2019
DOI: 10.1007/978-3-030-33585-4_55
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach to Overcome Dictionary and Plaintext Attack in SMS Encryption and Decryption Using Vignere Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
1
0
Order By: Relevance
“…However, the proposed algorithm Vigenere table is limited to alphabet characters only and is unable to encrypt messages containing the number and special symbols. In addition to this, the author does not use schematic flowcharts to clarify for readers, especially for those who are new to cryptography.The Author [13], presented a novel approach to overcome the dictionary and plaintext attack in SMS encryption and decryption using the Vigenere cipher. The proposed algorithm use number of any base as a key to overcome the dictionary attack and reduce the table from 26 x 26 to 26 x n where n depends on the base of the key.…”
Section: Hybrid Cryptosystemmentioning
confidence: 99%
“…However, the proposed algorithm Vigenere table is limited to alphabet characters only and is unable to encrypt messages containing the number and special symbols. In addition to this, the author does not use schematic flowcharts to clarify for readers, especially for those who are new to cryptography.The Author [13], presented a novel approach to overcome the dictionary and plaintext attack in SMS encryption and decryption using the Vigenere cipher. The proposed algorithm use number of any base as a key to overcome the dictionary attack and reduce the table from 26 x 26 to 26 x n where n depends on the base of the key.…”
Section: Hybrid Cryptosystemmentioning
confidence: 99%
“…A single page was utilised in record-level extraction errands, using strategies like the TPC [15], the MDR [12], RST, ViNTs, ViPER [10], ViDE [13], and STEM [11]. These methods approximately were spitted into groups: the methods based on HTML [10], [11], [5], [7], [15], and the approaches relied on the vision [12], [3], [4], [8], and [18].…”
Section: Related Workmentioning
confidence: 99%