CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Extended Version of the Polybius Cipher

by Tabu S. Kondo, Leonard J. Mselle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 13
Year of Publication: 2013
Authors: Tabu S. Kondo, Leonard J. Mselle
10.5120/13803-1836

Tabu S. Kondo, Leonard J. Mselle . An Extended Version of the Polybius Cipher. International Journal of Computer Applications. 79, 13 ( October 2013), 30-33. DOI=10.5120/13803-1836

@article{ 10.5120/13803-1836,
author = { Tabu S. Kondo, Leonard J. Mselle },
title = { An Extended Version of the Polybius Cipher },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 13 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number13/13803-1836/ },
doi = { 10.5120/13803-1836 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:21.376938+05:30
%A Tabu S. Kondo
%A Leonard J. Mselle
%T An Extended Version of the Polybius Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 13
%P 30-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper provides a security method which can be used for data that contains alphabets, numerals and some special symbols during their transmission. A discussion about cryptology and the existing Polybius cipher is made. The existing Polybius cipher is based on the use of a 5X5 matrix of letters constructed using numbers from 1 to 5. This square can allow the text that contains alphabets only. For this reason, we have proposed an improvement to the existing Polybius cipher, in which an 8X8 matrix can be constructed.

References
  1. Krawetz, N. 2007 Introduction to Network Security. Charles River Media.
  2. Lehtinen, R. 2006 Computer Security Basics. O'Reilly.
  3. Cobb, C. 2004 Cryptography for Dummies. John Wiley & Sons.
  4. Sedgewick, R. and Wayne, K. 2007 Introduction to Programming in Java: An Interdisciplinary Approach. Addison-Wesley.
  5. Paar, C. and Pelzl, J. 2010 Understanding Cryptography. springer.
  6. Stallings, W. 2011 Cryptography and Network Security Principles and Practices. Prentice Hall.
  7. Peterson, L. L. and Davie, B. S. 2007 Computer Networks: a systems approach. Morgan Kaufmann Publishers.
  8. Bishop, M. 2002 Computer Security: Art and Science. Addison Wesley.
  9. Forouzan, B. A. 2010 TCP/IP Protocol Suite. McGraw-Hill.
  10. Pfleeger, C. P. 2006 Security in Computing. Prentice Hall.
  11. Borda, M. 2011 Fundamentals in Information Theory and Coding. Springer.
  12. Mollin, R. A. 2005 Codes: The Guide to Secrecy from Ancient to Modern Times. Chapman & Hall/CRC.
Index Terms

Computer Science
Information Sciences

Keywords

Polybius square Polybius cipher