2013
DOI: 10.5120/13803-1836
|View full text |Cite
|
Sign up to set email alerts
|

An Extended Version of the Polybius Cipher

Abstract: This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only. For this reason, we have proposed an improvement to the existing Polybius cipher, in which an 8X8 matrix can be cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 3 publications
0
16
0
1
Order By: Relevance
“…Cryptography is the science of creating secret codes; Cryptanalysis is the science of breaking codes. These two aspects are closely related; when creating a secret code the analysis of its security plays an important role [3]. It has been an interesting part to understand.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography is the science of creating secret codes; Cryptanalysis is the science of breaking codes. These two aspects are closely related; when creating a secret code the analysis of its security plays an important role [3]. It has been an interesting part to understand.…”
Section: Introductionmentioning
confidence: 99%
“…To encrypt a word; every letter of the word is shown as number of the row and column in the square. For example; The letter 'D' is encrypted as '14' and the letter 'S' as '43' [4]. When the POLYBIUS word is encrypted, ciphertext string is created with the line and column numbers as in Table 2.…”
Section: Methodsmentioning
confidence: 99%
“…• Since the letters I and J are encrypted with the same code, the decoder must interpret them. For this reason, there is a possibility of error in decryption [4]. An impoved version of Polybius encryption is developed in this study which uses a shifting key to get rid of those weaknesses.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…To clarify the role of conduction electron, we divide the electron charge density p(r) into two parts, where q and R , are effective charge of m-th atom and P (r) =Pin(') +P c(r) ( 4 ) Consequently atomic distance from Fe nucleus to CO be divided into two atom plays very important role in determining the electric field Thereby the influence of CO atom to electric field gradient in Fe I1 site should be concluded to be much smaller than that in Fe I site because of the term of I R , I -3. This means that the change in Q.S.…”
Section: Sitementioning
confidence: 99%