Abstract
Before letter frequency analysis and the formation of the black chambers, the basic monoalphabetic substitution ciphers were practically unbreakable and sufficient for common use. But as encryption became used more widely, the need to break these cryptosystems became inevitable. With the development of letter frequency analysis and advancement of black chambers, each message encrypted with a type of monoalphabetic substitution was easily broken. As soon as a commonly used monoalphabetic substitution cipher was broken, the word spread and that particular cryptosystem was useless. The affine cipher is simply a special case of the more general monoalphabetic substitution cipher. In this paper, we study the affine cipher and generalized affine cipher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barr, T.H.: Invitation to Cryptology. Prentice Hall, Inc., Upper Saddle River (2002)
Castaneda, R.G.: Using Classical Ciphers in Secondary Mathematics, THESIS, Presented to the Honors Committee of McMurry University (2009)
Flannery, S., Flannery, D.: In Code: A Mathematical Journey. Algonquin Books of Chapel Hill, Chapel Hill (2001)
Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28, 657–715 (1949)
Singh, S.: The Code Book. Anchor Books, New York (1999)
Wrixon, F.B.: Codes, Ciphers, Secrets and Cryptic Communication. Black Dog and Leventhal Publishers, Inc., New York (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kazemi, M., Naraghi, H., Golshan, H.M. (2011). On the Affine Ciphers in Cryptography. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)