NON - STANDARD SUBSTITUTIONAL CRYPTOGRAPHIC CODES

Authors

  • Melisa Azizovic University of Novi Pazar, Serbia
  • Emrus Azizovic University of Novi Pazar, Serbia

Keywords:

Cryptography, Substitution code, Pigpen code, Polybius square, random substitution codes

Abstract

Modern technologies that involve some form of communication, such as mobile phones, the Internet,
digital television, ATMs, generally use codes to ensure security and privacy. The paper deals with the analysis of
non-standard substitution codes. The aim of the paper is to show that today cryptosystems play a crucial role in
modern technology and to describe the cryptanalysis of non-standard substitution codes. In the first part, we listed
the definitions and basic terms that are necessary for successful monitoring of the content of the work. We defined
the concept of substitution code and showed with examples how to encrypt and decrypt text using various types of
codes. We have described the Pigpen cipher, the Polybius square, and random substitution ciphers. In order to meet
the set goals, we used the deduction method, the induction method, the historical method, the causal inference
method, the experimental method, as well as the analysis and synthesis methods.
The results of this and similar research indicate that there is a huge interest and necessity for the expansion and
improvement of cryptographic models, because today cryptosystems are crucial for modern technology, i.e.
technology that involves communication relies on codes to ensure security and privacy. After this basic analysis, a
more extensive analysis of other polyalphabetic substitution codes is planned. As well as improving the
implementation of proposed solutions in the field of substitution codes in those models. The proposed methods are
explained in detail and supported by concrete examples

Author Biography

Melisa Azizovic, University of Novi Pazar, Serbia

Department of Computer Science

References

Azizović, E., & Maznikar, B. (2019). Digital competences of public notaries, Knowledge in practice -International Journal, Vol. 35 No. 5.

Baumslag, G., Fine, B., Kreuzer, M., & Rosenberger, G. (2015). A Course in Mat- hematical Cryptography, De Gruyter, Boston.

Dujella, A. (2019). Teorija brojeva, Školska knjiga, Zagreb.

Dujella, A., & Maretić, M. (2007). Kriptografija, Element, Zagreb.

Ibrahimpašić, B. (2011). Kriptografija kroz primjere, Pedagoški fakultet Bihač.

Kahn, D. (1967). The Code-Breakers: The Story of Secret Writing, The Macmillan Company, New York.

Matić, I. (2015). Uvod u teoriju brojeva, Odjel za matematiku, Sveučilište u Osijeku.

Singh, S. (2003). Šifre : Kratka povijest kriptografije, Mozaik knjiga, Zagreb.

Veinović, M., & Adamović, S. (2013). Kriptologija 1, Univerzitet Singidunum, Beograd.

https://web.math.pmf.unizg.hr/~duje/kript/kriptografija.html, Pristupljeno: 24.5.2022.

https://www.boxentriq.com/code-breaking, Pristupljeno: 26.5.2022.

Downloads

Published

2022-12-16

How to Cite

Azizovic, M., & Azizovic, E. (2022). NON - STANDARD SUBSTITUTIONAL CRYPTOGRAPHIC CODES. KNOWLEDGE - International Journal , 55(3), 491–496. Retrieved from https://ikm.mk/ojs/index.php/kij/article/view/5804