2020
DOI: 10.14421/icse.v3.595
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography: A Combination of Caesar and Affine Cipher to Conceal the Message

Abstract: Advances in technology make it easy for humans to communicate with each other. One of them is by sending messages. However, the confidentiality of messages can be hacked by third parties. Therefore, it is necessary to secure the messages sent so that confidentiality can be maintained. One way that can be done to maintain message security is cryptography. Classical cryptography has several types of algorithms including caesar cipher and affine cipher. The purpose of this study is to combine caesar cipher and af… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…One way to maintain the security of confidential data or information is to use cryptography [2]. Cryptography is an encryption technique in which "original text" (plaintext) can be scrambled using an encryption key to become "random text that is hard to read" (ciphertext) [3]- [5]. Cryptography has many methods, namely hill cipher and Rivest Cipher 4 (RC4) [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…One way to maintain the security of confidential data or information is to use cryptography [2]. Cryptography is an encryption technique in which "original text" (plaintext) can be scrambled using an encryption key to become "random text that is hard to read" (ciphertext) [3]- [5]. Cryptography has many methods, namely hill cipher and Rivest Cipher 4 (RC4) [6]- [8].…”
Section: Introductionmentioning
confidence: 99%
“…Data security has become the focus of research by scientists in the field of technology and information in this modern era. Therefore, a technique called encryption and decryption to secure data and information has emerged to communicate privately and maintain data confidentiality in the field of cryptography [3] [4].…”
Section: Introductionmentioning
confidence: 99%
“…The system used to intensify the security over communication uses cryptology for its effectiveness. There is much advancement in this field where the combination of Hill cipher and Elliptic curve cryptosystem (ECC), the combination of Affine and Hill cipher (6) (10) has been witnessed to ensure that the security is magnified (2)(4)(5) (7) (8) (9). Elliptic Curve Cryptography (ECC) is one of the fields in cryptography that include Elliptic curves and points on it in a defined manner for performing encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%