1993
DOI: 10.1080/0161-119391867872
|View full text |Cite
|
Sign up to set email alerts
|

An Automated Approach to Solve Simple Substitution Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2004
2004
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…A transposition cipher hides information by reordering the letters of the message. In a transposition cipher the plaintext remains the same, but the order of characters is shuffled around [13]. Thus the frequency analysis on the ciphertext would reveal that each letter has approximately the same [11].…”
Section: Encrypting Messagementioning
confidence: 99%
See 1 more Smart Citation
“…A transposition cipher hides information by reordering the letters of the message. In a transposition cipher the plaintext remains the same, but the order of characters is shuffled around [13]. Thus the frequency analysis on the ciphertext would reveal that each letter has approximately the same [11].…”
Section: Encrypting Messagementioning
confidence: 99%
“…Steganography is the invisible communication between the sender and the receiver [14]. In Steganography, only the sender and the receiver know the existence of the message, whereas in cryptography the existence of the encrypted message is visible to the world [13]. For this reason, steganography removes the unwanted attention coming to the media in which the message is hidden [30].…”
Section: Introductionmentioning
confidence: 99%
“…substitution method, A substitution cipher substitutes one piece of information for another. In substitution cipher each character in the plaintext is substituted for another character in the ciphertext [13]. Such ciphertext could be transmitted across a network or stored within a file system with the disguise serving to provide confidentiality [25].…”
Section: Encrypting Messagementioning
confidence: 99%
“…Steganography is the invisible communication between the sender and the receiver [14]. In Steganography, only the sender and the receiver know the existence of the message, whereas in cryptography the existence of the encrypted message is visible to the world [13]. Due to this, Steganography removes the unwanted attention coming to the media in which the message is hidden.…”
Section: Introductionmentioning
confidence: 99%
“…Also worth mentioning are the articles by Ganesan and Sherman (1993), which proposed new probability distributions to help in automatically distinguishing between a given language and random text, very useful for key exhaustion, and the paper by Cain and Sherman (1994), where the authors broke the Gifford stream cipher. Ramesh, Athithan, and Thiruvengadam (1993) proposed a very original patterns-based attack against simple substitution ciphers.…”
Section: State Of the Artmentioning
confidence: 99%