2017
DOI: 10.1680/jnaen.16.00001
|View full text |Cite
|
Sign up to set email alerts
|

Atbash cipher design for secure nanocommunication using QCA

Abstract: Quantum dot cellular automata (QCA) are a rising paradigm at the nanotechnology level that seems to be an alternative solution to complementary metal–oxide–semiconductor circuits. QCA have high device density, high switching speed and extremely low power consumption. The hardware architecture of cryptographic systems is a major issue in terms of power dissipation and circuit density in formulating secure nanocomputing channels. Cryptography can be the most promising application of QCA, which has not yet been m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…Some ciphers require the key to produce various transformations and substitutions, depending on the cipher being used [16]. Some of the classical ciphers found in the literature that are still being used today are ADFGX cipher [17]- [19], Affine cipher [19]- [22], Atbash cipher [23], Auto-key cipher [24], Baconian cipher [19], [25], Base64 cipher [26]- [28], Beaufort cipher [19], Caesar cipher [29]- [31], Grille cipher [32], Hill cipher [33], Homophonic Substitution cipher [34], [35], Playfair cipher [36]- [38], Polybius cipher [39], Railfence cipher [40], [41] and more. Among these, the Polybius cipher is considered to be one of the most widely used ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…Some ciphers require the key to produce various transformations and substitutions, depending on the cipher being used [16]. Some of the classical ciphers found in the literature that are still being used today are ADFGX cipher [17]- [19], Affine cipher [19]- [22], Atbash cipher [23], Auto-key cipher [24], Baconian cipher [19], [25], Base64 cipher [26]- [28], Beaufort cipher [19], Caesar cipher [29]- [31], Grille cipher [32], Hill cipher [33], Homophonic Substitution cipher [34], [35], Playfair cipher [36]- [38], Polybius cipher [39], Railfence cipher [40], [41] and more. Among these, the Polybius cipher is considered to be one of the most widely used ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…A cipher algorithm is responsible for the encryption and decryption of the data [2]. Some of the classical ciphers found in the literature are ADFGX Cipher [6]- [8], Affine Cipher [8]- [11], Atbash Cipher [12], Auto-key Cipher [13], Baconian Cipher [8], [14], Base64 Cipher [15]- [17], Beaufort Cipher [8], Caesar Cipher [18]- [20], Enigma Machine Cipher [8], Four-square cipher [8], Grille Cipher [21], Hill cipher [22], Homophonic Substitution Cipher [23], [24], Permutation Cipher [8], Playfair Cipher [25]- [27], Polybius Cipher [28]- [32], and Rail fence Cipher [33], [34], among others.…”
Section: Introductionmentioning
confidence: 99%