Skip to main content

Questions tagged [affine-cipher]

A type of monoalphabetic substitution cipher, wherein each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple function `(ax + b) mod m`.

1 vote
0 answers
64 views

I just got into homomorphic encryption and multiparty computation. I thought about the following protocol for number comparison. We use a treshold homomorphic encryption scheme (like the treshold ...
Olan's user avatar
  • 11
2 votes
1 answer
95 views

I'd like to create a custom type of sortable GUID by concatenating an 8-byte nanosecond timestamp, 6 random bytes, a 1-byte node number, and a 1-byte counter. But, such a precise timestamp can be used ...
aiootp's user avatar
  • 1,314
1 vote
1 answer
1k views

I was wondering where did affine cipher get its name from. I am curious to know its origin and how it is related to the cipher. The Affine Transformation page on Wikipedia states: In Euclidean ...
Josh's user avatar
  • 145
0 votes
0 answers
121 views

Assuming the alphabet of capital letters, if an affine linear cipher $v\to Av+b \bmod 26$ with block length $3$ maps plaintext ENCRYPTAGAIN to ciphertext ...
Prithvish111's user avatar
1 vote
2 answers
286 views

There are $26!$ permutations of the English alphabet. In Modern Cryptography textbook, William Easttom states that the basic formula for any affine cipher is $ax + b \equiv \pmod{26}$. I'm wondering ...
mark mark's user avatar
  • 113
0 votes
1 answer
247 views

I am currently solving a simple cryptanalysis problem where I need to decrypt a text file using frequency analysis. The text has been encrypted using an affine cipher over a 68 character alphabet ...
Mohamed Moustafa's user avatar
0 votes
0 answers
94 views

How do I decode some text that has been encoded like this: affine(vigenere(text, vigenere_key), *affine_key)? I don't know keys to either of them. At first I ...
Leam's user avatar
  • 1
3 votes
2 answers
2k views

I have a pen pal that I discuss with. In our latest discussion it was proposed to write a short message that is ciphered and have the other one find what it is, given some clues. I would like to ask ...
Lucian Viorel's user avatar
0 votes
3 answers
675 views

I am currently reading a paper titled "Another view of division property" and encountered the terms "Affine subspace" and "Linear subspace". I am new to the field and having some difficulties to ...
Radium's user avatar
  • 187
0 votes
0 answers
78 views

I am working on a project that requires encrypting messages with different ciphers. I am looking for the following ciphers: PRESENT, CLEFIA, LEA, Hill cipher, Affine cipher, Elliptic Curve ...
NotNotLogic's user avatar
0 votes
0 answers
35 views

If I have only the ciphertext but the alphabet and the value of a and b are all unknown ... how would I go about this? I understand decryption with the key and alphabet, that is fairly easy but if we ...
liz's user avatar
  • 1
1 vote
0 answers
54 views

Suppose that $x,y \in \mathbb{Z}_n$ with $\gcd(x−y,n) = 1$. Prove that for any $u,v \in \mathbb{Z}_n$ there is at most one affine permutation mapping $x$ to $u$ and $y$ to $v$.
Heaven's user avatar
  • 11
0 votes
0 answers
54 views

Suppose I consider the affine cipher defined by $E(x) = ax + b \bmod n$ on the standard alphabet of 26 letters. Which choices of $a$ and $b$ lead to proper encryption functions? Using the ...
princetongirl818's user avatar
-1 votes
1 answer
147 views

while encrypting the plaintext in an affine cipher we encrypt the alphabets with a=0,b=1,c=2,......z=25 and then use the modulo of 26. Can we instead use to encrypt the plaintext with a=1,b=2,c=3,....,...
shadow kh's user avatar
  • 101
2 votes
1 answer
1k views

If the AES S-Box is replaced with a linear or affine transformation, for instance the identity mapping $\sigma(x)=x$, does the cipher become entirely affine and hence trivially weak?
conchild's user avatar
  • 705

15 30 50 per page