[PDF][PDF] Modified Vigenère cipher algorithm based on new key generation method

TH Hameed, HT Sadeeq - Indonesian Journal of Electrical …, 2022 - academia.edu
Nowadays, as communication and network technologies evolve in modern life, ensuring the
confidentiality of a cryptography system has become a critical requirement. The Vigenère …

[PDF][PDF] A modified Vigenère Cipher based on time and Biometrics features

BA Esttaifan - Journal of Engineering, 2023 - iasj.net
Biometrics is widely used with security systems nowadays; each biometric modality can be
useful and has distinctive properties that provide uniqueness and ambiguity for security …

[PDF][PDF] Extended vigenère using double transposition cipher with one time pad cipher

A Priyam - Intl J Engg Sci Adv Research, 2015 - ramauniversityjournal.com
Cryptography is a technique which converts any intelligible message into unintelligible
message; it is used for secure communication between any two parties in any insecure …

Modification of Vigenère Cipher to Overcome Kasiski and Friedman Attacks

AS Bale, N Ghorpade, K Bhagya… - … on Circuits, Power …, 2023 - ieeexplore.ieee.org
Since the advent of wireless communication, the safe transmission of data from one point to
another has been of prime significance and concern. As a result, many algorithms have …

A crypto-stegano hybrid application on spatial domain

HB Macit - Bayburt Üniversitesi Fen Bilimleri Dergisi, 2022 - dergipark.org.tr
Gelişen teknoloji ile birlikte iletişimde veri güvenliği ihtiyacı artmaktadır. Veri güvenliğini
sağlamanın en iyi yolu kriptografidir. İnsanlık yüzlerce yıldır birçok kriptografi yöntemi önerdi …

A message encryption scheme inspired by Sudoku puzzle

SR Masadeh, HA Al-Sewadi… - … Journal of Information …, 2023 - inderscienceonline.com
Lightweight cryptographic systems are recently sought for applications with limited
computation capabilities, storage space, and power constraints. Such applications include …

Implementation of Traditional Transposition Cipher with Salting Principle

MJP Tiozon, JR Paragas… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Transposition Cipher was the most often used conventional cipher in the early days because
it was resistant to frequency analysis. The purpose of this study is to provide another way of …

Steganography Application Bitwise Method of Encrypted Message with Vigenere Cipher

N Agani, CVB Saragih, C Simon - eprints.binadarma.ac.id
Computer security has become a very serious problem. It has been reported that according
to the United States Department of Defense (DoD) in 1996 has been es timated there are …

[PDF][PDF] PERANCANGAN APLIKASI PENGAMANAN INFORMASI TEKS DENGAN MENGGUNAKAN ALGORITMA KRIPTOGRAFI ALPHA-QWERTY REVERSE

ME Putra, S Suroso, A Wasti - Jurnal Elektro dan …, 2017 - journals.telkomuniversity.ac.id
Alpha-qwerty reverse merupakan salah satu bagian dari algoritma kriptografi klasik yang
berfungsi sebagai pengamanan informasi dengan melakukan penyandian terhadap …

[PDF][PDF] A Novel Polygon Cipher Technique using hybrid key Scheme

SR Masadeh, HAA Al_Sewadi - International …, 2016 - pfigshare-u-files.s3.amazonaws.com
Due to the narrow key space and frequency analysis weakness, classical cipher techniques
are not suitable for most today's information communication. On the other hand, modern …