2020 International Conference on Intelligent Systems and Computer Vision (ISCV) 2020
DOI: 10.1109/iscv49265.2020.9204095
|View full text |Cite
|
Sign up to set email alerts
|

Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 22 publications
0
9
0
2
Order By: Relevance
“…It has two consecutive similar characters in different blocks. The results showed the coherence between these two methods that created a reliable hybrid algorithm, with resistance to various attacks, including statistical attacks [ 11 ]. (Nahar & Chakraborty, 2020) presented a technique for organizing the plain text transversely in the Rail Fence method, so that reading it from the upper row to the lower row leads to the production of the ciphertext.…”
Section: Literature Reviewmentioning
confidence: 95%
“…It has two consecutive similar characters in different blocks. The results showed the coherence between these two methods that created a reliable hybrid algorithm, with resistance to various attacks, including statistical attacks [ 11 ]. (Nahar & Chakraborty, 2020) presented a technique for organizing the plain text transversely in the Rail Fence method, so that reading it from the upper row to the lower row leads to the production of the ciphertext.…”
Section: Literature Reviewmentioning
confidence: 95%
“…Through this method, the user can use a simple passphrase to remember without passing a complex one to increase the security level, because in any case, a rotation of the generated hash will provide an additional layer of security [31,32].…”
Section: Explanation Of Rotation Methodsmentioning
confidence: 99%
“…The defects of this cipher are that it is easy to detect the size of the key to start a statistical attack and two same letters are located at the same place at different blocks which makes the cipher weak. So, by combining these two algorithms an unfailing hybrid algorithm will be obtained, which will help in resisting the attacks including statistical attacks [18].…”
Section: Technique -3mentioning
confidence: 99%