An Extended Version of the Polybius Cipher
نویسندگان
چکیده
This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only. For this reason, we have proposed an improvement to the existing Polybius cipher, in which an 8X8 matrix can be constructed. General Terms Encryption, Decryption, Cryptography, Cryptology, Security
منابع مشابه
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
متن کاملDevelopment of Modified Polybius Technique for Data Security
In present scenario sharing of information is increasing significantly. The information is being transmitted to different user and undergoes various passive and active attacks; therefore, the information security plays a challenging role in communication. Cryptography plays a vital role in secure wireless communication and provides an excellent solution to offer the necessary protection against...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملExtension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملEnhancing the security of caesar cipher substitution method using a randomized approach for more secure communication
Caesar cipher is an ancient, elementary method of encrypting plain text message into cipher text protecting it from adversaries. However, with the advent of powerful computers, there is a need for increasing the complexity of such techniques. This paper contributes in the area of classical cryptography by providing a modified and expanded version for Caesar cipher using knowledge of mathematics...
متن کامل