2019
DOI: 10.1007/978-3-030-22868-2_52
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cryptosystem Using Randomized Rail Fence Cipher for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…"thiscourseaimstoprovideyouwithdetailedknowledgeofimp ortanttechnologiesandapplicationthatareusedintheinternetdueto thebroadnatureofthisfieldthecoursecoversonlyselectedtopicsfo cussingfirstonsomeadvancedtopicsininternettechnologiesegwir elesslansmobileinternetmulticastandthenaselectionofcurrentan dnextgenerationapplicationsandservicesegppiptvvoip" Presented in Table XXI is the result of the frequency analysis of the encoded text using the traditional Polybius Square. Based on the result, the digraphs 15,44,24,33,34,43, and 11 have the most count of repeating codes in the encrypted text. If these values are converted using the traditional method, the decrypted values would be E, T, I, N, O, S, A, respectively.…”
Section: B Evaluation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…"thiscourseaimstoprovideyouwithdetailedknowledgeofimp ortanttechnologiesandapplicationthatareusedintheinternetdueto thebroadnatureofthisfieldthecoursecoversonlyselectedtopicsfo cussingfirstonsomeadvancedtopicsininternettechnologiesegwir elesslansmobileinternetmulticastandthenaselectionofcurrentan dnextgenerationapplicationsandservicesegppiptvvoip" Presented in Table XXI is the result of the frequency analysis of the encoded text using the traditional Polybius Square. Based on the result, the digraphs 15,44,24,33,34,43, and 11 have the most count of repeating codes in the encrypted text. If these values are converted using the traditional method, the decrypted values would be E, T, I, N, O, S, A, respectively.…”
Section: B Evaluation Methodsmentioning
confidence: 99%
“…A cipher algorithm is responsible for the encryption and decryption of the data [2]. Some of the classical ciphers found in the literature are ADFGX Cipher [6]- [8], Affine Cipher [8]- [11], Atbash Cipher [12], Auto-key Cipher [13], Baconian Cipher [8], [14], Base64 Cipher [15]- [17], Beaufort Cipher [8], Caesar Cipher [18]- [20], Enigma Machine Cipher [8], Four-square cipher [8], Grille Cipher [21], Hill cipher [22], Homophonic Substitution Cipher [23], [24], Permutation Cipher [8], Playfair Cipher [25]- [27], Polybius Cipher [28]- [32], and Rail fence Cipher [33], [34], among others.…”
Section: Introductionmentioning
confidence: 99%
“…After playfair substitution, transposition on the ciphertext is done. To perform this task, the railfence cipher [8] with a key of 3 for jumbling the ciphertext is used. In a transposition cipher, the order of the alphabets is re-arranged to obtain the cipher-text as follows:…”
Section: Proposed Approachmentioning
confidence: 99%
“…Rules for encoding and then decoding are similar to the existing playfair cipher. In EPC, two matrices alternatively are used for encoding of the digraph (pairs of two) and this work also uses the Rail-fence cipher [8] in the end to get the final ciphertext.…”
Section: Introductionmentioning
confidence: 99%
“…Various classical ciphers such as Railfence cipher [13], [14], Polybius square cipher [15]- [19], Playfair cipher [20]- [22], Permutation cipher [23], Homophonic substitution cipher [24], [25], Hill cipher [26], Grille cipher [27], Four-square cipher [23], Enigma machine cipher [23], Caesar cipher [28]- [30], Base64 cipher [31]- [33], Affine cipher [23], [34]- [36], and ADFGVX cipher [23], [37]- [39] to name some, are being incorporated with block ciphers, among others, to solve the constraints in IoT. Among the classical ciphers, the Polybius Cipher, known as the Polybius square, is identified as one of the commonly used methods for such purpose [40]- [42].…”
Section: Introductionmentioning
confidence: 99%