AbstractâMobile phone has become as an essential thing in our life. Therefore ..... tested with Android 2.3 (Gingerbread), Android 4.2.2 (Jelly. Bean) and .... âAlpha-Qwerty Cipher: An Extended Vigenère Cipherâ, Advanced. Computing: An ...
World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, 2016
0DLQWDLQLQJ8VHU/HYHO6HFXULW\LQ6KRUW0HVVDJH 6HUYLFH 7$UXGFKHOYDP::(1)HUQDQGR
International Science Index, Computer and Information Engineering Vol:10, No:6, 2016 waset.org/Publication/10004660
Abstract²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
Keywords—606 XVHU OHYHO VHFXULW\ HQFU\SWLRQ PRELOH FRPPXQLFDWLRQ , ,1752'8&7,21
0
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igenere Cipher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
997
scholar.waset.org/1999.4/10004660
International Science Index, Computer and Information Engineering Vol:10, No:6, 2016 waset.org/Publication/10004660
World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, 2016
DGGLQJ V\PEROV DQG QXPEHUV WR WKLV WDEOH WKH OHYHO RI WKH VHFXULW\ZLOOEHHQKDQFHG(YHQLIWKRVHV\PEROVDQGQXPEHUV DUH DGGHG UDQGRPO\ LQ EHWZHHQ DOSKDEHWV WKH OHYHO RI WKH VHFXULW\ZLOOEHIXUWKHUHQKDQFHG
WKH NH\ LQ FDVH LI WKH\ ZDQW WR VDYH WKDW PHVVDJH IRU IXWXUH XVH
D. RSA 56$>@>@LVFRQVLGHUHGDVWKHPRVWVHFXUHGPHWKRGIRU HQFU\SWLRQGHFU\SWLRQ 7KLV KDV VRPH PDWKHPDWLFDO FDOFXODWLRQV IRU ZKLFK D ELW RI KLJK FRPSXWDWLRQDO SRZHU LV QHHGHG 7KLV FRPSXWDWLRQDO SRZHU FDQQRW EH LQFUHDVHG LQ PRELOHSKRQHVDVZHOLNH 7KHVWHSVWREHIROORZHGIRUNH\JHQHUDWLRQLQWKH56$DUH JLYHQEHORZ D &KRRVHWZRGLVWLQFWSULPHQXPEHUVSDQGT E &RPSXWHQ S T F &RPSXWHijQ ijS ijT Sí Tí ZKHUHijLV (XOHU VIXQFWLRQ G &KRRVH DQ LQWHJHU H VXFK WKDW H ijQ DQG JFGH ijQ LHHDQGijQ DUHFRSULPH H 'HWHUPLQHGDVGŁHíPRGijQ LHGLVWKHPRGXODU PXOWLSOLFDWLYHLQYHUVHRIHPRGXORijQ %HFDXVH RI WKH OLPLWHG SRZHU DYDLODEOH LQ PRELOH SKRQHV IROORZLQJ UDQJHV RI S Q DQG H DUH FKRVHQ GXULQJ WKH LPSOHPHQWDWLRQ S! Q H
7KHXVHULQWHUIDFHIRUWKHDERYHDSSOLFDWLRQLVJLYHQLQ)LJ 7KHUHDUHWZREXWWRQVIRUHQFU\SWLRQDQGGHFU\SWLRQ:KHQ WKH HQFU\SWLRQ EXWWRQ LV FOLFNHG WKH PHVVDJH LQ WKH PHVVDJH ER[ZLOOEHHQFU\SWHGXVLQJWKHNH\LQWKH³6HFUHW.H\´DUHD RI)LJ:KHQWKH³'HFU\SW´EXWWRQLVFOLFNHGLPPHGLDWHO\ WKH UHFHLYHG WKH PHVVDJHV LQ WKH PHVVDJH ER[ ZLOO EH GLVSOD\HG7KHQDPHVVDJHWREHGHFU\SWHGKDVWREHFKRVHQ 7KHQ WKDW FKRVHQ PHVVDJH ZLOO EH GHFU\SWHG XVLQJ WKH NH\ JLYHQLQWKH³6HFUHWNH\´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³&OHDU´EXWWRQLVFOLFNHGWKHPHVVDJHDUHD ZLOOEHFOHDUHG
9 ,03/(0(17$7,21
,9 &5@ :LOOLDP 6WDOOLQJ 1HWZRUN 6HFXULW\ (VVHQWLDOV $SSOLFDWLRQV DQG 6WDQGDUGV 3HDUVRQ(GXFDWLRQ >@ 6WDOOLQJV:&U\SWRJUDSK\DQG1HWZRUN6HFXULW\QGHGLWLRQ3UHQWLFH +DOO >@ + )HLVWHO ³&U\SWRJUDSK\ DQG FRPSXWHU SULYDF\´ Scientific American YROSS >@ $ - 0HQH]HV 3 & YDQ 2RUVFKRW DQG 6 $ 9DQVWRQH Handbook of Applied Cryptography&5&3UHVV%RFD5DWRQ)/
International Scholarly and Scientific Research & Innovation 10(6) 2016
1000
scholar.waset.org/1999.4/10004660