Adaptive Affine Algorithm into Hash Function

  • Alaa Abd Al muhsen Hussain University of Al-Qadissiyah, College of Computer Science & IT, Departement of Computer Information Systems,
  • Rafid Nabil Jaffar University of Al-Qadissiyah, College of Computer Science & IT, Departement of Computer Information Systems,
  • Ali Saeed Dyem Departement of Computer Science, University of Al-Qadissiyah, College of Computer Science & IT
Keywords: Affine Cipher, Affine Algorithm, Hash Function, MD5, Descriptions of Method

Abstract

In affine cipher each letter in an alphabet is mapped to its numeric equivalent, encrypted using a simple mathematical function, and converted back to a letter. Each letter is enciphered with the function (ax + b) mod 26. Like ( ) and [ ( ) ( )] . Where is a key of summation, is a key of multiplication with him, is the number of an alphabets. The ( ) is inverse of multiplication key, is a plain text and is a cipher text[11]. An affine cipher, (like a shift cipher), is an example of a substitution cipher: In encryption using a substitution cipher, each time a given letter occurs in the plaintext, it always is replaced by the same cipher text letter. For example, the plaintext letter ‘e’ might be replaced by the cipher text letter ‘K’ each time it occurs. The method used for this replacement in affine encryption can be viewed as a generalization of the method used for encryption using a shift cipher. Shift ciphers are a particular type of affine cipher[4]. The encryption key for an affine cipher is an ordered pair of integers, both of which come from the set {0, . . . , n − 1}, where n is the size of the character set being used (for us, the character set is the English alphabet, so we have n = 26). It is important to note that some of the possible pairs of integers from the set {0, . . . , n − 1} are not valid as affine encryption keys. In this paper, we try to change the properties of affine algorithm from cipher and decipher to hash function and compare with MD5 in e-mail password [1]."According to the results of the analysis of the peculiarities of IT project implementation, it is proposed to consider the management of IT projects as a time-limited and resource-based set of interrelated actions aimed at achieving an intellectually intangible non-material result in the form of information systems / technologies in conditions of uncertainty regarding development technologies, customer requirements and customer needs. Despite the existence of certain patterned actions, IT projects that run "from scratch" require unconventional solutions and highly skilled implementers, as well as high degree of uncertainty"[8].
Published
2021-03-29
Section
Computer and Information Science