Posts

Showing posts from December 15, 2025

Reviewing research papers for Vigenère and Playfair ciphers

Vigenère Cipher Paper Review The article Message Security in Classical Cryptography Using the Vigenere Cipher Method , published in the International Journal Software Engineering and Computer Science (IJSECS) by Lembaga KITA in April 2024, examines the Vigenère cipher, a classical polyalphabetic substitution technique introduced by Blaise de Vigenère. The paper explains how the cipher works by using a repeating key to obscure letter frequency patterns, making it more secure than monoalphabetic substitution ciphers. The authors also discuss the historical significance of the Vigenère cipher and its role in classical cryptography, while connecting it to modern discussions about message confidentiality. I found this article to be fairly thorough in covering the historical background and fundamental mechanics of the Vigenère cipher. The explanations are clear and easy to follow, especially in showing how the cipher improves upon simpler substitution methods. The inclusion of both streng...

A Small Blog of Resources for Computer Cybersecurity Professionals (Social Engineering and Ethical Hacking)

Introduction Cybersecurity professionals must understand both human and technical aspects of security. Two of the most important concepts in this field are social engineering and ethical hacking. These concepts help security professionals identify weaknesses, protect systems and educate users about threats in the real world. Social Engineering Social engineering is a technique used by attackers to manipulate people into revealing confidential information or performing actions that compromise security. Instead of attacking systems directly, social engineers exploit human behavior such as trust, fear, curiosity or urgency. This makes social engineering especially dangerous because even the most secure systems can be compromised if users are deceived. A common example of social engineering is phishing. In a phishing attack, an attacker sends an email that appears to come from a trusted organization, such as a bank or employer, asking the user to click a link or provide login credential...