2018
DOI: 10.1088/1742-6596/1028/1/012053
|View full text |Cite
|
Sign up to set email alerts
|

Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Some ciphers require the key to produce various transformations and substitutions, depending on the cipher being used [16]. Some of the classical ciphers found in the literature that are still being used today are ADFGX cipher [17]- [19], Affine cipher [19]- [22], Atbash cipher [23], Auto-key cipher [24], Baconian cipher [19], [25], Base64 cipher [26]- [28], Beaufort cipher [19], Caesar cipher [29]- [31], Grille cipher [32], Hill cipher [33], Homophonic Substitution cipher [34], [35], Playfair cipher [36]- [38], Polybius cipher [39], Railfence cipher [40], [41] and more. Among these, the Polybius cipher is considered to be one of the most widely used ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…Some ciphers require the key to produce various transformations and substitutions, depending on the cipher being used [16]. Some of the classical ciphers found in the literature that are still being used today are ADFGX cipher [17]- [19], Affine cipher [19]- [22], Atbash cipher [23], Auto-key cipher [24], Baconian cipher [19], [25], Base64 cipher [26]- [28], Beaufort cipher [19], Caesar cipher [29]- [31], Grille cipher [32], Hill cipher [33], Homophonic Substitution cipher [34], [35], Playfair cipher [36]- [38], Polybius cipher [39], Railfence cipher [40], [41] and more. Among these, the Polybius cipher is considered to be one of the most widely used ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…A cipher algorithm is responsible for the encryption and decryption of the data [2]. Some of the classical ciphers found in the literature are ADFGX Cipher [6]- [8], Affine Cipher [8]- [11], Atbash Cipher [12], Auto-key Cipher [13], Baconian Cipher [8], [14], Base64 Cipher [15]- [17], Beaufort Cipher [8], Caesar Cipher [18]- [20], Enigma Machine Cipher [8], Four-square cipher [8], Grille Cipher [21], Hill cipher [22], Homophonic Substitution Cipher [23], [24], Permutation Cipher [8], Playfair Cipher [25]- [27], Polybius Cipher [28]- [32], and Rail fence Cipher [33], [34], among others.…”
Section: Introductionmentioning
confidence: 99%