A Modified Polyalphabetic Technique for Arabic Letters Encryption

Document Type : Original Article

Author

National Telecommunication Institute, Cairo, Egypt

Abstract

The explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to an awareness of the need to protect data and resources from disclosure by using different cryptographic techniques. This paper provides a modified polyalphabetic symmetrical auto-key encryption technique for Arabic letters using a modified polyalphabetic cipher block chaining

Keywords


[1] W. Stallings, Cryptography and Network Security, Fourth Edition, Prentice Hall, 2006.
[2] W. Stallings, Network Security Essential, Second Edition, Prentice Hall, 2003.
[3] University of new Orleans, department of computer science web page, http://www.cs.uno.edu/~alayburn/notes/VigenereTable.htm, 2005.
[4] Kippenhahn, Rudolf.  Code Breaking: A History and Exploration.  The Overlook Press.  Woodstock and New York.  1999.
[5] B. Sadehiyan, A. Ghaemi, "Finding suitable Differetial characteristics for block ciphers with ant colony technique", IEEE computer communication, ISCC'04, July 2004.
[6] D. Mills, "Autokey version 2 protocol", university of Delaeare, Jan., 2003.
[7] S. Landau:"Standing the test of time : The data encryption standards," Notices of the AMS, 342-349, March 2000.
[8] M. Burton, "Securing wireless 802.11 networks", Cirond Technology Inc., April 2003.