-
1
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING
Published 2021-09-01“…The plaintext will be replaced with new plaintext resulting from a combination of Caesar Cipher and Reverse Cipher techniques. The results obtained indicate that the application of plaintext modifications to CBC can improve message security because the keys used are increasingly complex.…”
Get full text
Article -
2
Efektivitas Pesan Teks dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi
Published 2018-03-01“…Dari seluruh kombinasi yang ada, seluruhnya berhasil untuk proses enkripsi dan dekripsi guna mengembalikan cipher text menjadi plain text yang asli.…”
Get full text
Article -
3
Attack Stream Cipher By Using Cipher System Only
Published 2017-09-01“… Attack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space. …”
Get full text
Article -
4
Improved Related-Cipher Attack on Salsa20 Stream Cipher
Published 2019-01-01Subjects: Get full text
Article -
5
CipherTrace: automatic detection of ciphers from execution traces
Published 2020“…The prototype we developed (CipherTrace) is based on PANDA, the architecture-neutral dynamic analysis platform. …”
Thesis -
6
A study of caesar cipher and transposition cipher in jawi messages
Published 2018“…Decryption is the reverse process of encryption. Caesar cipher and transposition cipher are two historical ciphers in cryptography. …”
Article -
7
CipherCAD Testbed
Published 2021-06-01“…The CipherCAD testbed is a unique workplace for the development, design, testing, verification and teaching of the communications systems. …”
Get full text
Article -
8
-
9
-
10
Attacks on the Firekite Cipher
Published 2022-09-01“… Firekite is a synchronous stream cipher using a pseudo-random number generator (PRNG) whose security is conjectured to rely on the hardness of the Learning Parity with Noise (LPN) problem. …”
Get full text
Article -
11
-
12
Turing, ciphers and quanta.
Published 2012“…Alan Turing has certainly contributed to a widespread belief that the quest for a perfect, unbreakable, cipher is a futile pursuit. The ancient art of concealing information has, in the past, been matched by the ingenuity of code-breakers, but no longer! …”
Journal article -
13
One Algorithm to Cipher Messages in Columnar and Fixed Period-d Transposition Cipher
Published 2017-08-01“… One of ciphering systems depends on transposition of letters in plain text to generate cipher text. …”
Get full text
Article -
14
Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security
Published 2020-07-01Subjects: “…caesar cipher…”
Get full text
Article -
15
Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher
Published 2009-07-01Subjects: “…twofish block cipher…”
Get full text
Article -
16
CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware
Published 2024“…Our results show that CipherTrace is capable of fully dissecting Fixed S-Box block ciphers (e.g. …”
Journal article -
17
Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher
Published 2009-09-01Subjects: Get full text
Article -
18
PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA
Published 2021-03-01“…This research is to secure the message on image encoding using Playfair Cipher and 3D Playfair Cipher. The process of encryption and decryption on Playfair Cipher uses two-letter pairs (bigram), while in 3D Playfair Cipher uses three-letter pairs (trigrams). …”
Get full text
Article -
19
Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
Published 2020-01-01Subjects: Get full text
Article -
20