Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic
dc.citation.epage | 32 | |
dc.citation.issue | 1 | |
dc.citation.spage | 27 | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.contributor.author | Mamro, Oleksandr | |
dc.contributor.author | Lagun, Andrii | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
dc.date.accessioned | 2022-05-24T08:53:07Z | |
dc.date.available | 2022-05-24T08:53:07Z | |
dc.date.created | 2021-03-01 | |
dc.date.issued | 2021-03-01 | |
dc.description.abstract | This article examines the improvement of homophonic encryption using the well-known Z408 cipher as an example, and analyzes their problems to further correct the main shortcomings of this typea of encryption. In the practical part, an encryption system similar to Z408 was created and the complexity ofthe language analysis for this cipher was increased. The correlation dat of the number of alternative characters was used to improve the transmission of encrypted data depending on the load of the device. The more symbols and the higher the load, the fewer the number of alternative symbols will be used. | |
dc.format.extent | 27-32 | |
dc.format.pages | 6 | |
dc.identifier.citation | Mamro O. Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic / Oleksandr Mamro, Andrii Lagun // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2021. — Vol 6. — No 1. — P. 27–32. | |
dc.identifier.citationen | Mamro O. Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic / Oleksandr Mamro, Andrii Lagun // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2021. — Vol 6. — No 1. — P. 27–32. | |
dc.identifier.doi | https://doi.org/10.23939/acps2021.01.027 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/56848 | |
dc.language.iso | en | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Advances in Cyber-Physical Systems, 1 (6), 2021 | |
dc.relation.references | [1] Polyalphabetic cipher. [Online]. Available: https://en.wikipedia.org/wiki/Polyalphabetic_cipher. | |
dc.relation.references | [2] Analysis of the Zodiac 340-cipher. [Online]. Available: https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses. | |
dc.relation.references | [3] D. Welsh, “Codes and Cryptography”. Clarendon Press, Oxford, 1988. | |
dc.relation.references | [4] Elonka Dunin, Klaus Schmeh, “Code Breaking and Cryptograms”, A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8. | |
dc.relation.references | [5] H. Beker and F. Piper, “Cipher Systems”, Northwood Books, London, 1982. | |
dc.relation.references | [6] Bruce Schneier, “Applied Cryptography. Protocols, Algorithms, and Source Code in C”, John Wiley & Sons, 1996. | |
dc.relation.references | [7] Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates. | |
dc.relation.references | [8] Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive. | |
dc.relation.references | [9] Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X | |
dc.relation.references | [10] Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. | |
dc.relation.references | [11] Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. | |
dc.relation.references | [12] Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press. | |
dc.relation.references | [13] Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography. | |
dc.relation.references | [14] Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017. | |
dc.relation.references | [15] Anderson, Ross – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available: https://www.cl.cam.ac.uk/~rja14/book.html | |
dc.relation.references | [16] Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf | |
dc.relation.references | [17] Budiansky, Stephen, Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662) | |
dc.relation.references | [18] Marks, Leo, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X) | |
dc.relation.references | [19] Levy, Steven – Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age (ISBN 0-14-024432-8) | |
dc.relation.references | [20] Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984 | |
dc.relation.references | [21] Yardley, Herbert, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7) | |
dc.relation.referencesen | [1] Polyalphabetic cipher. [Online]. Available: https://en.wikipedia.org/wiki/Polyalphabetic_cipher. | |
dc.relation.referencesen | [2] Analysis of the Zodiac 340-cipher. [Online]. Available: https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses. | |
dc.relation.referencesen | [3] D. Welsh, "Codes and Cryptography". Clarendon Press, Oxford, 1988. | |
dc.relation.referencesen | [4] Elonka Dunin, Klaus Schmeh, "Code Breaking and Cryptograms", A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8. | |
dc.relation.referencesen | [5] H. Beker and F. Piper, "Cipher Systems", Northwood Books, London, 1982. | |
dc.relation.referencesen | [6] Bruce Schneier, "Applied Cryptography. Protocols, Algorithms, and Source Code in C", John Wiley & Sons, 1996. | |
dc.relation.referencesen | [7] Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates. | |
dc.relation.referencesen | [8] Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive. | |
dc.relation.referencesen | [9] Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X | |
dc.relation.referencesen | [10] Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. | |
dc.relation.referencesen | [11] Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. | |
dc.relation.referencesen | [12] Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press. | |
dc.relation.referencesen | [13] Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography. | |
dc.relation.referencesen | [14] Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017. | |
dc.relation.referencesen | [15] Anderson, Ross – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available: https://www.cl.cam.ac.uk/~rja14/book.html | |
dc.relation.referencesen | [16] Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf | |
dc.relation.referencesen | [17] Budiansky, Stephen, Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662) | |
dc.relation.referencesen | [18] Marks, Leo, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X) | |
dc.relation.referencesen | [19] Levy, Steven – Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age (ISBN 0-14-024432-8) | |
dc.relation.referencesen | [20] Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984 | |
dc.relation.referencesen | [21] Yardley, Herbert, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7) | |
dc.relation.uri | https://en.wikipedia.org/wiki/Polyalphabetic_cipher | |
dc.relation.uri | https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses | |
dc.relation.uri | https://www.cl.cam.ac.uk/~rja14/book.html | |
dc.relation.uri | https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2021 | |
dc.rights.holder | © Mamro O., Lagun A., 2021 | |
dc.subject | Zodiac | |
dc.subject | Z408 | |
dc.subject | encryption | |
dc.subject | homophonic encryption | |
dc.subject | quenching | |
dc.subject | cyber-physical systems | |
dc.title | Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic | |
dc.type | Article |
Files
License bundle
1 - 1 of 1