studies about securing the confidentiality of messages using passwords is called cryptography. To enhance security, two algorithms are combined to secure messages. Super encryption is a concept that uses a combination of two or more substitution and permutation (transposition) cryptography techniques to obtain an algorithm that is more difficult to crack. The first thing to do is to encrypt the message using a substitution technique (Cipher Substitution), then re-encrypt it using a permutation technique (Cipher T
APA, Harvard, Vancouver, ISO, and other styles
15

Dagadu, Joshua, Albert Armah, Emelia O. Aboagye, and Sandra A. Mansuru. "Rubik’s Cube Enhanced Columnar Transposition Cipher." Journal of Computer Sciences and Applications 12, no. 2 (2024): 31–37. https://doi.org/10.12691/jcsa-12-2-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Alkathiry, Omar, and Ahmad Al-Mogren. "A Powerful Genetic Algorithm to Crack a Transposition Cipher." International Journal of Future Computer and Communication 3, no. 6 (2014): 395–99. http://dx.doi.org/10.7763/ijfcc.2014.v3.335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

S. Vani Shree. "Encryption and Decryption of Data Using Edge Bimagic Mean Labeling and Hill Cipher Technique." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 53–63. https://doi.org/10.52783/anvi.v28.4118.

Full text
Abstract:
In the past few decades, a technology for encrypting and decrypting messages using the hill cipher crypto system and graph labeling technique has emerged. While considering two symmetric cipher types namely substitution cipher and transposition cipher, Hill cipher is a type of substitution cipher used for encrypting a group of letter. In this research, a labeling concept namely Edge Bimagic Mean Labeling has been introduced and it is substantiated for the ladder related graphs. The encryption process and the decryption process of a text using Hill cipher are also analyzed by making use of the
APA, Harvard, Vancouver, ISO, and other styles
18

Ritter, Terry. "TRANSPOSITION CIPHER WITH PSEUDO-RANDOM SHUFFLING: THE DYNAMIC TRANSPOSITION COMBINER." Cryptologia 15, no. 1 (1991): 1–17. http://dx.doi.org/10.1080/0161-119191865731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Syarif, Akhmad. "Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA." Jurnal Teknologi Informasi 4, no. 2 (2020): 234–40. http://dx.doi.org/10.36294/jurti.v4i2.1350.

Full text
Abstract:
Abstract - Cryptography is the art of securing and keeping text or message from other people except those who receive it. Caesar Cipher algorithm is a classic algorithm that is vulnerable to hacker attacks by the brute force method. Caesar Cipher with 7 methods, the first is a transposition, the second is a permutation, the third is binary converting, the fourth is logistic gate calculation, the sixth is converting ASCII and the seventh is converting Hexa. With seven combinations of these methods, it can improve Caesar’s algorithm Cipher from hacker attacks and add variations to the modificati
APA, Harvard, Vancouver, ISO, and other styles
20

Ineke Pekereng, Magdalena A., and Alz Danny Wowor. "Square transposition: an approach to the transposition process in block cipher." Bulletin of Electrical Engineering and Informatics 10, no. 6 (2021): 3385–92. http://dx.doi.org/10.11591/eei.v10i6.3129.

Full text
Abstract:
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called squa
APA, Harvard, Vancouver, ISO, and other styles
21

Siregar, Iskandar Muda. "PENERAPAN ALGORITMA AFFINE CIPHER DAN ALGORITMA COLOUMNAR TRANSPOSITION DALAM KEAMANAN TEKS." Jurnal Informatika Kaputama (JIK) 3, no. 1 (2019): 6–12. http://dx.doi.org/10.59697/jik.v3i1.391.

Full text
Abstract:
Keamanan dan kerahasiaan data merupakan salah satu aspek penting dalam komunikasi menggunakan komputer. Keamanan informasi berarti melindungi informasi dan sistem informasi dari akses orang-orang yang tidak berkepentingan, penggunaan, pengungkapan, gangguan, pengubahan atau perusakan. Keamanan dan kerahasiaan merupakan dua aspek penting dalam komunikasi data. Salah satu upaya yang dapat dilakukan untuk menjaga keamanan dan kerahasiaan suatu pesan penting yang akan dikirimkan adalah menerapkan teknik kriptografi atau steganografi. Salah satu solusi untuk meningkatkan keamanan data teks adalah d
APA, Harvard, Vancouver, ISO, and other styles
22

Lokman, Syiham Mohd, Chuah Chai Wen, Nurul Hidayah Binti Ab Rahman, and Isredza Rahmi Binti A. Hamid. "A Study of Caesar Cipher and Transposition Cipher in Jawi Messages." Advanced Science Letters 24, no. 3 (2018): 1651–55. http://dx.doi.org/10.1166/asl.2018.11130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Muhammad Fadlan, Haryansyah, and Rosmini. "Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (2021): 1113–19. http://dx.doi.org/10.29207/resti.v5i6.3566.

Full text
Abstract:
One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar
APA, Harvard, Vancouver, ISO, and other styles
24

Tafakur, Zidand BP, Sakina Sudin, and Adelina Ibrahim. "Aplikasi Enkripsi dan Dekripsi Menggunakan Metode Triple Transppsition Viginere Cipher." Jurnal Teknik Informatika (J-Tifa) 5, no. 2 (2022): 21–27. http://dx.doi.org/10.52046/j-tifa.v5i2.1447.

Full text
Abstract:
Keamanan informasi merupakan sesuatu yang harus diperhatikan secara serius. Salah satu bidang ilmu untuk menjaga keamanan informasi adalah Kriptografi. Dengan Kriptografi, informasi yang dianggap rahasia dapat disembunyikan dengan taknik penyandian, sehingga tidak dimengerti oleh orang lain, selain oleh pembuat dan penerimanya saja.Saat ini teknologi enkripsi dengan beberapa modifikasi sudah dipublikasikan untuk kepentingan umum, dalam aktivitas digital seperti merahasiakan data-data milik perorangan maupun banyak. Enkripsi adalah cara paling efektif untuk mengamankan data, melindungi dari ser
APA, Harvard, Vancouver, ISO, and other styles
25

Sokouti, Massoud. "An approach in improving transposition cipher system." Indian Journal of Science and Technology 2, no. 8 (2009): 9–15. http://dx.doi.org/10.17485/ijst/2009/v2i8.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

H. ASNAEEL, YASEEN, and NAJLA B. IBRAHEAM. "ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION." Journal of University of Anbar for Pure Science 7, no. 1 (2013): 233–39. http://dx.doi.org/10.37652/juaps.2013.83081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

JASSIM, M. KH. "Improved PSO Algorithm to Attack Transposition Cipher." Engineering and Technology Journal 35, no. 2B (2017): 144–49. http://dx.doi.org/10.30684/etj.2017.138650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nugraha, Yuniardi Wahyu, Thresye Thresye, and Oni Soesanto. "MODIFIKASI HILL CIPHER DENGAN MENGGUNAKAN MATRIKS KUNCI ORTHOGONAL DAN TRANSPOSITION SUBSTITUTION LEFT RIGHT SHIFT (TSLRS)." EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN 17, no. 1 (2023): 133. http://dx.doi.org/10.20527/epsilon.v17i1.9232.

Full text
Abstract:
Matrix is a collection of components arranged in rows and columns, concept of a matrix can be used in solving a problem related to cryptography. A mathematician named Lester Hill created a polyalphabetic cryptographic system called the Hill Cipher. Hill cipher is an algorithm that in its process uses a matrix with size (a × a) as the key matrix. The classic Hill Cipher has the disadvantage that the operation used is not complicated. In this study, the classic Hill Cipher will be modified by using an orthogonal matrix as the key matrix, as well as adding several other operations such as transpo
APA, Harvard, Vancouver, ISO, and other styles
29

Grace Z, Maricel. "Secured Private Key Handling using Transposition Cipher Technique." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 1.1 S I (2020): 85–89. http://dx.doi.org/10.30534/ijatcse/2020/1691.12020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lasry, George, Nils Kopal, and Arno Wacker. "Cryptanalysis of columnar transposition cipher with long keys." Cryptologia 40, no. 4 (2016): 374–98. http://dx.doi.org/10.1080/01611194.2015.1087074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

anand, V. B. Kirub, and R. Siva kumar. "Queuing Network using Job Scheduling using Transposition Cipher." International Journal of P2P Network Trends and Technology 8, no. 4 (2018): 6–10. http://dx.doi.org/10.14445/22492615/ijptt-v8i4p402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dina, Bela, Dadang Iskandar Mulyana, and Julinar Sari Hutagalung. "Algoritma ADFGVX Product Transposition Cipher Pada Pengenkripsian Pesan Text." Jurnal Pendidikan Sains dan Komputer 2, no. 01 (2022): 172–83. http://dx.doi.org/10.47709/jpsk.v2i01.1378.

Full text
Abstract:
Keamanan informasi data digital menjadi hal yang penting dan sangat diperlukan untuk menjaga data yang penting dan rahasia. Salah satu solusi yang ditawarkan untuk mengamankan data dengan sebuah cara menyandikan data atau disebut juga dengan ciphering. Dalam kriptografi terdapat beberapa metode yang sangat penting dalam menjaga kerahasiaan suatu data yakni enkripsi dan dekripsi. Algoritma ADFGVX Product Cipher dibuat karena merupakan salah satu algoritma yang memiliki sandi morse yang jelas. Algoritma ini akan menciptakan fungsi enkripsi kompleks seperti cara menggabungkan beberapa operasi enk
APA, Harvard, Vancouver, ISO, and other styles
33

Lubis, Ali Akbar, Ng Poi Wong, Irfan Arfiandi, V. Immanuel Damanik, and Adithya Maulana. "Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher." Jurnal SIFO Mikroskil 16, no. 2 (2015): 125–34. http://dx.doi.org/10.55601/jsm.v16i2.244.

Full text
Abstract:
Least Significant Bit (LSB) merupakan salah satu metode steganografi. Dari segi kapasitas, metode ini hanya mampu menampung sedikit pesan, ini karena LSB hanya menggunakan 3 bit disetiap pikselnya. Dari segi keamanan juga sangat mudah untuk diekstrak oleh steganalis, karena pesan yang disisip terdapat disetiap bit terakhir RGB di setiap piksel dari stego image tanpa adanya enkripsi terhadap pesan terlebih dahulu. Sebuah metode berprinsip sama dengan LSB dengan peningkatan keamanan dan kapasitas menggunakan metode Modified Least Significant Bit (MLSB) yang dikombinasi dengan teknik enkripsi tri
APA, Harvard, Vancouver, ISO, and other styles
34

Sinha, Nishith, and Kishore Bhamidipati. "Improving Security of Vigenère Cipher by Double Columnar Transposition." International Journal of Computer Applications 100, no. 14 (2014): 6–10. http://dx.doi.org/10.5120/17591-8290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hameed, Sarab M., and Dalal N. Hmood. "PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER." Journal of Al-Nahrain University Science 13, no. 4 (2010): 211–15. http://dx.doi.org/10.22401/jnus.13.4.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mahalakshmi, B., and Ch Sravan. "An Overview on Disrupted Transposition Cipher for Security Enhancement." International Journal of Computer Applications 143, no. 13 (2016): 9–12. http://dx.doi.org/10.5120/ijca2016910308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Barrieta, Raymond G., Aleksis S. Canlas, Dan Michael A. Cortez, and Khatalyn E. Mata. "Modified Hill Cipher Algorithm using Myszkowski Transposition to address Known-Plaintext attack." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 3242–49. http://dx.doi.org/10.22214/ijraset.2022.41970.

Full text
Abstract:
Abstract: Hill Cipher algorithm is a Polygraphic cipher known to be vulnerable to the Known-Plaintext attack. It is a type of attack wherein the attacker has access to a pair of Plaintext and Ciphertext. Possible leaked information can be used to reveal critical data which can include the private key that is used in the encryption of the plaintext. In this study, the researchers propose an improved scheme by incorporating Myszkowski transposition in the algorithm to address the specified problem. Runtime Test and Statistical test such as the Avalanche effect were used to evaluate the performan
APA, Harvard, Vancouver, ISO, and other styles
38

Simanullang, Sanco. "PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (2019): 12–17. http://dx.doi.org/10.46880/mtk.v5i2.421.

Full text
Abstract:
Data security is important in the implementation of information technology, especially in the field of computers, which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace or the internet. This can create new challenges and demands for the availability of a data security system that is as sophisticated as the advances in computer technology itself. In cryptography, data sent over the network will be disguised in such a way that even if the data can be read by third parties, it should not be understood by unauthorized parties. Data to
APA, Harvard, Vancouver, ISO, and other styles
39

Rachmawati, Dian, Sri Melvani Hardi, and Raju Partogi Pasaribu. "Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression." Journal of Physics: Conference Series 1339 (December 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1339/1/012007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ahmed, N., Y. Saleem, H. A. Habib, S. M. Afzal, and S. K. Khurshid. "A Novel Image Encryption Scheme Based on Orthogonal Vectors." Nucleus 52, no. 2 (2015): 71–78. https://doi.org/10.71330/thenucleus.2015.652.

Full text
Abstract:
Image is an important utility of daily life. Use of internet and transmission of digital media over insecure channel such as broadcasting and unicasting through satellite pose a threat to security. Therefore, a novel encryption scheme is proposed for color images with the ability to tolerate noise and JPEG compressed. The algorithm operates in two phases. First phase is a transposition cipher that transposes the position of each pixel. The second phase uses orthogonal vectors for further processing in frequency domain to produce the cipher image. The tri-color image is separated into three cha
APA, Harvard, Vancouver, ISO, and other styles
41

Madushani, A. P., and P. G. R. S. Ranasinghe. "A symmetric and a transposition cipher using the Euler’s totient function." Ceylon Journal of Science 48, no. 4 (2019): 327. http://dx.doi.org/10.4038/cjs.v48i4.7672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Twum, Frimpong, J. B., and Morgan-Darko William. "A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations." International Journal of Computer Applications 182, no. 35 (2019): 18–26. http://dx.doi.org/10.5120/ijca2019918323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ali-Pacha, Hana, Naima Hadj- Said, Adda Ali Pacha, Mohamad Afendee Mohamed, and Mustafa Mamat. "The six-dos transposition cipher based on the rubik s cube." International Journal of Advanced Technology and Engineering Exploration 8, no. 75 (2021): 258–73. http://dx.doi.org/10.19101/ijatee.2020.762150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Shibeeb, Ahmed Kareem, and Mohammed Hussein Ahmed. "Use of a new approach to automated break transposition cipher system." IOP Conference Series: Materials Science and Engineering 518 (June 5, 2019): 052020. http://dx.doi.org/10.1088/1757-899x/518/5/052020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Benjamin, Okike, and E. Garba. "Development of Okike’s Merged Irregular Transposition Cipher and Its Level Error." British Journal of Mathematics & Computer Science 7, no. 3 (2015): 229–40. http://dx.doi.org/10.9734/bjmcs/2015/14869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Jain, Shipra, and Vishal Bhatnagar. "A Novel Ammonic Conversion Algorithm for Securing Data in DNA using Parabolic Encryption." Information Resources Management Journal 28, no. 2 (2015): 20–31. http://dx.doi.org/10.4018/irmj.2015040102.

Full text
Abstract:
In today's era, the traditional cryptographic methods are not sufficient to provide security to the data. Everyone wants to secure their data whether the data is bank transaction, email transaction, personal data or the data related to work. To provide security to the data, DNA cryptography emerges as a new field. DNA cryptography is a new branch of cryptography. It provides security to the data by converting the data in the form of DNA sequence. A lot of research has been done in the area of this cryptography. It consists of various stages like converting data in the form of DNA, reverse conv
APA, Harvard, Vancouver, ISO, and other styles
47

Handrizal, Jos Timanta Tarigan, and Doni Irwansyah Putra. "Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion." Journal of Physics: Conference Series 1898, no. 1 (2021): 012003. http://dx.doi.org/10.1088/1742-6596/1898/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

P.Mohana Priya, P. Mohana Priya. "Hybrid Diagonal Transposition Cipher Model for Securing Data in Software Defined Networks." Journal of Science and Technology 7, no. 4 (2022): 60–87. http://dx.doi.org/10.46243/jst.2022.v7.i04.pp60-87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Handoko, Lekso Budi, and Chaerul Umam. "Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB)." Journal of Applied Intelligent System 8, no. 2 (2023): 140–51. http://dx.doi.org/10.33633/jais.v8i2.7863.

Full text
Abstract:
One of cryptography algorithm which used is beaufort cipher. Beaufort cipher has simple encryption procedure, but this algorithm has good enough endurance to attack. Unauthorized people cannot break up decrypt without know matrix key used. This algorithm used to encrypt data in the form of text called plaintext. The result of this algorithm is string called ciphertext which difficult to understood that can causing suspicious by other people. Beaufort cipher encryption tested with avalanche effect algorithm with modified one, two, three and all key matrix which resulting maximum 31.25% with all
APA, Harvard, Vancouver, ISO, and other styles
50

Bramantya, Samuel Dwi, and Magdalena A. Ineke Pakereng. "Perancangan Kriptografi Blok Cipher Berbasis Pola Gambar Rumah Adat Joglo." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 4 (2023): 629–38. http://dx.doi.org/10.35870/jtik.v7i4.1085.

Full text
Abstract:
Cryptography is a scientific discipline used to maintain data security. To increase the level of security, cryptographic development is needed by implementing 64 bit Block Cipher Cryptography based on the Joglo traditional house image pattern. This approach produces random ciphertext, which is useful in changing data in the form of clear messages (plaintext) into messages that cannot be understood (ciphertext). The designed pattern is 64 bits long and then converted back into plaintext. This cryptographic design is based on the description of the Joglo traditional house, using encryption and d
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!