Monoalphabetic cipher is an encryption substitution method that maps each alphabet to another alphabet randomly. This method is different from the Caesar cipher, which only shifts the alphabet. In addition, in monoalphabetic ciphers, substitution tables are used to store keys, where these keys are useful for mapping alphabets from plaintext to ciphertext. However, in reality the use of substitution tables still has difficulties. Based on this, an idea emerged to analyze whether the substitution table could be replaced by a mathematical equation to be used as a key to the monoalphabetic cipher. And in this case, the mathematical equation used is a quadratic equation.  
Salah satu proses komunikasi dan pertukaran data yang aman adalah komunikasi yang melibatkan proses ...
The rising threats to information security are increasing at an alarming rate. The most powerful and...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...
Encryption and Decryption of information is vital in many communication methods and systems as it pr...
The mono-alphabetic substitution cipher provides the simplest form of cryptography, where the cipher...
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
Cryptography is considered to be a disciple of science of achieving security by converting sensitive...
Polialfabetske supstitucijske šifre, od kojih je prva bila Albertijeva šifra, predstavile su značaja...
The study of cryptography and cryptanalysis is often complex and involves multiple sophisticated com...
Green Computing for Sustainability Pengembangan Tekonologi Informasi dan Komunikasi yang Ramah Ling...
This thesis describes a system of algorithms which have been implemented on a digital computer in an...
It is possible to cryptanalyze simple substitution ciphers (both monoand polyalphabetic) by using a ...
Today, security is a vital concern in computer science, cryptography is used vastly for implementati...
Substitution ciphers are one of the simplest forms of encryption, where replacement rules are provid...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...
Salah satu proses komunikasi dan pertukaran data yang aman adalah komunikasi yang melibatkan proses ...
The rising threats to information security are increasing at an alarming rate. The most powerful and...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...
Encryption and Decryption of information is vital in many communication methods and systems as it pr...
The mono-alphabetic substitution cipher provides the simplest form of cryptography, where the cipher...
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
Cryptography is considered to be a disciple of science of achieving security by converting sensitive...
Polialfabetske supstitucijske šifre, od kojih je prva bila Albertijeva šifra, predstavile su značaja...
The study of cryptography and cryptanalysis is often complex and involves multiple sophisticated com...
Green Computing for Sustainability Pengembangan Tekonologi Informasi dan Komunikasi yang Ramah Ling...
This thesis describes a system of algorithms which have been implemented on a digital computer in an...
It is possible to cryptanalyze simple substitution ciphers (both monoand polyalphabetic) by using a ...
Today, security is a vital concern in computer science, cryptography is used vastly for implementati...
Substitution ciphers are one of the simplest forms of encryption, where replacement rules are provid...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...
Salah satu proses komunikasi dan pertukaran data yang aman adalah komunikasi yang melibatkan proses ...
The rising threats to information security are increasing at an alarming rate. The most powerful and...
Ciphers have been used throughout history to keep information secret [3]. Text ciphers work by apply...