A functional approach to encoding and decoding a cryptogram
This thesis presents an application of functions and their inverses in encoding and decoding a cryptogram. The process of transforming a message into its unintelligible form is known as encoding or encryption. On the other hand, the reverse process of converting the encoded message back into its ori...
Saved in:
Main Authors: | , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
1996
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/16297 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
id |
oai:animorepository.dlsu.edu.ph:etd_bachelors-16810 |
---|---|
record_format |
eprints |
spelling |
oai:animorepository.dlsu.edu.ph:etd_bachelors-168102022-02-08T01:13:27Z A functional approach to encoding and decoding a cryptogram Canlas, Joselito P. Dequito, Joseph C. This thesis presents an application of functions and their inverses in encoding and decoding a cryptogram. The process of transforming a message into its unintelligible form is known as encoding or encryption. On the other hand, the reverse process of converting the encoded message back into its original form is known as decoding process. A function is utilized to encode a message converted into its ASCII values while the corresponding inverse function is applied to the encoded message to retrieve back the original message.The coding schemes illustrated in this study use four types of functions: linear functions, quadratic functions, linear modular arithmetic functions, and the exponential modular arithmetic functions. All of the concepts used in this study are based on the results given by James Reagan in his article entitled Get the Message? Cryptograph, Mathematics and Computers . The article does not include any mathematical definitions but only describes each coding scheme by showing how it is manipulated. The researchers provided the required definitions and concepts from Number Theory and also discussed each coding scheme derived from the function and its inverse. 1996-01-01T08:00:00Z text https://animorepository.dlsu.edu.ph/etd_bachelors/16297 Bachelor's Theses English Animo Repository Cryptography Signs and symbols Functions--Computer programs Programming (Mathematics) Coding theory |
institution |
De La Salle University |
building |
De La Salle University Library |
continent |
Asia |
country |
Philippines Philippines |
content_provider |
De La Salle University Library |
collection |
DLSU Institutional Repository |
language |
English |
topic |
Cryptography Signs and symbols Functions--Computer programs Programming (Mathematics) Coding theory |
spellingShingle |
Cryptography Signs and symbols Functions--Computer programs Programming (Mathematics) Coding theory Canlas, Joselito P. Dequito, Joseph C. A functional approach to encoding and decoding a cryptogram |
description |
This thesis presents an application of functions and their inverses in encoding and decoding a cryptogram. The process of transforming a message into its unintelligible form is known as encoding or encryption. On the other hand, the reverse process of converting the encoded message back into its original form is known as decoding process. A function is utilized to encode a message converted into its ASCII values while the corresponding inverse function is applied to the encoded message to retrieve back the original message.The coding schemes illustrated in this study use four types of functions: linear functions, quadratic functions, linear modular arithmetic functions, and the exponential modular arithmetic functions. All of the concepts used in this study are based on the results given by James Reagan in his article entitled Get the Message? Cryptograph, Mathematics and Computers . The article does not include any mathematical definitions but only describes each coding scheme by showing how it is manipulated. The researchers provided the required definitions and concepts from Number Theory and also discussed each coding scheme derived from the function and its inverse. |
format |
text |
author |
Canlas, Joselito P. Dequito, Joseph C. |
author_facet |
Canlas, Joselito P. Dequito, Joseph C. |
author_sort |
Canlas, Joselito P. |
title |
A functional approach to encoding and decoding a cryptogram |
title_short |
A functional approach to encoding and decoding a cryptogram |
title_full |
A functional approach to encoding and decoding a cryptogram |
title_fullStr |
A functional approach to encoding and decoding a cryptogram |
title_full_unstemmed |
A functional approach to encoding and decoding a cryptogram |
title_sort |
functional approach to encoding and decoding a cryptogram |
publisher |
Animo Repository |
publishDate |
1996 |
url |
https://animorepository.dlsu.edu.ph/etd_bachelors/16297 |
_version_ |
1772835061259829248 |