A study of caesar cipher and transposition cipher in jawi messages
Cryptography known as art and science which is used to hide the messages that contain a few policy terminologies. These terminologies in cryptography are plaintext/ messages, ciphertext, encryption, decryption and key. Encryption is a proses to transform the plaintext together with key into cipherte...
| Main Authors: | Mohd Lokman, Syiham, Chuah, Chai Wen, Ab. Rahman, Nurul Hidayah Binti, A. Hamid, Isredza Rahmi Binti |
|---|---|
| Format: | Article |
| Published: |
American Scientific Publishers
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/5362/ |
Similar Items
Visual execution of caesar cipher methods and its application
by: Nur Syafiqa, Ismail
Published: (2014)
by: Nur Syafiqa, Ismail
Published: (2014)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Polyalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Monoalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A new 128-bit block cipher
by: Mohd Ali, Fakariah Hani
Published: (2009)
by: Mohd Ali, Fakariah Hani
Published: (2009)
A block cipher based on genetic algorithm
by: Zakaria, Nur Hafiza
Published: (2016)
by: Zakaria, Nur Hafiza
Published: (2016)
Fault Analysis of the KATAN Family of Block Ciphers
by: Abdul Latip, Shekh Faisal
Published: (2012)
by: Abdul Latip, Shekh Faisal
Published: (2012)
Hardware implementation of RC4A stream cipher
by: Al Noman, Abdullah, et al.
Published: (2009)
by: Al Noman, Abdullah, et al.
Published: (2009)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Effect of self-invertible matrix on cipher hexagraphic polyfunction
by: Lin, Sally Pei Ching, et al.
Published: (2019)
by: Lin, Sally Pei Ching, et al.
Published: (2019)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
New DNA based dynamical S-Box for block cipher
by: Chng, Chern Wei, et al.
Published: (2018)
by: Chng, Chern Wei, et al.
Published: (2018)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Efficient dynamic DNA-based block cipher algorithm
by: Chng, Chern Wei
Published: (2023)
by: Chng, Chern Wei
Published: (2023)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Similar Items
-
Visual execution of caesar cipher methods and its application
by: Nur Syafiqa, Ismail
Published: (2014) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010) -
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005) -
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)