Encoding syriac letters in partition theory using extended Vigenere cipher

Authors

  • Hadil H. Sami University of Al-Hamdaniya Ninavah, 79CF+PV, Bakhdida, Hamdaniya, Iraq, 41006
  • Ammar S. Mahmood University of Mosul Ninavah, 102, Mosul, Iraq, 41002 http://orcid.org/0000-0001-8799-5503

DOI:

https://doi.org/10.15587/1729-4061.2020.196831

Keywords:

partition theory, beta numbers, Vigenere cipher, Syriac letters, English letters

Abstract

Since the topic of e-Abacus diagram appeared in 1978 through its application within the partition theory, where this representation was one of the ideas of cryptography, many researchers study this subject from a purely theoretical perspective without practical application to it. Many researchers have shown interest in it by starting to apply purely mathematically, but starting in the past few years they have been searching for ideas that serve the topic. This research deals with the Vigenere Cipher, which is one of the multi­alphabet ciphers and in the past it was one of the most popular ciphers. For its simplicity and resistance to frequency analysis tests for messages encoded with simple ciphers such as Caesar’s Cipher through. Its application to the Syriac letters, which is one of the oldest ancient languages, used exclusively when reading religious hymns, for Christians in some regions of the world and in other regions as a trading language. In 2017 it was carefully studied through the above diagram and made the application more confidential among its users in terms of trying to find a suitable agreement between the English language letters and Syriac. Special signs and symbols were used in the Syriac language to be able to address the problem of the difference in the number of letters between the two languages. As well as the possibility of using the Cipher between the letters of the Syriac language

Author Biographies

Hadil H. Sami, University of Al-Hamdaniya Ninavah, 79CF+PV, Bakhdida, Hamdaniya, Iraq, 41006

Assistant

Department of Mathematics

College of Education

Ammar S. Mahmood, University of Mosul Ninavah, 102, Mosul, Iraq, 41002

Doctor of Mathematics, Рrofessor

Department of Mathematics

College of Education for Pure Science

References

Mathas, A. (1999). Iwahori-Hecke Algebras and Schur Algebras of the Symmetric Group. Vol. 15. University Lecture Series. doi: https://doi.org/10.1090/ulect/015

James, G. D. (1978). Some combinatorial results involving Young diagrams. Mathematical Proceedings of the Cambridge Philosophical Society, 83 (1), 1–10. doi: https://doi.org/10.1017/s0305004100054220

Mahmood, A. (1999). On The Intersection of Young's Diagrams Core. Journal of Education and Science, 24 (3), 149–157. doi: https://doi.org/10.33899/edusj.1999.58795

Sami, H. H., Mahmood, A. S. (2017). Syriac Letters and James Diagram (A). International Journal of Enhanced Research in Science, Technology & Engineering, 6 (12), 54–62.

Dweik, B. S., Al-Obaidi, T. A. (2014). Syriac language Maintenance among the Assyrians of Iraq. Journal of Sociology and Social Work, 2 (1), 269–282.

Rollinger, R. (2006). The Terms “Assyria” and “Syria” Again. Journal of Near Eastern Studies, 65 (4), 283–287. doi: https://doi.org/10.1086/511103

Stallings, W. (2017). Cryptography and Network Security Principles and Practices. Seventh Edition. Pearson Education, 767.

Alsaleem, N. Y. A., Kashmoola, M. A., Moskalets, M. (2018). Analysis of the efficiency of space­time access in the mobile communication systems based on an antenna array. Eastern-European Journal of Enterprise Technologies, 6 (9 (96)), 38–47. doi: https://doi.org/10.15587/1729-4061.2018.150921

Singh, Y. K. (2012). Generalization of Vigenere Cipher. ARPN Journal of Engineering and Applied Sciences, 7 (1), 39–44.

Mohammed, A.-A., Olaniyan, A. (2016). Vigenere Cipher: Trends, Review and Possible Modifications. International Journal of Computer Applications, 135 (11), 46–50. doi: https://doi.org/10.5120/ijca2016908549

Downloads

Published

2020-02-29

How to Cite

Sami, H. H., & Mahmood, A. S. (2020). Encoding syriac letters in partition theory using extended Vigenere cipher. Eastern-European Journal of Enterprise Technologies, 1(2 (103), 37–46. https://doi.org/10.15587/1729-4061.2020.196831