Designing a New Hybrid Cryptographic Model using Coordinate Axes
Öz
Anahtar Kelimeler
Kaynakça
- T. M. Aung, H. H. Naing, and N. N. Hla, A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher). International Journal of Machine Learning and Computing, (2019) 9 (3) (June).
- P. Chaudhury, S. Dhang, M. Roy, S. Deb, J. Saha, A. Mallik, S. Bal, S. Roy, M. K. Sarkar, R. Das, ACAFP: Asymmetric Key based Cryptographic Algorithm using Four Prime Numbers to Secure Message Communication. A Review on RSA Algorithm, 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, (2017) 332–337.
- R. Chaves, L. Sousa, N. Sklavos, A. P. Fournaris, G. Kalogeridou, P. Kitsos, F. Sheikh, Secure Hashing: SHA-1, SHA-2, and SHA-3, Taylor & Francis Group, LLC, 2016.
- FIPS 197, Announcing the ADVANCED ENCRYPTION STANDARD (AES). National Institute of Standarts and Technology (NIST) 2001.
- FIPS 46-3, Data Encryption Standard. National Institute of Standarts and Technology (NIST), 1999.
- H. J. Highland, Data encryption: A non-mathematical approach, Computer & Security Volume 16, Issue 5, 1997, Pages 369-386.
- R. S. Kartha, V. Paul, An Efficient Algorithm for Polyalphabetic Substitution Using Infinite Number of Alphabetical Tables. International Journal of Applied Engineering Research, (2018) 13 (4), 14-20.
- J. Katz, Y. Lindell, Introduction to Modern Cryptography: Principles and Protocols, Chapman & Hall, 2008.
Ayrıntılar
Birincil Dil
İngilizce
Konular
Bilgisayar Yazılımı
Bölüm
Araştırma Makalesi
Yazarlar
Burhan Selçuk
*
Türkiye
Ayşe Nur Altıntaş Tankül
Türkiye
Ayşegül Dündar
Türkiye
Zehra Akkuş
Türkiye
Mehmet Arslan
0000-0003-0519-373X
Türkiye
Yayımlanma Tarihi
1 Haziran 2020
Gönderilme Tarihi
14 Aralık 2019
Kabul Tarihi
6 Şubat 2020
Yayımlandığı Sayı
Yıl 2020 Cilt: 5 Sayı: 1
is applied to all research papers published by JCS and
is assigned for each published paper.