{"title":"维吉纳尔技术的扩展以提高通信的安全性","authors":"Md. Selim Hossain, Md. Tarequl Islam","doi":"10.1109/ICISET.2018.8745638","DOIUrl":null,"url":null,"abstract":"Security is one of the most important issues in modern world. With the fast growing of internet and networked system, its applications such as banking, e-commerce, government etc. demand for effective raw material of information is growing rapidly. Cryptology deals with the data communication to transfer data in secure manner from place to another. It is the system by which cryptography and cryptanalysis are combined. It consists of two matching fields of study that are cryptography and cryptanalysis. We will discuss the cryptanalysis of Poly-alphabetic substitution cipher by applying the modified Vigenère table in which message is presented to encrypt and decrypt the data. Time so change, if we apply this process the brute force attack in the cryptanalysis is impossible.","PeriodicalId":6608,"journal":{"name":"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)","volume":"88 1","pages":"79-85"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Extension of Vigenere Technique to Enhance the Security of Communication\",\"authors\":\"Md. Selim Hossain, Md. Tarequl Islam\",\"doi\":\"10.1109/ICISET.2018.8745638\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is one of the most important issues in modern world. With the fast growing of internet and networked system, its applications such as banking, e-commerce, government etc. demand for effective raw material of information is growing rapidly. Cryptology deals with the data communication to transfer data in secure manner from place to another. It is the system by which cryptography and cryptanalysis are combined. It consists of two matching fields of study that are cryptography and cryptanalysis. We will discuss the cryptanalysis of Poly-alphabetic substitution cipher by applying the modified Vigenère table in which message is presented to encrypt and decrypt the data. Time so change, if we apply this process the brute force attack in the cryptanalysis is impossible.\",\"PeriodicalId\":6608,\"journal\":{\"name\":\"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)\",\"volume\":\"88 1\",\"pages\":\"79-85\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISET.2018.8745638\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISET.2018.8745638","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Extension of Vigenere Technique to Enhance the Security of Communication
Security is one of the most important issues in modern world. With the fast growing of internet and networked system, its applications such as banking, e-commerce, government etc. demand for effective raw material of information is growing rapidly. Cryptology deals with the data communication to transfer data in secure manner from place to another. It is the system by which cryptography and cryptanalysis are combined. It consists of two matching fields of study that are cryptography and cryptanalysis. We will discuss the cryptanalysis of Poly-alphabetic substitution cipher by applying the modified Vigenère table in which message is presented to encrypt and decrypt the data. Time so change, if we apply this process the brute force attack in the cryptanalysis is impossible.