{"title":"利用幻数9属性的替换密码","authors":"Amol G. Muley, S. Gawate","doi":"10.1109/ICETET.2010.157","DOIUrl":null,"url":null,"abstract":"This method works on the principle of substitution cipher but by using attributes of magic number 9. Total there are 5 strings created and used for encryption and decryption. Randomly symbols are substituted (after performing arithmetic operations) from 5 different strings. Furthermore these 5 strings changes from file to file. For decryption these 5 strings must be available. This method is simple to understand and implement but difficult, robust and compact to decrypt.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Substitution Cipher by Using Attributes of Magic Number 9\",\"authors\":\"Amol G. Muley, S. Gawate\",\"doi\":\"10.1109/ICETET.2010.157\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This method works on the principle of substitution cipher but by using attributes of magic number 9. Total there are 5 strings created and used for encryption and decryption. Randomly symbols are substituted (after performing arithmetic operations) from 5 different strings. Furthermore these 5 strings changes from file to file. For decryption these 5 strings must be available. This method is simple to understand and implement but difficult, robust and compact to decrypt.\",\"PeriodicalId\":175615,\"journal\":{\"name\":\"2010 3rd International Conference on Emerging Trends in Engineering and Technology\",\"volume\":\"98 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 3rd International Conference on Emerging Trends in Engineering and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2010.157\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2010.157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Substitution Cipher by Using Attributes of Magic Number 9
This method works on the principle of substitution cipher but by using attributes of magic number 9. Total there are 5 strings created and used for encryption and decryption. Randomly symbols are substituted (after performing arithmetic operations) from 5 different strings. Furthermore these 5 strings changes from file to file. For decryption these 5 strings must be available. This method is simple to understand and implement but difficult, robust and compact to decrypt.