2018
DOI: 10.1088/1742-6596/978/1/012086
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 4 publications
0
3
0
3
Order By: Relevance
“…An insecure classical cryptography algorithm is used in the Zig-zag Cipher algorithm. This is supported by research that shows that the Zig-zag Cipher algorithm is more difficult [6].…”
Section: Figure 12: Example How To Work Reverse Cipher 43 Zig-zag Ciphermentioning
confidence: 84%
See 1 more Smart Citation
“…An insecure classical cryptography algorithm is used in the Zig-zag Cipher algorithm. This is supported by research that shows that the Zig-zag Cipher algorithm is more difficult [6].…”
Section: Figure 12: Example How To Work Reverse Cipher 43 Zig-zag Ciphermentioning
confidence: 84%
“…The number of rows specifies the number of digits in the key used in the zig-zag cipher algorithm by using row transpositions, and when using transposition columns, it is determined by the number of columns [6].…”
Section: Figure 12: Example How To Work Reverse Cipher 43 Zig-zag Ciphermentioning
confidence: 99%
“…Salah satu cara yang dapat digunakan untuk mengatasi kelemahan algoritma kriptografi dasar tersebut adalah melalui perpaduan antara teknik substitusi dan transposisi. Cara tersebut dikenal dengan istilah model super enkripsi [7], [8].…”
Section: Pendahuluanunclassified
“…The RC4 + algorithm strengthens the keys used by adding some operations used to the RC4 structure. However, one of the advantages of this algorithm is to implement the bit shift process as the final process of generating the key used [12]. The RC4 + algorithm has two main parts, are the Key Scheduling Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA).…”
Section: Rc4+ Algorithmmentioning
confidence: 99%