2019
DOI: 10.17798/bitlisfen.455126
|View full text |Cite
|
Sign up to set email alerts
|

Türkçe Karakter Destekli Genişletilmiş Kayan Polybius Karesi ile Şifrelenmiş Veriyi Gömme

Abstract: The security of a message transmitted from one peer to another is a matter of many studies over centuries. Today, with digital communication, billions of data are transmitted from one point to another every milisecond. That is why data security has become one of the most studied topics. In this study, an ancient encryption method called Polybius square which has been a source of inspiration for today's encryption methods is introduced. In addition an expanded version of Polybius square was developed adding Tur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…An extended Polybius Square presented in [15] works by integrating Turkish characters in a 10x7 grid. The extended version also introduced a dynamic matrix wherein elements of a matrix shift values depending on a numeric value.…”
Section: Embedding Data Crypted With Extended Shifting Polybius Square Supporting Turkish Character Setmentioning
confidence: 99%
See 1 more Smart Citation
“…An extended Polybius Square presented in [15] works by integrating Turkish characters in a 10x7 grid. The extended version also introduced a dynamic matrix wherein elements of a matrix shift values depending on a numeric value.…”
Section: Embedding Data Crypted With Extended Shifting Polybius Square Supporting Turkish Character Setmentioning
confidence: 99%
“…Various classical ciphers such as Railfence cipher [13], [14], Polybius square cipher [15]- [19], Playfair cipher [20]- [22], Permutation cipher [23], Homophonic substitution cipher [24], [25], Hill cipher [26], Grille cipher [27], Four-square cipher [23], Enigma machine cipher [23], Caesar cipher [28]- [30], Base64 cipher [31]- [33], Affine cipher [23], [34]- [36], and ADFGVX cipher [23], [37]- [39] to name some, are being incorporated with block ciphers, among others, to solve the constraints in IoT. Among the classical ciphers, the Polybius Cipher, known as the Polybius square, is identified as one of the commonly used methods for such purpose [40]- [42].…”
Section: Introductionmentioning
confidence: 99%