Skip to main content

On the Affine Ciphers in Cryptography

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Abstract

Before letter frequency analysis and the formation of the black chambers, the basic monoalphabetic substitution ciphers were practically unbreakable and sufficient for common use. But as encryption became used more widely, the need to break these cryptosystems became inevitable. With the development of letter frequency analysis and advancement of black chambers, each message encrypted with a type of monoalphabetic substitution was easily broken. As soon as a commonly used monoalphabetic substitution cipher was broken, the word spread and that particular cryptosystem was useless. The affine cipher is simply a special case of the more general monoalphabetic substitution cipher. In this paper, we study the affine cipher and generalized affine cipher.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barr, T.H.: Invitation to Cryptology. Prentice Hall, Inc., Upper Saddle River (2002)

    Google Scholar 

  2. Castaneda, R.G.: Using Classical Ciphers in Secondary Mathematics, THESIS, Presented to the Honors Committee of McMurry University (2009)

    Google Scholar 

  3. Flannery, S., Flannery, D.: In Code: A Mathematical Journey. Algonquin Books of Chapel Hill, Chapel Hill (2001)

    MATH  Google Scholar 

  4. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28, 657–715 (1949)

    MathSciNet  MATH  Google Scholar 

  5. Singh, S.: The Code Book. Anchor Books, New York (1999)

    Google Scholar 

  6. Wrixon, F.B.: Codes, Ciphers, Secrets and Cryptic Communication. Black Dog and Leventhal Publishers, Inc., New York (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kazemi, M., Naraghi, H., Golshan, H.M. (2011). On the Affine Ciphers in Cryptography. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics