ascii code
Recently Published Documents


TOTAL DOCUMENTS

51
(FIVE YEARS 17)

H-INDEX

3
(FIVE YEARS 0)

2022 ◽  
Vol 26 (4) ◽  
pp. 559-572
Author(s):  
Ibrahim Alattar ◽  
Abdul Monem S. Rahma

This paper has been developed to compare encryption algorithms based on individual magic squares and discuss the advantages and disadvantages of each algorithm or method. Where some positions of the magic square are assigned to the key and the remaining positions are assigned to the message, then the rows, columns and diagonals are summed and these results are as ciphertext and in the process of decryption the equations are arranged and solved by Gauss elimination metod. All algorithms were applied to encrypte the text and images, as well as using both GF(P) and GF(28), and the speed and complexity were calculated. The speed of MS9 by using GF(P) is 15.09085 Millie Second, while by using GF(28) it will be 18.94268 Millie Second, and the complexity is the value of the ASCII code raised to the exponent of the number of message locations multiplied by the value of the prime number raised to the exponent of the number of key locations.


2021 ◽  
Vol 6 (3) ◽  
pp. 197
Author(s):  
Nur Putrananda Setyapuji Winarno ◽  
Triawan Adi Cahyanto

Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.


Nanomaterials ◽  
2021 ◽  
Vol 11 (11) ◽  
pp. 2959
Author(s):  
Jianya Zhang ◽  
Min Jiang ◽  
Lifeng Bian ◽  
Dongmin Wu ◽  
Hua Qin ◽  
...  

Underwater wireless optical communication (UWOC) is a wireless communication technology using visible light to transmit data in an underwater environment, which has wide applications. Based on lift-off (In,Ga)N nanowires, this work has proposed and successfully demonstrated a self-powered photoelectrochemical (PEC) photodetector (PD) with excellent transmissivity. The transparent functionality of the PD is critical for 360° omnidirectional underwater detection, which was realized by detaching the (In,Ga)N nanowires from the opaque epitaxial substrates to the indium tin oxide (ITO)/glass. It was also found that the insulating SiO2 layer can enhance the photocurrent by about 12 times. The core–shell structure of the nanowires is beneficial for generating carriers and contributing to the photocurrent. Furthermore, a communication system with ASCII code is set to demonstrate the PD detection in underwater communication. This work paves an effective way to develop 360° omnidirectional PDs for the wide applications in UWOC system and underwater photodetection.


2021 ◽  
Vol 83 (1) ◽  
pp. 72-79
Author(s):  
O.A. Kan ◽  
◽  
N.A. Mazhenov ◽  
K.B. Kopbalina ◽  
G.B. Turebaeva ◽  
...  

The main problem: The article deals with the issues of hiding text information in a graphic file. A formula for hiding text information in image pixels is proposed. A steganography scheme for embedding secret text in random image pixels has been developed. Random bytes are pre-embedded in each row of pixels in the source image. As a result of the operations performed, a key image is obtained. The text codes are embedded in random bytes of pixels of a given RGB channel. To form a secret message, the characters of the ASCII code table are used. Demo encryption and decryption programs have been developed in the Python 3.5.2 programming language. A graphic file is used as the decryption key. Purpose: To develop an algorithm for embedding text information in random pixels of an image. Methods: Among the methods of hiding information in graphic images, the LSB method of hiding information is widely used, in which the lower bits in the image bytes responsible for color encoding are replaced by the bits of the secret message. Analysis of methods of hiding information in graphic files and modeling of algorithms showed an increase in the level of protection of hidden information from detection. Results and their significance: Using the proposed steganography scheme and the algorithm for embedding bytes of a secret message in a graphic file, protection against detection of hidden information is significantly increased. The advantage of this steganography scheme is that for decryption, a key image is used, in which random bytes are pre-embedded. In addition, the entire pixel bits of the container image are used to display the color shades. It can also be noted that the developed steganography scheme allows not only to transmit secret information, but also to add digital fingerprints or hidden tags to the image.


Author(s):  
Musthofa Galih Pradana ◽  
Pujo Hari Saputro ◽  
Bondan Wahyu Pamekas

<br /><em>Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic cryptographic algorithms that need to be modified so that they become more optimal in the data security process. The first modification is to modify the Vigenere key using Fibonacci. In general, Vigenere Cipher will repeat the same keyword to complete the number of characters that are lacking so that the number of characters is the same as the number of characters in the plaintext. The second modification is to change or convert plaintext letters into ASCII letters so that the code is more difficult to solve. After the ASCII conversion process is done, the next results will be converted back in Hexa letters. In addition to the two modifications made, the steganography technique is also added by hiding the code behind the media in the form of images. Images that are sampled will be renamed and stored in different places.</em>


Author(s):  
Ms. Prajakta Vikhe

Today computer and mobile based applications has become an integral part of our life. Thus, there arises a need of a reliable security while using these applications using authentication techniques that are most secured and hard to crack. Today many authentication techniques are introduced for better security and replace textual authentication technique. But these techniques are proving insufficient, so new ways should be studied and introduced for better security. So, we are concentrating on two such techniques, first we studied graphical authentication systems using images. The one such technique called gRat which uses set of images for authentication was found to be useful. The second for searching a different authentication technique we came across ENP which explains how to provide security using to an application by using hashing, ascii, negation and cryptography together for a secured application. So, we find out that one technique is insufficient and more than two techniques should be combined together. So, in this paper we are recommending a dual authentication technique. First technique will be used for login id and other will be used for login password. The first technique uses a set of images with specific border colors for authentication and is called Graphical random authentication technique (gRat). In this technique a set of images with different boundary colors are displayed for the user which are shown randomly each time a user attempts a login ID. The user has to select the same set of images with same boundary color in same format for login ID verification than only second technique for login password will be shown. The second technique uses encryption and negative password together called as Encrypted negative password (ENP). In this technique while deciding a password a plain textual password is accepted from the user and then it is converted to hash code using hashing algorithm. Then the hash code is converted to an ascii code od 0’s and 1’s. Then negation is applied to the ascii where we get a negative text. The negative text is then encrypted. This process is followed in reverse while authentication. After second correct verification main application will be started. Both authentication data will be secured by Advanced encryption standard (AES) algorithm and saved on cloud. We are using public cloud Google drive as our cloud as it is free and more secured. Thus, while testing the application for authentication using both techniques together our system becomes very secured and almost unbreakable.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Wenyu Zhang ◽  
Yaqun Zhao ◽  
Sijie Fan

In the field of information security, block cipher is widely used in the protection of messages, and its safety naturally attracts people’s attention. The identification of the cryptosystem is the premise of encrypted data analysis. It belongs to the category of attack analysis in cryptanalysis and has important theoretical significance and application value. This paper focuses on the extraction of ciphertext features and the construction of cryptosystem identification classifiers. The main contents and innovations of this paper are as follows. Firstly, inspired by language processing, we propose the feature extraction scheme based on ASCII statistics of ciphertexts which decrease the dimension of data preprocessing. Secondly, on the basis of previous work, we increase the types of block ciphers to eight, encrypt plaintext of the same sizes as experimental objects, and recognize the cryptosystem. Thirdly, we use two machine learning classifiers to perform classification experiments including random forest and SVM. The experimental results show that our scheme can not only improve the identification accuracy of 8 typical block cipher algorithms but also shorten the experimental time and reduce the computation load by greatly minimizing the dimension of the feature vector. And the various evaluation indicators obtained by the scheme have been greatly improved compared with the existing published literature.


2020 ◽  
Vol 1 ◽  
pp. 28-32
Author(s):  
Tsvetan Kaldashev

This article discusses the possibility of developing a postprocessor for turning center with 2 turrets and a multi-channel CNC system with NC program format characteristic of machine Mazak Integrex I series. Typical for these CNCs is the usage of two support programs - one for each turret. The CAD / CAM system PTC Creo is used to solve the problem, where tool transitions are developed for machining the workpieces. The postprocessor is software that translates the CL Data file i.e. turns it into a NC program with preparatory, technological, and supplementary commands to control the machine. G-POST, which is integrated into the PTC Creo CAD / CAM system, is used to develop the post-processor. To solve the problem, a specialized programming language FIL (Factory Interface Language) is used which, with its features and capabilities to work with files in ASCII code, achieves the ultimate goal - NC program in format characteristics suitable for machines Mazak Integrex I series.


2020 ◽  
Vol 4 (4) ◽  
pp. 627-634
Author(s):  
Fina Triana ◽  
Jon Endri ◽  
Irma Salamah

Information data security is an important aspect of exchanging data and information. Data and information security can be done in various ways, including by using the cesarean cipher method in cryptographic techniques. The cesarean cipher method of cryptographic technique is a substitution coding system which is done by replacing each alphabet character with other characters along the 26 alphabet characters so that the coding only occurs in the alphabet itself without any other punctuation. This study proposes a modification to the cesarean cipher technique by adding to the number of characters used, namely 256 characters in the ASCII code. The caesar cipher application or CaesarApp uses the methodology of library study, consultation, application design and application testing. The implementation of the CaesarApp application was created using the open-source Android Studio 3.5 application. The results of tests conducted on the CaesarApp application note that the modification of the caesar cipher with 256 ASCII characters results in a secure information data security application, this application has a deficiency in reading limitations on ASCII characters, so characters cannot be read properly on android users.


Sign in / Sign up

Export Citation Format

Share Document