Using Improved Homophonic Encryption on the Example of Code Zodiac Z408 to Transfer Encrypted Information Based on Data Traffic

: pp. 27 - 32
Lviv Polytechnic National University, Ukraine
Lviv Polytechnic National University, Ukraine

The improvement of homophonic encryption using the well-known Z408 cipher as an example has been examined in this article. Their problems to further correct the main shortcomings of this type of encryption have been analyzed. In the practical part, an encryption system similar to Z408 has been created and the complexity of the language analysis for this cipher has been increased. The correlation data of the number of alternative characters has been used to improve the transmission of encrypted data depending on the load of the device. The more symbols and the higher the load, the fewer the number of alternative symbols will be used.

  1. Polyalphabetic cipher. [Online]. Available:
  2. Analysis of the Zodiac 340-cipher. [Online]. Available: https://
  3. D. Welsh, “Codes and Cryptography”. Clarendon Press, Oxford, 1988.
  4. Elonka Dunin, Klaus Schmeh, “Code Breaking and Cryptograms”, A Practical Guide, Robinson, 2020, ISBN 978-1-472-14421-8.
  5. H. Beker and F. Piper, “Cipher Systems”, Northwood Books, London, 1982.
  6. Bruce Schneier, “Applied Cryptography. Protocols, Algorithms, and Source Code in C”, John Wiley & Sons, 1996.
  7. Welsh, Dominic (1988). Codes and Cryptography, Oxford University Press, A brief textbook intended for undergraduates.
  8. Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. Similar in intent to Applied Cryptography but less comprehensive.
  9. Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
  10. Mao, Wenbo (2004). Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography.
  11. Gaines, Helen Fouché (1939). Cryptanalysis, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice.
  12. Katz, Jonathan and Lindell, Yehuda (2007 and 2014). Introduction to Modern Cryptography,[2] CRC Press.
  13. Falconer, John (1685). Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key. One of the earliest English texts on cryptography.
  14. Aumasson, Jean-Philippe (2017), Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press, 2017.
  15. Anderson, Ross — Security Engineering, Wiley, ISBN 0-471- 38922-6 (online version), advanced coverage of computer security issues, including cryptography. [Online]. Available:
  16. Boak, David G. A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures, National Security Agency (NSA), 1973 [Online] Available: C_Boak_NSA_1973u.pdf
  17. Budiansky, Stephen, Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union (Knopf, 2016). (ISBN 0385352662)
  18. Marks, Leo, Between Silk and Cyanide: a Codemaker’s Story, 1941-1945, (HarperCollins, 1998). (ISBN 0-684- 86780-X)
  19. Levy, Steven — Crypto: How the Code Rebels Beat the Government — Saving Privacy in the Digital Age (ISBN 0- 14-024432-8)
  20. Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher Kasparek, Frederick, MD, 1984
  21. Yardley, Herbert, The American Black Chamber (ISBN 0- 345-29867-5), a classic 1931 account of American code- breaking during and after World War I; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7)

Uncaught exception thrown in session handler.

PDOException: SQLSTATE[23000]: Integrity constraint violation: 1062 Duplicate entry '0' for key 'uid': INSERT INTO {sessions} (sid, ssid, uid, cache, hostname, session, timestamp) VALUES (:db_insert_placeholder_0, :db_insert_placeholder_1, :db_insert_placeholder_2, :db_insert_placeholder_3, :db_insert_placeholder_4, :db_insert_placeholder_5, :db_insert_placeholder_6); Array ( [:db_insert_placeholder_0] => 5spAkgG2CG_oodhttjlb1gxHSa7wWlW3ekPi7g6tUDU [:db_insert_placeholder_1] => 5spAkgG2CG_oodhttjlb1gxHSa7wWlW3ekPi7g6tUDU [:db_insert_placeholder_2] => 0 [:db_insert_placeholder_3] => 0 [:db_insert_placeholder_4] => [:db_insert_placeholder_5] => nodeviewcount_views_limit|a:1:{i:24545;O:8:"DateTime":3:{s:4:"date";s:26:"2023-03-27 17:44:43.000000";s:13:"timezone_type";i:3;s:8:"timezone";s:15:"Europe/Helsinki";}} [:db_insert_placeholder_6] => 1679928283 ) in _drupal_session_write() (line 209 of /home/science/public_html/includes/