An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic
International Journal of Computer and Information Engineering, Vol:17, No:10, 2023 The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. The insightful e...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | International Journal of Computer and Information Engineering,
Vol:17, No:10, 2023 The question that is a motivation of writing is how many devote themselves to
discovering something in the world of science where much is discerned and
revealed, but at the same time, much is unknown. The insightful elements of
this algorithm are the ciphering and deciphering algorithms of Playfair,
Caesar, and Vigenere. Only a few of their main properties are taken and
modified, with the aim of forming a specific functionality of the algorithm
called Latin Djokovic. Specifically, a string is entered as input data. A key k
is given, with a random value between the values a and b = a + 3. The obtained
value is stored in a variable with the aim of being constant during the run of
the algorithm. In correlation to the given key, the string is divided into
several groups of substrings, and each substring has a length of k characters.
The next step involves encoding each substring from the list of existing
substrings. Encoding is performed using the basis of the Caesar algorithm,
i.e., shifting with k characters. However, that k is incremented by 1 when
moving to the next substring in that list. When the value of k becomes greater
than b + 1, it will return to its initial value. The algorithm is executed,
following the same procedure, until the last substring in the list is
traversed. Using this polyalphabetic method, ciphering and deciphering of
strings are achieved. The algorithm also works for a 100-character string. The
x character is not used when the number of characters in a substring is
incompatible with the expected length. The algorithm is simple to implement,
but it is questionable if it works better than the other methods from the point
of view of execution time and storage space. |
---|---|
DOI: | 10.48550/arxiv.2403.01463 |