Metric use in the Process of Text Encryption Software |
Darko Brodi, Ivo R. Draganov, Zoran N. Milivojevi Technical Faculty in Bor, University of Belgrade, Vojske Jugoslavije 12, 19210 Bor, Serbia., Faculty of Telecommunications at Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria., College of Applied Technical Sciences, Aleksandra Medv |
Abstract: We in this work detailed the various text encryption programs. These programs used many systems with different keys to encrypt and decode the encrypted text. However, a large number of them have varied efficacy in the relation between output and input data, i.e. encrypted and original data. This includes the documents which are adjusted to different text document, which includes various languages and scripts as well as multilingual documents, too. The results are able to analyse using various metrics of the problems on the example of 5 different text encryption programs. The experimental outcome documented the meaningful differences between different encryption programs, which were under research process. |
Keywords: Algorithm, Cipher, Cryptography, Encryption, Software, Statistical Analysis Metric use in the Process of Text Encryption Software |
DOI:https://doi.org/10.6025/jio/2020/10/4/128-135 |
Full_Text   PDF 1.51 MB   Download:   215  times |
References: [1] Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A. (1996). Handbook of Applied Cryptography, Boca Raton, CRC Press. |