2019
DOI: 10.1088/1742-6596/1361/1/012001
|View full text |Cite
|
Sign up to set email alerts
|

Application of Linear Congruent Generator in Affine Cipher Algorithm to Produce Dynamic Encryption

Abstract: Modification of the original message (plaintext) with the LCG random number generator algorithm and encryption with the affine cipher algorithm to produces a dynamic and safe random message (ciphertext) compared to just the affine cipher algorithm. The plaintext is converted to ASCII code and stored in a data list. The data list that contain the plaintext changes the position of the data where each plaintext column is moved to an odd column and even columns are filled by random numbers generated by LCG. The da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…The fundamental functions in cryptography are encryption and decryption [16], [17]. a. Encryption Encryption is the process of changing an original message (plaintext) into a message in coded language (ciphertext) [18], [19]. Encryption is part of cryptography and is very important so that the security of the data sent can be kept confidential [20].…”
Section: Cryptographic Work Systemmentioning
confidence: 99%
“…The fundamental functions in cryptography are encryption and decryption [16], [17]. a. Encryption Encryption is the process of changing an original message (plaintext) into a message in coded language (ciphertext) [18], [19]. Encryption is part of cryptography and is very important so that the security of the data sent can be kept confidential [20].…”
Section: Cryptographic Work Systemmentioning
confidence: 99%
“…Various classical ciphers such as Railfence cipher [13], [14], Polybius square cipher [15]- [19], Playfair cipher [20]- [22], Permutation cipher [23], Homophonic substitution cipher [24], [25], Hill cipher [26], Grille cipher [27], Four-square cipher [23], Enigma machine cipher [23], Caesar cipher [28]- [30], Base64 cipher [31]- [33], Affine cipher [23], [34]- [36], and ADFGVX cipher [23], [37]- [39] to name some, are being incorporated with block ciphers, among others, to solve the constraints in IoT. Among the classical ciphers, the Polybius Cipher, known as the Polybius square, is identified as one of the commonly used methods for such purpose [40]- [42].…”
Section: Introductionmentioning
confidence: 99%
“…Some ciphers require the key to produce various transformations and substitutions, depending on the cipher being used [16]. Some of the classical ciphers found in the literature that are still being used today are ADFGX cipher [17]- [19], Affine cipher [19]- [22], Atbash cipher [23], Auto-key cipher [24], Baconian cipher [19], [25], Base64 cipher [26]- [28], Beaufort cipher [19], Caesar cipher [29]- [31], Grille cipher [32], Hill cipher [33], Homophonic Substitution cipher [34], [35], Playfair cipher [36]- [38], Polybius cipher [39], Railfence cipher [40], [41] and more. Among these, the Polybius cipher is considered to be one of the most widely used ciphers.…”
Section: Introductionmentioning
confidence: 99%