Journal articles on the topic 'Transposition cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Transposition cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Garg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.
Full textLubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (June 2017): 22–25. http://dx.doi.org/10.25046/aj020504.
Full textNasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (July 20, 2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.
Full textAlkathiry, Omar, and Ahmad Al-Mogren. "A Powerful Genetic Algorithm to Crack a Transposition Cipher." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 395–99. http://dx.doi.org/10.7763/ijfcc.2014.v3.335.
Full textWahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (December 27, 2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.
Full textRitter, Terry. "TRANSPOSITION CIPHER WITH PSEUDO-RANDOM SHUFFLING: THE DYNAMIC TRANSPOSITION COMBINER." Cryptologia 15, no. 1 (January 1991): 1–17. http://dx.doi.org/10.1080/0161-119191865731.
Full textLokman, Syiham Mohd, Chuah Chai Wen, Nurul Hidayah Binti Ab Rahman, and Isredza Rahmi Binti A. Hamid. "A Study of Caesar Cipher and Transposition Cipher in Jawi Messages." Advanced Science Letters 24, no. 3 (March 1, 2018): 1651–55. http://dx.doi.org/10.1166/asl.2018.11130.
Full textIneke Pekereng, Magdalena A., and Alz Danny Wowor. "Square transposition: an approach to the transposition process in block cipher." Bulletin of Electrical Engineering and Informatics 10, no. 6 (December 1, 2021): 3385–92. http://dx.doi.org/10.11591/eei.v10i6.3129.
Full textSyarif, Akhmad. "Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA." Jurnal Teknologi Informasi 4, no. 2 (December 10, 2020): 234–40. http://dx.doi.org/10.36294/jurti.v4i2.1350.
Full textSokouti, Massoud. "An approach in improving transposition cipher system." Indian Journal of Science and Technology 2, no. 8 (August 20, 2009): 9–15. http://dx.doi.org/10.17485/ijst/2009/v2i8.7.
Full textH. ASNAEEL, YASEEN, and NAJLA B. IBRAHEAM. "ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION." Journal of University of Anbar for Pure Science 7, no. 1 (April 1, 2013): 233–39. http://dx.doi.org/10.37652/juaps.2013.83081.
Full textJASSIM, M. KH. "Improved PSO Algorithm to Attack Transposition Cipher." Engineering and Technology Journal 35, no. 2B (February 1, 2017): 144–49. http://dx.doi.org/10.30684/etj.2017.138650.
Full textMuhammad Fadlan, Haryansyah, and Rosmini. "Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (December 30, 2021): 1113–19. http://dx.doi.org/10.29207/resti.v5i6.3566.
Full textGrace Z, Maricel. "Secured Private Key Handling using Transposition Cipher Technique." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 1.1 S I (February 15, 2020): 85–89. http://dx.doi.org/10.30534/ijatcse/2020/1691.12020.
Full textLasry, George, Nils Kopal, and Arno Wacker. "Cryptanalysis of columnar transposition cipher with long keys." Cryptologia 40, no. 4 (February 2016): 374–98. http://dx.doi.org/10.1080/01611194.2015.1087074.
Full textanand, V. B. Kirub, and R. Siva kumar. "Queuing Network using Job Scheduling using Transposition Cipher." International Journal of P2P Network Trends and Technology 8, no. 4 (August 25, 2018): 6–10. http://dx.doi.org/10.14445/22492615/ijptt-v8i4p402.
Full textDina, Bela, Dadang Iskandar Mulyana, and Julinar Sari Hutagalung. "Algoritma ADFGVX Product Transposition Cipher Pada Pengenkripsian Pesan Text." Jurnal Pendidikan Sains dan Komputer 2, no. 01 (March 13, 2022): 172–83. http://dx.doi.org/10.47709/jpsk.v2i01.1378.
Full textLubis, Ali Akbar, Ng Poi Wong, Irfan Arfiandi, V. Immanuel Damanik, and Adithya Maulana. "Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher." Jurnal SIFO Mikroskil 16, no. 2 (November 26, 2015): 125–34. http://dx.doi.org/10.55601/jsm.v16i2.244.
Full textSinha, Nishith, and Kishore Bhamidipati. "Improving Security of Vigenère Cipher by Double Columnar Transposition." International Journal of Computer Applications 100, no. 14 (August 20, 2014): 6–10. http://dx.doi.org/10.5120/17591-8290.
Full textHameed, Sarab M., and Dalal N. Hmood. "PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER." Journal of Al-Nahrain University Science 13, no. 4 (December 1, 2010): 211–15. http://dx.doi.org/10.22401/jnus.13.4.30.
Full textMahalakshmi, B., and Ch Sravan. "An Overview on Disrupted Transposition Cipher for Security Enhancement." International Journal of Computer Applications 143, no. 13 (June 17, 2016): 9–12. http://dx.doi.org/10.5120/ijca2016910308.
Full textBarrieta, Raymond G., Aleksis S. Canlas, Dan Michael A. Cortez, and Khatalyn E. Mata. "Modified Hill Cipher Algorithm using Myszkowski Transposition to address Known-Plaintext attack." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 3242–49. http://dx.doi.org/10.22214/ijraset.2022.41970.
Full textSimanullang, Sanco. "PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (September 10, 2019): 12–17. http://dx.doi.org/10.46880/mtk.v5i2.421.
Full textRachmawati, Dian, Sri Melvani Hardi, and Raju Partogi Pasaribu. "Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression." Journal of Physics: Conference Series 1339 (December 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1339/1/012007.
Full textMadushani, A. P., and P. G. R. S. Ranasinghe. "A symmetric and a transposition cipher using the Euler’s totient function." Ceylon Journal of Science 48, no. 4 (December 10, 2019): 327. http://dx.doi.org/10.4038/cjs.v48i4.7672.
Full textTwum, Frimpong, J. B., and Morgan-Darko William. "A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations." International Journal of Computer Applications 182, no. 35 (January 17, 2019): 18–26. http://dx.doi.org/10.5120/ijca2019918323.
Full textAli-Pacha, Hana, Naima Hadj- Said, Adda Ali Pacha, Mohamad Afendee Mohamed, and Mustafa Mamat. "The six-dos transposition cipher based on the rubik s cube." International Journal of Advanced Technology and Engineering Exploration 8, no. 75 (February 28, 2021): 258–73. http://dx.doi.org/10.19101/ijatee.2020.762150.
Full textShibeeb, Ahmed Kareem, and Mohammed Hussein Ahmed. "Use of a new approach to automated break transposition cipher system." IOP Conference Series: Materials Science and Engineering 518 (June 5, 2019): 052020. http://dx.doi.org/10.1088/1757-899x/518/5/052020.
Full textBenjamin, Okike, and E. Garba. "Development of Okike’s Merged Irregular Transposition Cipher and Its Level Error." British Journal of Mathematics & Computer Science 7, no. 3 (January 10, 2015): 229–40. http://dx.doi.org/10.9734/bjmcs/2015/14869.
Full textJain, Shipra, and Vishal Bhatnagar. "A Novel Ammonic Conversion Algorithm for Securing Data in DNA using Parabolic Encryption." Information Resources Management Journal 28, no. 2 (April 2015): 20–31. http://dx.doi.org/10.4018/irmj.2015040102.
Full textHandrizal, Jos Timanta Tarigan, and Doni Irwansyah Putra. "Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion." Journal of Physics: Conference Series 1898, no. 1 (June 1, 2021): 012003. http://dx.doi.org/10.1088/1742-6596/1898/1/012003.
Full textNurdiyanto, Heri, Robbi Rahim, and Nur Wulan. "Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement." Journal of Physics: Conference Series 930 (December 2017): 012005. http://dx.doi.org/10.1088/1742-6596/930/1/012005.
Full textWang, Xu, Liyao Li, Ching-Chun Chang, and Yongfeng Huang. "Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher." Journal of Information Security and Applications 64 (February 2022): 103067. http://dx.doi.org/10.1016/j.jisa.2021.103067.
Full textGaffar, Achmad Fanany Onnilita, Rheo Malani, and Arief Bramanto Wicaksono Putra. "Magic cube puzzle approach for image encryption." International Journal of Advances in Intelligent Informatics 6, no. 3 (November 6, 2020): 290. http://dx.doi.org/10.26555/ijain.v6i3.422.
Full textArya, Govind Prasad, Aayushi Nautiyal, Ashish Pant, Shiv Singh, and Tishi Handa. "A Cipher Design with Automatic Key Generation using the Combination of Substitution and Transposition Techniques and Basic Arithmetic and Logic Operations." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 01, no. 01 (April 16, 2013): 25–28. http://dx.doi.org/10.9756/sijcsea/v1i1/01010255.
Full textKaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.
Full textDubrov-, Evgeniy, Aleksandr Ryazanov-, Aleksandr Sergeev-, and Yuriy Chernishyov-. "Research on applicability of bionic techniques of artificial bee colonies for implementation of classical transposition cipher cryptanalysis." Вестник Донского государственного технического университета 14, no. 1 (April 7, 2014): 62–75. http://dx.doi.org/10.12737/3505.
Full textS.G.Srikantaswamy, Author, and Prof H. D. Phaneendra. "A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques." International Journal of Computer Applications 29, no. 8 (September 29, 2011): 34–36. http://dx.doi.org/10.5120/3581-4960.
Full textBandjur, Milos. "Novel method of discrete message ciphering with equal length of message and cryptogram." Facta universitatis - series: Electronics and Energetics 16, no. 2 (2003): 251–58. http://dx.doi.org/10.2298/fuee0302251b.
Full textTarik Z.Ismaeel. "DESIGN & EVOLUTION OF A STEGANOGRAPHY SYSTEM FOR SPEECH SIGNAL BY SLANTLET TRANSFOR." Diyala Journal of Engineering Sciences 5, no. 2 (December 1, 2012): 99–113. http://dx.doi.org/10.24237/djes.2012.05208.
Full textBudiman, M. A., D. Rachmawati, and Jessica. "Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform." Journal of Physics: Conference Series 978 (March 2018): 012088. http://dx.doi.org/10.1088/1742-6596/978/1/012088.
Full textJara-Vera, Vicente, and Carmen Sánchez-Ávila. "Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy." Mathematics 8, no. 9 (September 8, 2020): 1536. http://dx.doi.org/10.3390/math8091536.
Full textRoy, Satyaki, Navajit Maitra, Shalabh Agarwal, Joyshree Nath, and Asoke Nath. "Ultra Encryption Standard Modified (UES) Version-I: Symmetric Key Cryptosystem With Multiple Encryption and Randomized Vernam Key Using Generalized Modified Vernam Cipher Method, Permutation Method, and Columnar Transposition Method." International Journal of Modern Education and Computer Science 4, no. 7 (July 9, 2012): 31–41. http://dx.doi.org/10.5815/ijmecs.2012.07.05.
Full textSgarro, Andrea. "Equivocations for transposition ciphers." Rivista di Matematica per le Scienze Economiche e Sociali 8, no. 2 (September 1985): 107–14. http://dx.doi.org/10.1007/bf02088768.
Full textGiddy, J. P. "Automated Cryptanalysis of Transposition Ciphers." Computer Journal 37, no. 5 (May 1, 1994): 429–36. http://dx.doi.org/10.1093/comjnl/37.5.429.
Full textSimkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (December 1, 2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.
Full textAl-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation." Engineering, Technology & Applied Science Research 9, no. 3 (June 8, 2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.
Full textAntal, Eugen, Peter Javorka, and Tomáš Hliboký. "Cryptanalysis of the Columnar Transposition Using Meta-Heuristics." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 39–60. http://dx.doi.org/10.2478/tmmp-2019-0005.
Full textKh Shakr Sabonchi, AuthorArkan, and Bahriye Akay. "A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers." Computer Systems Science and Engineering 39, no. 1 (2021): 87–106. http://dx.doi.org/10.32604/csse.2021.05365.
Full textSun, Wen Jie. "Research on General Permutation Encryption Module Based on Chaos Theory." Applied Mechanics and Materials 686 (October 2014): 381–87. http://dx.doi.org/10.4028/www.scientific.net/amm.686.381.
Full text