scholarly journals Penggunaan Karakter Kontrol ASCII Untuk Integrasi Data Pada Hasil Enkripsi Algoritma Caesar Cipher

2021 ◽  
Vol 6 (3) ◽  
pp. 197
Author(s):  
Nur Putrananda Setyapuji Winarno ◽  
Triawan Adi Cahyanto

Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.

2018 ◽  
Vol 7 (4.10) ◽  
pp. 1
Author(s):  
Krishnaja. R. ◽  
Parameswaran. R.

The security of information passed through the communication channel has become a major concern. Encoding of the messages before transmitting through the channel is most vital. We propose a three level encryption (encoding) using musical notes in traditional Indian and Western system as well as the American Standard Code for Information Interchange (ASCII). A unique method for the decryption is also mentioned in the paper.  


2020 ◽  
Vol 9 (6) ◽  
pp. 2555-2561
Author(s):  
Azizi Abas ◽  
Yuhanis Yusof ◽  
Roshidi Din ◽  
Fazli Azali ◽  
Baharudin Osman

Quick response (QR) code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. There are many existing researches on coloured QR code to increase the storage capacity but from time to time the storage capacity still need to be improved. This paper proposes the use ofcompress, multiplexing and multilayered techniques, as an integrated technique known as CoMM, to increase the storage of the existing QR code. The American Standard Code for Information Interchange (ASCII) text characters are used as an input and performance is measured by the number of characters that can be stored in a single black and white QR code version 40. The experiment metrics also include percentage of missing characters, number of produced QR code, and elapsed time to create the QR code. Simulation results indicate that the proposed algorithm stores 24 times more characters than the black and white QR code and 9 times more than other coloured QR code. Hence, this shows that the coloured QR code has the potential of becoming useful mini-data storage as it does not rely on internet connection.


2021 ◽  
Author(s):  
Sajini S ◽  
Mary Anita E.A ◽  
J Janet

Abstract Now-a-days, with the augmenting accident statistics, Vehicular Ad-hoc Networks (VANET) are turning out to be more popular, which in-turn eradicates accidents in addition to damage to the vehicles together with populace. In a VANET, message can well be transmitted within a pre-stated region to attain safety of a system and also its efficacy. Next, it is challenge to ensure authenticity of messages in such a dynamic environment. Though some researchers have already worked on this, security has not been much focussed. Thus, secured data communication with enhanced security on the VANET environment utilizing the American Standard Code for Information Interchange centred Elliptic Curve Cryptography (ASCII-ECC) is proposed. The proposed scheme allows all vehicles to register with the Trusted Authority (TA) and uses Median-centred K-Means (MKM) to find out the cluster head among all cluster and at the last phase verification is done by TA. The performance of the proposed algorithm ASCII-ECC is analysed and proved that the system renders better performance when it is weighed against the top-notch methods.


1996 ◽  
Vol 6 (1) ◽  
pp. 76-79
Author(s):  
Douglas A. Hopper

One should choose the simplest form of a model as a tool that adequately represents the processes and relationships of interest. ROSESIM was first developed in SLAM II and FORTRAN to run on a mainframe computer, where it had few users and it was cumbersome to learn and use. As use of models on a personal computer (PC) has become more popular for instruction and simulation, ROSESIM was translated first into the American Standard Code for Information Interchange (ASCII) to run in the Beginner's All-purpose Symbolic Instruction Code (BASIC) language in the popular Microsoft Disk Operating System (MS-DOS). As graphical user interface (GUI) Windows applications have gained increased popularity, ROSESIM has been translated into C++ as object-oriented programming (OOP) to run inside Microsoft Windows 3.1. This makes ROSESIM for Windows readily available to virtually every PC user. Features of ROSESIM for Windows are listed and discussed.


2013 ◽  
Author(s):  
Seth Bernstein

This lesson shows how to use Python to transliterate automatically a list of words from a language with a non-Latin alphabet to a standardized format using the American Standard Code for Information Interchange (ASCII) characters.


Sign in / Sign up

Export Citation Format

Share Document