2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) 2021
DOI: 10.1109/iiceta51758.2021.9717757
|View full text |Cite
|
Sign up to set email alerts
|

Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…The techniques are extremely sensitive to changes in starting point, parameters used for control, periods, ergodicity, and even the appearance of randomness. The term "cryptography" refers to either the practice of encrypting data or the study of how such data is encrypted [4]. Before being transmitted via public networks, the actual data are first transformed into a representation that is meaningless without additional information.…”
Section: Introductionmentioning
confidence: 99%
“…The techniques are extremely sensitive to changes in starting point, parameters used for control, periods, ergodicity, and even the appearance of randomness. The term "cryptography" refers to either the practice of encrypting data or the study of how such data is encrypted [4]. Before being transmitted via public networks, the actual data are first transformed into a representation that is meaningless without additional information.…”
Section: Introductionmentioning
confidence: 99%
“…Compared to symmetric encryption, the problem of sharing encryption keys is circumvented by using asymmetric encryption, meanwhile, the self-contained method is slower and requires more computational [1]. Substitution, transposition, the hill cipher, the Play fair cipher, Vigener, and other ciphers are examples of symmetric keys [2]. The term "asymmetric key" describes a system in which two different keys, one private and one public, are used for encryption and decryption [3,4].…”
Section: Introductionmentioning
confidence: 99%