• Corpus ID: 61127572

Codes: The Guide to Secrecy From Ancient to Modern Times

@inproceedings{Mollin2005CodesTG,
  title={Codes: The Guide to Secrecy From Ancient to Modern Times},
  author={Richard A. Mollin},
  year={2005}
}
  • R. Mollin
  • Published 24 May 2005
  • Computer Science
Preface FROM THE RIDDLES OF ANCIENT EGYPT TO CRYPTOGRAPHY IN THE RENAISSANCE-3,500 YEARS IN THE MAKING Antiquity-From Phaistos Cryptography in Classical Literature The Middle Ages Cryptology and the Arabs Rise of the West FROM SIXTEENTH-CENTURY CRYPTOGRAPHY TO THE NEW MILLENNIUM-THE LAST 500 YEARS Three Post-Renaissance Centuries The American Colonies Nineteenth-Century Cryptography Two World Wars The Post War Era and the Future SYMMETRIC-KEY CRYPTOGRAPHY Block Ciphers and DES S-DES and DES… 
Taxonomy of Cryptography Techniques for Network Security
TLDR
Different historical cryptography techniques, modern encryption algorithms (symmetric and asymmetric), and newer areas that are being explored in cryptography are discussed and its applications in network security are explored.
The implementation of trithemius algorithm and modified least significant bit (mlsb) blue channel for bitmap image security
TLDR
In this research, the message or image file will be sent is first encrypted with Trithemius cryptography algorithm, then encryption result will be hidden in an image file with bitmap format using Blue Channel MLSB steganography method.
A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers
The field of classical cryptography encompasses various forms of simple pen-and-paper ciphers that were in widespread use until the early 20th century. Although these ciphers have long been surpassed
NEW CRYPTOGRAPHIC ALGORITHMS FOR ENHANCING SECURITY OF VOICE DATA
TLDR
The results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm and the analysis has proved that the security level has a direct relationship to the key length and the voice packet size in that large packet size requires more processing time.
Block Ciphers : fast Implementations on x86-64 Architecture
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communications over cell phone calls and Internet, securing network connections, making e-commerce and
SMS ENCRYPTION OF ANDROID MOBILE BY USING RSA AND CHAOTIC ALGORITHMS
At present, SMS or messages are a very common way of communication. So it's different from the applications and instant messaging available but SMS is still one of the widespread ways of
Authenticated encryption for time-sensitive critical infrastructure
TLDR
This work presents experimental results proving that data encryption can be used to defend cyber-physical systems within the timing constraints imposed by international standards for data communications in electricity distribution substations, even when using conventional hardware and software.
Implementation Color-Images Cryptography Using RSA Algorithm
TLDR
The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text.
Analysis Aryabhata Remainder Theorem On Rivest Shamir Adleman (RSA) Cryptography
Security of RSA cryptography lied in the difficulty of factoring the number p and q bacame the prime factor. The greater the value of p and q used, the better the security level was. However, this
Security Evaluation of Nonlinear Filterization Stream Cipher Based on Information Theory
TLDR
A new method to evaluate the nonlinear filtering function which is based on five parameters (length of register, seed, connection polynomial, filter structure, chosen entrances) and will generate all the possible forms for the input equation.
...
1
2
3
4
...

References

SHOWING 1-3 OF 3 REFERENCES
Modes of operation
This chapter discusses the modes of operation. Numerically controlled machine tools invariably use the generating principle in the machining of components because it is easier and more economical to
For the fairest
K 2 (R)