ISSN 2278-3091 Jan Carlo T. Arroyo et al., International Journal ofVolume Advanced 9, Trends No.3, in May Computer - June Science 2020 and Engineering, 9(3), May – June 2020, 3798 – 3808 International Journal of Advanced Trends in Computer Science and Engineering Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse198932020.pdf https://doi.org/10.30534/ijatcse/2020/198932020 Polybius Square in Cryptography: A Brief Review of Literature Jan Carlo T. Arroyo1, Cristina E. Dumdumaya2, Allemar Jhone P. Delima3 1,3College of Computing Education, University of Mindanao, Davao City, Davao del Sur, Philippines 1,2College of Information and Computing, University of Southeastern Philippines, Davao City, Davao del Sur, Philippines 3College of Engineering, Technology and Management, Cebu Technological University-Barili Campus, Cebu, Philippines
[email protected],
[email protected],
[email protected] concerns data integrity, confidentiality, authentication to a ABSTRACT wireless communication system, and several other security services where information transfer between different users Cryptography is a method to secure sensitive data for storage takes place [10]–[12]. To protect the information, data are and communication in the presence of third parties called transformed into an unintelligible format using varied cipher adversaries. One of the first recorded incidents of technologies [15]. Maintaining data integrity and security is cryptography occurred in Ancient Rome, where the Polybius done through cipher whose bottleneck for an optimal cipher, also known as Polybius square, was developed. The implementation relies on the cipher used. A cipher is an Polybius cipher has been used as an advantage in winning algorithm responsible for both the encryption and decryption wars over enemies according to history and is also utilized as processes of a file being protected.