Journal of Information Organization


Vol No. 10 ,Issue No. 4 2020

Metric use in the Process of Text Encryption Software
Darko Brodi, Ivo R. Draganov, Zoran N. Milivojevi
Technical Faculty in Bor, University of Belgrade, Vojske Jugoslavije 12, 19210 Bor, Serbia., Faculty of Telecommunications at Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria., College of Applied Technical Sciences, Aleksandra Medv
Abstract: We in this work detailed the various text encryption programs. These programs used many systems with different keys to encrypt and decode the encrypted text. However, a large number of them have varied efficacy in the relation between output and input data, i.e. encrypted and original data. This includes the documents which are adjusted to different text document, which includes various languages and scripts as well as multilingual documents, too. The results are able to analyse using various metrics of the problems on the example of 5 different text encryption programs. The experimental outcome documented the meaningful differences between different encryption programs, which were under research process.
Keywords: Algorithm, Cipher, Cryptography, Encryption, Software, Statistical Analysis Metric use in the Process of Text Encryption Software
DOI:https://doi.org/10.6025/jio/2020/10/4/128-135
Full_Text   PDF 1.51 MB   Download:   215  times
References:

[1] Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A. (1996). Handbook of Applied Cryptography, Boca Raton, CRC Press.
[2] Paar, P, C., Pelzl, J. (2010). Understanding Cryptography, New York, Springer.
[3] http://listoffreeware.com/list-best-free-text-encryption-software/
[4] Higgins, J. (2006). The Radical Statistician: A Beginners Guide to Unleashing the Power of Applied Statistics in The Real World (5th Ed.), Jim Higgins Publishing.
[5] Yau, Chi., R. (2015). Tutorial with Bayesian Statistics Using OpenBUGS, Kindle Book.