Encoding syriac letters in partition theory using extended Vigenere cipher
Keywords:partition theory, beta numbers, Vigenere cipher, Syriac letters, English letters
AbstractSince the topic of e-Abacus diagram appeared in 1978 through its application within the partition theory, where this representation was one of the ideas of cryptography, many researchers study this subject from a purely theoretical perspective without practical application to it. Many researchers have shown interest in it by starting to apply purely mathematically, but starting in the past few years they have been searching for ideas that serve the topic. This research deals with the Vigenere Cipher, which is one of the multialphabet ciphers and in the past it was one of the most popular ciphers. For its simplicity and resistance to frequency analysis tests for messages encoded with simple ciphers such as Caesar’s Cipher through. Its application to the Syriac letters, which is one of the oldest ancient languages, used exclusively when reading religious hymns, for Christians in some regions of the world and in other regions as a trading language. In 2017 it was carefully studied through the above diagram and made the application more confidential among its users in terms of trying to find a suitable agreement between the English language letters and Syriac. Special signs and symbols were used in the Syriac language to be able to address the problem of the difference in the number of letters between the two languages. As well as the possibility of using the Cipher between the letters of the Syriac language
Mathas, A. (1999). Iwahori-Hecke Algebras and Schur Algebras of the Symmetric Group. Vol. 15. University Lecture Series. doi: https://doi.org/10.1090/ulect/015
James, G. D. (1978). Some combinatorial results involving Young diagrams. Mathematical Proceedings of the Cambridge Philosophical Society, 83 (1), 1–10. doi: https://doi.org/10.1017/s0305004100054220
Mahmood, A. (1999). On The Intersection of Young's Diagrams Core. Journal of Education and Science, 24 (3), 149–157. doi: https://doi.org/10.33899/edusj.1999.58795
Sami, H. H., Mahmood, A. S. (2017). Syriac Letters and James Diagram (A). International Journal of Enhanced Research in Science, Technology & Engineering, 6 (12), 54–62.
Dweik, B. S., Al-Obaidi, T. A. (2014). Syriac language Maintenance among the Assyrians of Iraq. Journal of Sociology and Social Work, 2 (1), 269–282.
Rollinger, R. (2006). The Terms “Assyria” and “Syria” Again. Journal of Near Eastern Studies, 65 (4), 283–287. doi: https://doi.org/10.1086/511103
Stallings, W. (2017). Cryptography and Network Security Principles and Practices. Seventh Edition. Pearson Education, 767.
Alsaleem, N. Y. A., Kashmoola, M. A., Moskalets, M. (2018). Analysis of the efficiency of spacetime access in the mobile communication systems based on an antenna array. Eastern-European Journal of Enterprise Technologies, 6 (9 (96)), 38–47. doi: https://doi.org/10.15587/1729-4061.2018.150921
Singh, Y. K. (2012). Generalization of Vigenere Cipher. ARPN Journal of Engineering and Applied Sciences, 7 (1), 39–44.
Mohammed, A.-A., Olaniyan, A. (2016). Vigenere Cipher: Trends, Review and Possible Modifications. International Journal of Computer Applications, 135 (11), 46–50. doi: https://doi.org/10.5120/ijca2016908549
How to Cite
Copyright (c) 2020 Hadil H. Sami, Ammar S. Mahmood
This work is licensed under a Creative Commons Attribution 4.0 International License.
Our journal abides by the Creative Commons CC BY copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons CC BY , which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.