Matches in SemOpenAlex for { <https://semopenalex.org/work/W101098056> ?p ?o ?g. }
Showing items 1 to 73 of
73
with 100 items per page.
- W101098056 endingPage "31" @default.
- W101098056 startingPage "19" @default.
- W101098056 abstract "1. INTRODUCTION Cryptology, the science of secret writing, is a great way to introduce students to different areas of mathematics such as number theory, linear algebra, probability and statistics. Cryptology consists of two branches: cryptography and cryptanalysis. Cryptography is the science of designing techniques for encrypting and decrypting a message. Cryptanalysis is the science of recovering plaintext (the original unencrypted form of a message) from ciphertext (the secret form of the message after encryption) without knowledge of the process used for encryption and decryption. Cryptography is separated into two main categories: private-key and public-key. For a discussion of these different categories see [1], [2], or [5]. Until 1978, when the paper Method for Obtaining Digital Signatures and Public Key Cryptosystems by Rivest, Shamir and Adelman was published in the journal Communications of the Association for Computing Machinery, all cryptography fell into the category of private-key. Since that time, private-key cryptography has largely given way to its public key counterpart [5]. However, some cryptosystems that employ both techniques have been developed. These cryptosy stems are typically called hybrids. In many hybrid cryptosystems the message is enciphered using a private-key algorithm, but the key for the private-key cryptosystem is transmitted using some type of public-key cryptography [2]. Hence it is still worthwhile to investigate private-key cryptosystems. One of the most famous, private-key cryptosystems is the Vigenere Cipher. Encryption and decryption using the Vigenere Cipher was originally described in terms of a table known as the Vigenere Square and a secret keyword. Like many other cryptosystems, it is quite easy to describe this cryptosystem mathematically using basic properties of modular arithmetic. A variety of techniques can be used to perform a cryptanalysis on a message that has been encrypted using the Vigenere Cipher. Most techniques require that a frequency analysis be done on either the entire message or on various parts of the message. After the frequency analysis is complete, there are ways to estimate the keyword length and use that information to determine the keyword. Once the keyword is determined a cryptanalyst can easily recover a message that was intended to be secret. More realistic applications of Vigenere Cipher encryption and decryption involve long messages, hence it is not practical to perform these processes by hand. Although it is common to use computers to do the work, the algorithms necessary to perform the computations required to encipher, decipher and cryptanalyze messages can easily be programmed into a TI-83 graphing calculator. The general concepts discussed above are available elsewhere, but it is our purpose here to show how they can be made available to students with lower level mathematics skills. We will also show how the TI-83 graphing calculator can perform the computations needed to implement the Vigenere Cipher, and a message encoded via the Vigenere Cipher will be cryptanalyzed using the TI-83. 3. THE VIGENERE CIPHER The Vigenere Cipher is named after the Frenchman Blaise de Vigenere and uses a table known as the Vigenere Square. An English form of the table is shown below. In the Vigenere Square, plaintext letters label the columns and keyword letters label the rows. The main entries of the table correspond to ciphertext letters. To use the Vigenere Cipher two correspondents must first agree upon a secret keyword or key phrase. We will briefly illustrate how one can encrypt and decrypt messages using the Vigenere Square. For a detailed explanation as well as some interesting historical background about the Vigenere Cipher, see [1], [2] or [5]. Suppose Michael wants to send Bill the message MATH IS COOL using the Vigenere Cipher with keyword DOG. Michael first writes down the plaintext and then writes the keyword repeatedly above the plaintext, character for character. …" @default.
- W101098056 created "2016-06-24" @default.
- W101098056 creator A5012120184 @default.
- W101098056 creator A5053072461 @default.
- W101098056 date "2004-01-01" @default.
- W101098056 modified "2023-09-26" @default.
- W101098056 title "The Vigenere Cipher with the Ti-83" @default.
- W101098056 hasPublicationYear "2004" @default.
- W101098056 type Work @default.
- W101098056 sameAs 101098056 @default.
- W101098056 citedByCount "1" @default.
- W101098056 crossrefType "journal-article" @default.
- W101098056 hasAuthorship W101098056A5012120184 @default.
- W101098056 hasAuthorship W101098056A5053072461 @default.
- W101098056 hasConcept C148730421 @default.
- W101098056 hasConcept C178489894 @default.
- W101098056 hasConcept C181149355 @default.
- W101098056 hasConcept C203062551 @default.
- W101098056 hasConcept C26517878 @default.
- W101098056 hasConcept C2780221543 @default.
- W101098056 hasConcept C33923547 @default.
- W101098056 hasConcept C38652104 @default.
- W101098056 hasConcept C41008148 @default.
- W101098056 hasConcept C6295992 @default.
- W101098056 hasConcept C80444323 @default.
- W101098056 hasConcept C92717368 @default.
- W101098056 hasConcept C93974786 @default.
- W101098056 hasConcept C94375191 @default.
- W101098056 hasConceptScore W101098056C148730421 @default.
- W101098056 hasConceptScore W101098056C178489894 @default.
- W101098056 hasConceptScore W101098056C181149355 @default.
- W101098056 hasConceptScore W101098056C203062551 @default.
- W101098056 hasConceptScore W101098056C26517878 @default.
- W101098056 hasConceptScore W101098056C2780221543 @default.
- W101098056 hasConceptScore W101098056C33923547 @default.
- W101098056 hasConceptScore W101098056C38652104 @default.
- W101098056 hasConceptScore W101098056C41008148 @default.
- W101098056 hasConceptScore W101098056C6295992 @default.
- W101098056 hasConceptScore W101098056C80444323 @default.
- W101098056 hasConceptScore W101098056C92717368 @default.
- W101098056 hasConceptScore W101098056C93974786 @default.
- W101098056 hasConceptScore W101098056C94375191 @default.
- W101098056 hasIssue "1" @default.
- W101098056 hasLocation W1010980561 @default.
- W101098056 hasOpenAccess W101098056 @default.
- W101098056 hasPrimaryLocation W1010980561 @default.
- W101098056 hasRelatedWork W1963642246 @default.
- W101098056 hasRelatedWork W2141258588 @default.
- W101098056 hasRelatedWork W2224098327 @default.
- W101098056 hasRelatedWork W2512556422 @default.
- W101098056 hasRelatedWork W2789067845 @default.
- W101098056 hasRelatedWork W2794295535 @default.
- W101098056 hasRelatedWork W2795297517 @default.
- W101098056 hasRelatedWork W2799001953 @default.
- W101098056 hasRelatedWork W2903282695 @default.
- W101098056 hasRelatedWork W2945902524 @default.
- W101098056 hasRelatedWork W2955189470 @default.
- W101098056 hasRelatedWork W2971925559 @default.
- W101098056 hasRelatedWork W2990789191 @default.
- W101098056 hasRelatedWork W3004244190 @default.
- W101098056 hasRelatedWork W3035634628 @default.
- W101098056 hasRelatedWork W3045948551 @default.
- W101098056 hasRelatedWork W3089209673 @default.
- W101098056 hasRelatedWork W3118273068 @default.
- W101098056 hasRelatedWork W3119917612 @default.
- W101098056 hasRelatedWork W3158202217 @default.
- W101098056 hasVolume "38" @default.
- W101098056 isParatext "false" @default.
- W101098056 isRetracted "false" @default.
- W101098056 magId "101098056" @default.
- W101098056 workType "article" @default.