2019 7th International Conference on Cyber and IT Service Management (CITSM) 2019
DOI: 10.1109/citsm47753.2019.8965378
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Trifid Cipher Algorithm in Securing Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…"thiscourseaimstoprovideyouwithdetailedknowledgeofimp ortanttechnologiesandapplicationthatareusedintheinternetdueto thebroadnatureofthisfieldthecoursecoversonlyselectedtopicsfo cussingfirstonsomeadvancedtopicsininternettechnologiesegwir elesslansmobileinternetmulticastandthenaselectionofcurrentan dnextgenerationapplicationsandservicesegppiptvvoip" Presented in Table XXI is the result of the frequency analysis of the encoded text using the traditional Polybius Square. Based on the result, the digraphs 15,44,24,33,34,43, and 11 have the most count of repeating codes in the encrypted text. If these values are converted using the traditional method, the decrypted values would be E, T, I, N, O, S, A, respectively.…”
Section: B Evaluation Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…"thiscourseaimstoprovideyouwithdetailedknowledgeofimp ortanttechnologiesandapplicationthatareusedintheinternetdueto thebroadnatureofthisfieldthecoursecoversonlyselectedtopicsfo cussingfirstonsomeadvancedtopicsininternettechnologiesegwir elesslansmobileinternetmulticastandthenaselectionofcurrentan dnextgenerationapplicationsandservicesegppiptvvoip" Presented in Table XXI is the result of the frequency analysis of the encoded text using the traditional Polybius Square. Based on the result, the digraphs 15,44,24,33,34,43, and 11 have the most count of repeating codes in the encrypted text. If these values are converted using the traditional method, the decrypted values would be E, T, I, N, O, S, A, respectively.…”
Section: B Evaluation Methodsmentioning
confidence: 99%
“…Its ability to convert letter sequences to numeric sequences, reduce the number of different characters, and allow encoding of plaintext into two separately manipulatable units are known to be its advantages [6], [38]. Further, the Polybius square has paved the way to the development and processes of other classical ciphers that are still used today such as ADFGVX Cipher [8], [39]- [41], Bifid cipher [8], [42], Nihilist cipher [43], and Trifid cipher [44], [35]. Furthermore, modern cryptographic systems have embedded the Polybius square as a fundamental component of the cryptographic process, such as in the key generation procedures used by modern ciphers like the advance encryption standard (AES), data encryption standard (DES), and other algorithms [2], [39], [40], [45]- [50].…”
Section: Introductionmentioning
confidence: 99%