Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic

dc.citation.epage32
dc.citation.issue1
dc.citation.spage27
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorMamro, Oleksandr
dc.contributor.authorLagun, Andrii
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2022-05-24T08:53:07Z
dc.date.available2022-05-24T08:53:07Z
dc.date.created2021-03-01
dc.date.issued2021-03-01
dc.description.abstractThis article examines the improvement of homophonic encryption using the well-known Z408 cipher as an example, and analyzes their problems to further correct the main shortcomings of this typea of encryption. In the practical part, an encryption system similar to Z408 was created and the complexity ofthe language analysis for this cipher was increased. The correlation dat of the number of alternative characters was used to improve the transmission of encrypted data depending on the load of the device. The more symbols and the higher the load, the fewer the number of alternative symbols will be used.
dc.format.extent27-32
dc.format.pages6
dc.identifier.citationMamro O. Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic / Oleksandr Mamro, Andrii Lagun // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2021. — Vol 6. — No 1. — P. 27–32.
dc.identifier.citationenMamro O. Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic / Oleksandr Mamro, Andrii Lagun // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2021. — Vol 6. — No 1. — P. 27–32.
dc.identifier.doihttps://doi.org/10.23939/acps2021.01.027
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/56848
dc.language.isoen
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofAdvances in Cyber-Physical Systems, 1 (6), 2021
dc.relation.references[1] Polyalphabetic cipher. [Online]. Available: https://en.wikipedia.org/wiki/Polyalphabetic_cipher.
dc.relation.references[2] Analysis of the Zodiac 340-cipher. [Online]. Available: https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses.
dc.relation.references[3] D. Welsh, “Codes and Cryptography”. Clarendon Press, Oxford, 1988.
dc.relation.references[4] Elonka Dunin, Klaus Schmeh, “Code Breaking and Cryptograms”, A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8.
dc.relation.references[5] H. Beker and F. Piper, “Cipher Systems”, Northwood Books, London, 1982.
dc.relation.references[6] Bruce Schneier, “Applied Cryptography. Protocols, Algorithms, and Source Code in C”, John Wiley & Sons, 1996.
dc.relation.references[7] Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates.
dc.relation.references[8] Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive.
dc.relation.references[9] Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
dc.relation.references[10] Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography.
dc.relation.references[11] Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice.
dc.relation.references[12] Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press.
dc.relation.references[13] Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography.
dc.relation.references[14] Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.
dc.relation.references[15] Anderson, Ross – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available: https://www.cl.cam.ac.uk/~rja14/book.html
dc.relation.references[16] Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf
dc.relation.references[17] Budiansky, Stephen, Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662)
dc.relation.references[18] Marks, Leo, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X)
dc.relation.references[19] Levy, Steven – Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age (ISBN 0-14-024432-8)
dc.relation.references[20] Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984
dc.relation.references[21] Yardley, Herbert, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7)
dc.relation.referencesen[1] Polyalphabetic cipher. [Online]. Available: https://en.wikipedia.org/wiki/Polyalphabetic_cipher.
dc.relation.referencesen[2] Analysis of the Zodiac 340-cipher. [Online]. Available: https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses.
dc.relation.referencesen[3] D. Welsh, "Codes and Cryptography". Clarendon Press, Oxford, 1988.
dc.relation.referencesen[4] Elonka Dunin, Klaus Schmeh, "Code Breaking and Cryptograms", A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8.
dc.relation.referencesen[5] H. Beker and F. Piper, "Cipher Systems", Northwood Books, London, 1982.
dc.relation.referencesen[6] Bruce Schneier, "Applied Cryptography. Protocols, Algorithms, and Source Code in C", John Wiley & Sons, 1996.
dc.relation.referencesen[7] Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates.
dc.relation.referencesen[8] Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive.
dc.relation.referencesen[9] Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
dc.relation.referencesen[10] Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography.
dc.relation.referencesen[11] Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice.
dc.relation.referencesen[12] Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press.
dc.relation.referencesen[13] Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography.
dc.relation.referencesen[14] Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.
dc.relation.referencesen[15] Anderson, Ross – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available: https://www.cl.cam.ac.uk/~rja14/book.html
dc.relation.referencesen[16] Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf
dc.relation.referencesen[17] Budiansky, Stephen, Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662)
dc.relation.referencesen[18] Marks, Leo, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X)
dc.relation.referencesen[19] Levy, Steven – Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age (ISBN 0-14-024432-8)
dc.relation.referencesen[20] Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984
dc.relation.referencesen[21] Yardley, Herbert, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7)
dc.relation.urihttps://en.wikipedia.org/wiki/Polyalphabetic_cipher
dc.relation.urihttps://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses
dc.relation.urihttps://www.cl.cam.ac.uk/~rja14/book.html
dc.relation.urihttps://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf
dc.rights.holder© Національний університет “Львівська політехніка”, 2021
dc.rights.holder© Mamro O., Lagun A., 2021
dc.subjectZodiac
dc.subjectZ408
dc.subjectencryption
dc.subjecthomophonic encryption
dc.subjectquenching
dc.subjectcyber-physical systems
dc.titleUsing Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic
dc.typeArticle

Files

Original bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
2021v6n1_Mamro_O-Using_Improved_Homophonic_Encryption_27-32.pdf
Size:
265.81 KB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
2021v6n1_Mamro_O-Using_Improved_Homophonic_Encryption_27-32__COVER.png
Size:
541.54 KB
Format:
Portable Network Graphics
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.78 KB
Format:
Plain Text
Description: