2016
DOI: 10.1080/01611194.2015.1087074
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of columnar transposition cipher with long keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 4 publications
0
6
0
1
Order By: Relevance
“…Autokey cipher merupakan salah satu algoritma yang menerapkan teknik substitusi dan memiliki tingkat keamanan yang cukup baik dibanding dengan algoritma teknik substitusi lainnya, seperti caesar maupun viginere cipher [13]. Sedangkan, transposisi kolom merupakan algoritma kriptografi kunci simetris yang memiliki prinsip kerja dengan menggantikan posisi karakter yang akan disandikan tanpa mengganti atau merubah karakter tersebut [14]. Dalam penelitian ini, pendekatan Avalanche Effect digunakan sebagai alat ukur model super enkripsi yang diusulkan.…”
Section: Pendahuluanunclassified
“…Autokey cipher merupakan salah satu algoritma yang menerapkan teknik substitusi dan memiliki tingkat keamanan yang cukup baik dibanding dengan algoritma teknik substitusi lainnya, seperti caesar maupun viginere cipher [13]. Sedangkan, transposisi kolom merupakan algoritma kriptografi kunci simetris yang memiliki prinsip kerja dengan menggantikan posisi karakter yang akan disandikan tanpa mengganti atau merubah karakter tersebut [14]. Dalam penelitian ini, pendekatan Avalanche Effect digunakan sebagai alat ukur model super enkripsi yang diusulkan.…”
Section: Pendahuluanunclassified
“…This method is not secure against ciphertext-only attack (COA). 54 Low complexity security algorithm (LSA) is a different data security research method. 55 The progress of the nodes is the first step.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Another major issue of data security in WSNs is that the existing data encryption approaches have either very high response time or high computational time. AES-HECC 54 has high computation time and EGASON 1 led to high response time. A new secure algorithm that will consume less computational time and less response time is introduced.…”
Section: Motivationmentioning
confidence: 99%
“…Then, the columns are permutated based on the key. The letters are read column by column to create the ciphertext [16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Double or multiple columnar ciphers are used to improve the security of the single columnar cipher. The same key can be applied, or other keys are required in multiple rounds of the columnar cipher process [18]. Myszkowski is a variation of the columnar cipher with a key of repeated letters that are given the same order.…”
Section: Introductionmentioning
confidence: 99%