Analysis of four historical ciphers against known plaintext frequency statistical attack
The need of keeping information securely began thousands of years. The practice to keep the information securely is by scrambling the message into unreadable form namely ciphertext. This process is called encryption. Decryption is the reverse process of encryption. For the past, historical ciphers a...
| Main Authors: | Wen, Chuah Chai, Samylingam, Vivegan A/L, Darmawan, Irfan, Palaniappan, P.Siva Shamala A/P, Mohd. Foozy, Cik Feresa, Ramli, Sofia Najwa, Alawatugoda, Janaka |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTHM
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/3677/ http://eprints.uthm.edu.my/3677/1/AJ%202018%20%28718%29%20Analysis%20of%20four%20historical%20ciphers%20against%20known%20plaintext%20frequency%20statistical%20attack.pdf |
Similar Items
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)
by: Koo, Lee Feng, et al.
Published: (2019)
Customer profiling using classification approach for bank telemarketing
by: Palaniappan, Shamala, et al.
Published: (2017)
by: Palaniappan, Shamala, et al.
Published: (2017)
You tube spam comment detection using support vector machine and k–nearest neighbor
by: Aziz, Aqliima, et al.
Published: (2017)
by: Aziz, Aqliima, et al.
Published: (2017)
Backdoor attack detection based on stepping stone detection approach
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014)
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014)
Distributed denial of service detection using stepping stone detection method in internet control message protocol attack
by: Nor Izham, Subri
Published: (2017)
by: Nor Izham, Subri
Published: (2017)
A novel algorithm to prevent man in the middle attack in LAN environment
by: Ahmed , Mohiuddin, et al.
Published: (2010)
by: Ahmed , Mohiuddin, et al.
Published: (2010)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Sistem inventori makmal komputer Jabatan Teknologi Maklumat, Pusat Pengajian Diploma, Uthm (E–Ventori)
by: Roslan, Rosfuzah, et al.
Published: (2017)
by: Roslan, Rosfuzah, et al.
Published: (2017)
Resident’s personality traits on acceptance of information system: Case study of Majlis Perbandaran Sungai Petani (MPSPK)
by: Mohd Zool Hilmie, Mohamed Sawal
Published: (2021)
by: Mohd Zool Hilmie, Mohamed Sawal
Published: (2021)
Internal service quality in IT service management: insights from the perspective of IT service employees
by: Puteri Shariza, Megat Khalid
Published: (2021)
by: Puteri Shariza, Megat Khalid
Published: (2021)
Report of job done on preventing ransomware virus attack to PC
by: Mustafa, mohd mizam, et al.
Published: (2017)
by: Mustafa, mohd mizam, et al.
Published: (2017)
Moderating effects of organizational culture on the relationship between emotional intelligence, work motivation and work commitment
by: Irfan, Saira
Published: (2018)
by: Irfan, Saira
Published: (2018)
AGW 616 - MANAGEMENT INFORMATION SYSTEM APRIL 08.
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
by: PPP, Pusat Pengajian Pengurusan
Published: (2008)
Kajian Terhadap Proses Penjanaan Pengetahuan Dalam Kaedah - Kaedah Pengajaran Ekspositori Dan Pembelajaran Berasaskan Masalah Berbantukan Sistem Pengurusan Pembelajaran
by: Ahmad, Mazida
Published: (2010)
by: Ahmad, Mazida
Published: (2010)
CSK202 - TEKNOLOGI MAKLUMAT - OKT-NOVEMBER 1992.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1992)
Himpunan Modul TMK Untuk Sekolah Siri 2
by: Abu Ziden, Azidah, et al.
Published: (2016)
by: Abu Ziden, Azidah, et al.
Published: (2016)
Development of industrial training assessment system (iTAS) 2.0: a step forward to educator 4.0
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
Network device ad-blocker
by: Mohamad, Juhaina, et al.
Published: (2020)
by: Mohamad, Juhaina, et al.
Published: (2020)
Poket Musafir: a guide for smart muslim travelers
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
by: Mohd Hanifa, Rafizah, et al.
Published: (2020)
Shooter’s personal performance application
by: Hanip, Muhammad Izzul, et al.
Published: (2020)
by: Hanip, Muhammad Izzul, et al.
Published: (2020)
1001 resipi: laman web perkongsian resipi
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
by: Pau, Nazrin Seng Kiat, et al.
Published: (2020)
Titanium dioxide film based photocatalytic application for degradation of dyes
by: Abd Hamed, Noor Kamalia, et al.
Published: (2019)
by: Abd Hamed, Noor Kamalia, et al.
Published: (2019)
Creating a GUI solver for linear programming models in MATLAB
by: Siaw, Chong Lee, et al.
Published: (2018)
by: Siaw, Chong Lee, et al.
Published: (2018)
Introduction of database concept courseware evaluation using one-group pre-test post-test experimental design
by: Bahrudin, Ida Aryanie, et al.
Published: (2017)
by: Bahrudin, Ida Aryanie, et al.
Published: (2017)
Penggunaan teknologi maklumat dalam pengurusan di Sekolah Menengah Bestari
by: Md Yusoff, Ros Saidatunnaziah
Published: (2004)
by: Md Yusoff, Ros Saidatunnaziah
Published: (2004)
Pengetahuan dan kemahiran teknologi maklumat dan komunikasi di kalangan pensyarah jabatan perdagangan politeknik: satu tinjauan
by: Isnin, Sabrina
Published: (2003)
by: Isnin, Sabrina
Published: (2003)
Pembangunan dan pengujian aktiviti pembelajaran berasaskan MOOC untuk kursus diagnous dan senggaraan audio video
by: Subramaniam, Tamil Selvan, et al.
Published: (2018)
by: Subramaniam, Tamil Selvan, et al.
Published: (2018)
Pembangunan aplikasi mudahalih android “Moneytracker"
by: Nathan, Shelena Soosay, et al.
Published: (2017)
by: Nathan, Shelena Soosay, et al.
Published: (2017)
Pembangunan aplikasi android untuk mempelajari tulisan jawi secara M-learning
by: Mohamed Ali @ Md Hani, Mohd Hatta, et al.
Published: (2017)
by: Mohamed Ali @ Md Hani, Mohd Hatta, et al.
Published: (2017)
Pemantauan keselamatan aset dan kenderaan menggunakan teknologi radio frequency identification (RFID)
by: Omar, Abdul Halim, et al.
Published: (2017)
by: Omar, Abdul Halim, et al.
Published: (2017)
Pembangunan aplikasi sistem penasihat pakar dalam dagangan mata wang GBPUSD menggunakan pergerakan purata eksponen (EMA) dan pengayun stokastik
by: Surip, Miswan, et al.
Published: (2017)
by: Surip, Miswan, et al.
Published: (2017)
Pembangunan sistem tempahan online kerepek (STOK)
by: Kassim, Noordiana, et al.
Published: (2017)
by: Kassim, Noordiana, et al.
Published: (2017)
Pembangunan CD interaktif: penasihat kesihatan anda bagi Pusat Kesihatan Universiti (PKU)
by: Md Yasin, Mohd Suhaimi, et al.
Published: (2017)
by: Md Yasin, Mohd Suhaimi, et al.
Published: (2017)
Pembangunan perisian kursus bahasa perancis sebagai alat bantu pembelajaran kendiri
by: Ramle, Rosni, et al.
Published: (2017)
by: Ramle, Rosni, et al.
Published: (2017)
Pembangunan sistem tempahan jahitan baju (E-tailor) dengan peringatan
by: Abdul Hamid, Mariam, et al.
Published: (2017)
by: Abdul Hamid, Mariam, et al.
Published: (2017)
Is disclosure of information technology (IT) internal control weaknesses worthwhile for firms?
by: Kusumaningtias, Rohmawati, et al.
Published: (2020)
by: Kusumaningtias, Rohmawati, et al.
Published: (2020)
Information technology: a tool for effective SME material management practices
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
by: Ibrahim, Magaji Umar, et al.
Published: (2019)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
The evaluation of information security of hospital information system (his) using cobit 5 framework: case study at Soreang Hospital, Indonesia
by: Nistrina, Khilda
Published: (2019)
by: Nistrina, Khilda
Published: (2019)
Model Reka Bentuk Konseptual Operasian Storan Data Bagi Aplikasi Kepintaran Perniagaan
by: Muhamad Shahbani, Abu Bakar
Published: (2012)
by: Muhamad Shahbani, Abu Bakar
Published: (2012)
Similar Items
-
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019) -
Customer profiling using classification approach for bank telemarketing
by: Palaniappan, Shamala, et al.
Published: (2017) -
You tube spam comment detection using support vector machine and k–nearest neighbor
by: Aziz, Aqliima, et al.
Published: (2017) -
Backdoor attack detection based on stepping stone detection approach
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014) -
Distributed denial of service detection using stepping stone detection method in internet control message protocol attack
by: Nor Izham, Subri
Published: (2017)