<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>dofebd</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Doğu Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2667-6958</issn>
                                                                                                        <publisher>
                    <publisher-name>Hakkari Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.57244/dfbd.1567632</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Information Security Management</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgi Güvenliği Yönetimi</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Bütünleşik Kodlama Modellemesi ile Karesel ve Üçgensel Sayılardan Algoritmik Şifreleme Oluşturulması</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-7624-8270</contrib-id>
                                                                <name>
                                    <surname>Kuloǧlu</surname>
                                    <given-names>Bahar</given-names>
                                </name>
                                                                    <aff>SİVAS BİLİM VE TEKNOLOJİ ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250630">
                    <day>06</day>
                    <month>30</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>1</issue>
                                        <fpage>1</fpage>
                                        <lpage>15</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241015">
                        <day>10</day>
                        <month>15</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250318">
                        <day>03</day>
                        <month>18</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Doğu Fen Bilimleri Dergisi</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Doğu Fen Bilimleri Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>Bu çalışmada 29 harfli Türk alfabesine karşılık gelen rakamlar boşluk (●) dahil &quot;n &quot;den &quot;n+29 &quot;a kadar yazılmıştır. Kodlanacak kelime veya herhangi bir verinin her bir harfine karşılık gelen sayılar harf sırasına göre yazılmış ve sayılar mod30&#039;a göre yeniden düzenlenmiştir. Daha sonra mod30&#039;a göre düzenlenen sayılara karşılık gelen harf kullanılarak oluşturulan metnin her harfini temsil eden bir kod oluşturulmuştur. Kodlanan metnin her türlü saldırı ve virüslere karşı korunması amacıyla Z_(n+1) Z_(n-1)-Z_n^2=-2n^2+1 (Karesel sayılar için Cassini Özdeşliği) ile ikinci dereceden sayılardan oluşan matris formatının (Z_n) her bir elemanı belirli işlem ve yöntemlerden sonra çözülmüştür.Özellikle çalışmanın devamında yukarıda verilen şifreleme işlemlerine farklı bir boyut kazandırmak yani daha güçlü bir şifreleme ve şifre çözme algoritması oluşturarak geçerlilik ve güvenilirliğini arttırmak amacıyla i&#039;nin tek veya çift olmasına göre hem karesel hem de üçgensel sayılar dikkate alınarak &quot;Bütünleşik Kodlama&quot; adını verdiğimiz yeni bir şifreleme modellemesi oluşturulmuştur.</p></abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>Kriptoloji</kwd>
                                                    <kwd>  Metin şifreleme</kwd>
                                                    <kwd>  Karesel sayılar</kwd>
                                                    <kwd>  Üçgensel sayılar</kwd>
                                            </kwd-group>
                            
                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Beall, J. C. Curry&#039;s paradox. In Zalta, Edward N. (ed.). Stanford Encyclopedia of Philosophy.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Basu, M. &amp; Prasad, B. (2009). The generalized relations among the code elements forFibonacci coding theory. Chaos Solitons Fractals, 5, 2517-2525.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Dişkaya, O., Avaroğlu, E., Menken, H., &amp; Emsal, A. (2022). A new Encryption Algorithm  Based on Fibonacci Polynomials and Matrices. International Information and Engineering Technology Association, 39 (5), 1453-1462.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Eric W. Weisstein, Catalan&#039;s Constant (MathWorld)</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Eric W. Weisstein. Square Triangular Number. MathWorld.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Eser E., Kuloğlu B.&amp; Özkan E. (2023). An Encoding –Decoding Algorithm Based On Narayana Numbers. 9th International Conference on IFS and Contemporary Mathematics and Engineering (IFSCOM 2023), Mersin, Türkiye, 177-187.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Kriptografi, Bilginin Anahtarı, https://bilimgenc.tubitak.gov.tr/makale/kriptografi-bilginin-anahtari, (23.05.2023).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Kuloğlu B. &amp; Özkan E. (2023a). Creating Encryption and Decryption Algorithm Using Pell Numbers. EYFOR14, Antalya, Türkiye, 505-515.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Kuloglu, B. &amp; Özkan, E. (2023b). Applications of Jacobsthal and Jacobsthal-Lucas Numbers in Coding Theory, Mathematica Montisnigri, Lvii, 54–64.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Kuloğlu B. (2024). Creating a New Coding and Decoding Algorithm Based on Violin Notes, Research &amp; Revıews: Dıscrete Mathematıcal Structures, 10 (3).</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Prajapat, S, Jain, A. &amp; Thakur, R. S. (2014) A novel approach for information security with automatic variable key using Fibonacci Q-matrix, International Journal of Computer and Communication Technology, 5(4), 295-299.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Stakhov, A.P. (1999). A generalization of The Fibonacci Q-matrix. Rep. Natl. Acad. Sci. Ukraine. 9, 46-49.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Stakhov, A. P. (2006).Fibonacci matrices, a generalization of the Cassini formula, and a new coding theory,Chaos Solitons Fractals, 30, 56-66.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Uçar, S., Taş, N. &amp; Özgür, N. H. (2019). A New Application to Coding Theory via Fibonacci and Lucas Numbers. Mathematical Sciences and Application E-Notes, 7 (1), 62-70.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Wang, F., Ding, J., Dai, Z., and Peng, Y. (2010). An application of mobile phoneencryption based on Fibonacci structure of chaos. Second WRI World Congress onSoftware Engineering</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
