Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

Quantitative Study of Text Encryption Models
Darko Brodic, Ivo R. Draganov, Zoran N. Milivojevic
University of Belgrade, Vojske Jugoslavije 12, 19210 Bor, Serbia., Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria., College of Applied Technical Sciences, Aleksandra Medvedeva 20, 18000 Niš, Serbia
Abstract: There is a need to learn the efficiency of the different text encryption methods. Several models use identical ways with multiple keys to encrypt and decoding of texts. Thus, naturally these models have varied degrees of efficiency of the input as well as output data. These are changed to many text documents, using several languages. We in this work used quantitative study of issues using the illustrations from many text encryption programs. The experimental findings lead to understand the variation of the encryption programs and we intend to further research.
Keywords: Algorithm, Cipher, Cryptography, Encryption, Software, Statistical Analysis Quantitative Study of Text Encryption Models
DOI:https://doi.org/10.6025/isej/2021/8/1/8-16
Full_Text   PDF 1.86 MB   Download:   220  times
References:

1] Menezes, A.J., van Oorschot, P. C., Vanstone, S. A. (1996). Handbook of Applied Cryptography, Boca Raton, CRC Press.
[2] Paar, P C., Pelzl, J. (2010). Understanding Cryptography, New York, Springer, 2010.
[3] http://listoffreeware.com/list-best-free-text-encryption-software/
[4] Higgins, J. (2006). The Radical Statistician: A Beginners Guide to Unleashing the Power of Applied Statistics in The Real World (5th Ed.), Jim Higgins Publishing, 2006.
[5] Chi Yau, R. (2015). Tutorial with Bayesian Statistics Using OpenBUGS, Kindle Book, 2015.


Copyright 2013 socio.org.uk