133 research outputs found

    A Learned Polyalphabetic Decryption Cipher

    Get PDF
    This paper examines the use of machine learning algorithms to model polyalphabetic ciphers for decryption. The focus of this research is to train and evaluate different machine learning algorithms to model the polyalphabetic cipher. The algorithms that have been selected are: (1) hill climbing; (2) genetic algorithm; (3) simulated annealing; and (4), random optimisation. The resulting models were deployed in a simulation to decrypt sample codes. The resulting analysis showed that the genetic algorithm was the most effective technique used in with hill climbing as second. Furthermore, both have the potential to be useful for larger problems

    Graceful Labeling and Skolem Graceful Labeling on the U-star Graph and It’s Application in Cryptography

    Get PDF
    Graceful Labeling on graph G=(V, E) is an injective function f from the set of the vertex V(G) to the set of numbers {0,1,2,...,|E(G)|} which induces bijective function f from the set of edges E(G) to the set of numbers {1,2,...,|E(G)|} such that for each edge uv e E(G) with u,v e V(G) in effect f(uv)=|f(u)-f(v)|. Meanwhile, the Skolem graceful labeling is a modification of the Graceful labeling. The graph has graceful labeling or Skolem graceful labeling is called graceful graph or Skolem graceful labeling graph. The graph used in this study is the U-star graph, which is denoted by U(Sn). The purpose of this research is to determine the pattern of the graceful labeling and Skolem graceful labeling on graph U(Sn) apply it to cryptography polyalphabetic cipher. The research begins by forming a graph U(Sn) and they are labeling it with graceful labeling and Skolem graceful labeling. Then, the labeling results are applied to the cryptographic polyalphabetic cipher. In this study, it is found that the U(Sn) graph is a graceful graph and a Skolem graceful graph, and the labeling pattern is obtained. Besides, the labeling results on a graph it U(Sn) can be used to form a table U(Sn) polyalphabetic cipher. The table is used as a key to encrypt messages

    Modifying playfair cipher algorithm using KAJ spiral method to fit any language regardless of the number of characters

    Get PDF
    In this paper we proposed KAJ Spiral method for supporting PlayFair cipher algorithm to use languages other than English and utilize block with more than two characters at once. Original method does not support block of characters and other languages. The method uses a spiral shape with two axes (X, Y) and the letters are spread on the axis within circles depending on the language. We use Friedman method analysis (index of coincidence) as a tool to test and prove the efficiency of KAJ Spiral method, and we found that it is at least equally secure to the original PlayFair cipher. The aims of this is making cryptography just like mathematics a universal language such that people with different languages can use this algorithm for secure communication, and at the same time make the algorithm stronger and easy to use, with the ability to fit any language

    Encryption in the past, present, and future : an honors thesis (HONRS 499)

    Get PDF
    To ensure the confidentiality and integrity of data in storage and transit, various cryptography systems have been developed. Each of these systems has individual strengths and weaknesses. As the number of computer security threats increases, it becomes even more crucial to use methods of concealing the true meaning of data. This paper will look to strike a balance in providing details of how each of the methods works without explaining in so much detail that a casual reader will be completely lost. It is the goal of this paper to enlighten readers about the cryptography systems all around them and help them to gain a better understanding of how these systems work. The paper will then conclude with a brief discussion of what future advancements are likely to mean to current cryptography systems.Honors CollegeThesis (B.?

    A Brief History of Cryptography

    Get PDF

    The Rubik\u27s Crypto-Cube: a Trans-Composite Cipher

    Get PDF
    Cryptography, the art or science of writing messages in code to disguise the content, has been a source of interest for millenia. Those who exchange secret messages do so through the medium of a cryptosystem, a single set of devices used in order to encrypt plaintext and decrypt ciphertext. This is a study of the Rubik\u27s Cube as a trans-composite cipher
    • …
    corecore