On polyalphabetic block codes

V Sidorenko, G Schmidt, E Gabidulin… - IEEE Information …, 2005 - ieeexplore.ieee.org
… Our main goal is to design polyalphabetic codespolyalphabetic codes using known codes.
Essentially, we use subcodes of known q-ary (mother) codes to design polyalphabetic codes. …

Codes for Memory Cells with Unreachable Levels

H Al Kim, V Sidorenko - 2023 XVIII International Symposium …, 2023 - ieeexplore.ieee.org
… as in the coding schemes in recent work on partially stuck … a various code construction
built upon poly-alphabetic codes, … The concept of polyalphabetic block codes is introduced in …

[PDF][PDF] Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds.

M Akram, MW Iqbal, SA Ali, MU Ashraf… - … , Materials & Continua, 2022 - academia.edu
… be equal to plaintext in polyalphabetic substitution cipher. The … the key is modified on
polyalphabetic substitution cipher to … The proposed key blocks contain ASCII code from 0 to 255 in …

[PDF][PDF] Analysis of polyalphabetic transposition cipher techniques used for encryption and decryption

SA Hannan, AMAM Asif - International Journal of Computer …, 2017 - researchgate.net
… In this paper we present a perspective on Polyalphabetic Transposition … ciphers, the operation
on large blocks has the disadvantage of … Diplomats had long used codes and ciphers for …

[BOOK][B] The mathematics of secrets: cryptography from caesar ciphers to digital encryption

J Holden - 2018 - books.google.com
… messages often use the terms code and cipher to mean two … On the other hand, we also saw
that the same plaintext block … among other things, the polyalphabetic substitution ciphers we …

[PDF][PDF] Poly-alphabetic substitution mapping for cryptographic transformations

AJ Paul, P Mythili - Conference: National Conference on Recent …, 2009 - researchgate.net
poly-alphabetic nature of the conversion process. The procedure discussed here applies to
a symmetric key block cipher having 128 bits block … If K(2) is ”h‘ whose ASCII code is 104, the …

An enhanced Cipher technique using Vigenere and modified Caesar cipher

D Gautam, C Agrawal, P Sharma… - … Conference on …, 2018 - ieeexplore.ieee.org
… vigenere table for the method of coding of alphabets. This paper … and algorithm of block cipher
are applied on the block of data … on the poly alphabetic cipher techniques and basically on

An approach of substitution method based on ASCII codes in encryption technique

A Sharma, A Bhatnagar, N Tak, A Sharma… - arXiv preprint arXiv …, 2013 - arxiv.org
… The name polyalphabetic suggests that there are more than … In this paper have produced
ASCII Codes of the plain text and … number of characters in a block is known as a block length. …

MATLOG: a Feistel based poly-alphabetic encryption

Z Zaland - 2012 - uobrep.openrepository.com
blocks we apply transposition to one block and substitution to the other and vice versa to the
result of the first round this process goes on … We will run the implanted code to test its results …

Generation of Dynamical S‐Boxes for Block Ciphers via Extended Logistic Map

BB Cassal-Quiroga… - … Problems in Engineering, 2020 - Wiley Online Library
… boxes (S-boxes) based on chaotic time series of the logistic map … Finally, an application
premised on polyalphabetic ciphers … Taking this idea of “polyalphabetic ciphers,” we present an …