Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/56848
Title: Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic
Authors: Mamro, Oleksandr
Lagun, Andrii
Affiliation: Lviv Polytechnic National University
Bibliographic description (Ukraine): Mamro O. Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic / Oleksandr Mamro, Andrii Lagun // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2021. — Vol 6. — No 1. — P. 27–32.
Bibliographic description (International): Mamro O. Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic / Oleksandr Mamro, Andrii Lagun // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2021. — Vol 6. — No 1. — P. 27–32.
Is part of: Advances in Cyber-Physical Systems, 1 (6), 2021
Issue: 1
Issue Date: 1-Mar-2021
Publisher: Lviv Politechnic Publishing House
Place of the edition/event: Львів
Lviv
DOI: https://doi.org/10.23939/acps2021.01.027
Keywords: Zodiac
Z408
encryption
homophonic encryption
quenching
cyber-physical systems
Number of pages: 6
Page range: 27-32
Start page: 27
End page: 32
Abstract: This article examines the improvement of homophonic encryption using the well-known Z408 cipher as an example, and analyzes their problems to further correct the main shortcomings of this typea of encryption. In the practical part, an encryption system similar to Z408 was created and the complexity ofthe language analysis for this cipher was increased. The correlation dat of the number of alternative characters was used to improve the transmission of encrypted data depending on the load of the device. The more symbols and the higher the load, the fewer the number of alternative symbols will be used.
URI: https://ena.lpnu.ua/handle/ntb/56848
Copyright owner: © Національний університет “Львівська політехніка”, 2021
© Mamro O., Lagun A., 2021
URL for reference material: https://en.wikipedia.org/wiki/Polyalphabetic_cipher
https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses
https://www.cl.cam.ac.uk/~rja14/book.html
https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf
References (Ukraine): [1] Polyalphabetic cipher. [Online]. Available: https://en.wikipedia.org/wiki/Polyalphabetic_cipher.
[2] Analysis of the Zodiac 340-cipher. [Online]. Available: https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses.
[3] D. Welsh, “Codes and Cryptography”. Clarendon Press, Oxford, 1988.
[4] Elonka Dunin, Klaus Schmeh, “Code Breaking and Cryptograms”, A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8.
[5] H. Beker and F. Piper, “Cipher Systems”, Northwood Books, London, 1982.
[6] Bruce Schneier, “Applied Cryptography. Protocols, Algorithms, and Source Code in C”, John Wiley & Sons, 1996.
[7] Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates.
[8] Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive.
[9] Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
[10] Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography.
[11] Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice.
[12] Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press.
[13] Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography.
[14] Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.
[15] Anderson, Ross – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available: https://www.cl.cam.ac.uk/~rja14/book.html
[16] Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf
[17] Budiansky, Stephen, Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662)
[18] Marks, Leo, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X)
[19] Levy, Steven – Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age (ISBN 0-14-024432-8)
[20] Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984
[21] Yardley, Herbert, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7)
References (International): [1] Polyalphabetic cipher. [Online]. Available: https://en.wikipedia.org/wiki/Polyalphabetic_cipher.
[2] Analysis of the Zodiac 340-cipher. [Online]. Available: https://scholarworks.sjsu.edu//cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=4566&context=etd_theses.
[3] D. Welsh, "Codes and Cryptography". Clarendon Press, Oxford, 1988.
[4] Elonka Dunin, Klaus Schmeh, "Code Breaking and Cryptograms", A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8.
[5] H. Beker and F. Piper, "Cipher Systems", Northwood Books, London, 1982.
[6] Bruce Schneier, "Applied Cryptography. Protocols, Algorithms, and Source Code in C", John Wiley & Sons, 1996.
[7] Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates.
[8] Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive.
[9] Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
[10] Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography.
[11] Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice.
[12] Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press.
[13] Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography.
[14] Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.
[15] Anderson, Ross – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available: https://www.cl.cam.ac.uk/~rja14/book.html
[16] Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: https://www.governmentattic.org/18docs/Hist_US_COMSEC_Boak_NSA_1973u.pdf
[17] Budiansky, Stephen, Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662)
[18] Marks, Leo, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X)
[19] Levy, Steven – Crypto: How the Code Rebels Beat the Government – Saving Privacy in the Digital Age (ISBN 0-14-024432-8)
[20] Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984
[21] Yardley, Herbert, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7)
Content type: Article
Appears in Collections:Advances In Cyber-Physical Systems. – 2021. – Vol. 6, No. 1

Files in This Item:
File Description SizeFormat 
2021v6n1_Mamro_O-Using_Improved_Homophonic_Encryption_27-32.pdf265.81 kBAdobe PDFView/Open
2021v6n1_Mamro_O-Using_Improved_Homophonic_Encryption_27-32__COVER.png541.54 kBimage/pngView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.