{"title":"Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic","authors":"Oleksandr Mamro, Andrii Lagun","doi":"10.23939/acps2021.01.027","DOIUrl":null,"url":null,"abstract":"The improvement of homophonic encryption using the well-known Z408 cipher as an example has been examined in this article. Their problems to further correct the main shortcomings of this type of encryption have been analyzed. In the practical part, an encryption system similar to Z408 has been created and the complexity of the language analysis for this cipher has been increased. The correlation data of the number of alternative characters has been used to improve the transmission of encrypted data depending on the load of the device. The more symbols and the higher the load, the fewer the number of alternative symbols will be used.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23939/acps2021.01.027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The improvement of homophonic encryption using the well-known Z408 cipher as an example has been examined in this article. Their problems to further correct the main shortcomings of this type of encryption have been analyzed. In the practical part, an encryption system similar to Z408 has been created and the complexity of the language analysis for this cipher has been increased. The correlation data of the number of alternative characters has been used to improve the transmission of encrypted data depending on the load of the device. The more symbols and the higher the load, the fewer the number of alternative symbols will be used.