11 × 11 Playfair Cipher based on a Cascade of LFSRs

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking A Playfair Cipher Using Memetic Algorithm

The playfair cipher operates on pairs of letters. The cipher text is broken into group of blocks, each block contains two letters. Encryption and decryption cipher depends on key search, which is a square matrix that contains 5x5 letters. The matrix contains every letter expect letter j. In this paper the cryptanalyst a playfair is presented using search techniques. It is a Memetic Algorithm, a...

متن کامل

Machine reconstruction of the Playfair cipher

A Playfair cipher is a digraph substitution, where each letter pair of the plaintext is replaced by a letter pair in the ciphertext. The chart of substitutions is summarized by the placement of letters in a table, called the Playfair square, constructed in some customary manner from a keyword. We denote a substitution of plaintext digraph cd with ciphertext digraph ab by ab− cd. There are two r...

متن کامل

Modeling of 11-Level Cascade Multilevel STATCOM

This paper presents analytical approach for modeling of 11-level cascade multilevel STATCOM connected to power system for voltage regulation applications. A technique based on energy equivalence is proposed for computation of equivalent capacitance which represents true value of variable structure of capacitances connected in individual H-bridges. The necessity of equivalent capacitor is an ess...

متن کامل

A Novel Approach to Security using Extended Playfair Cipher

The well known multiple letter encryption cipher is the Playfair cipher. Here the digrams in the plaintext are treated as single units and converted into corresponding cipher text digrams. However because of the drawbacks inherent in the 5*5 Playfair cipher which adversely affects the security we proposed an 8*8 Playfair cipher. For details one can refer to [1]. This paper analyses the new prop...

متن کامل

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2013

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-1212935