Methodological recommendations for implementing an encryption algorithm using a codeword in Python

The article offers theoretical and practical material on encryption and decryption of text messages using a codeword cipher. Is shown an example of the implementation of the algorithm for cryptographic transformations of the specified cipher in the Python programming language. The development and ex...

Full description

Saved in:
Bibliographic Details
Published inActa et commentationes Științe ale Educației Vol. 35; no. 1; pp. 87 - 96
Main Authors GRADINARI, Oxana, BOGDANOVA, Violeta, RUSSU, Nicolai
Format Journal Article
LanguageEnglish
Published 01.03.2024
Online AccessGet full text
ISSN1857-0623
2587-3636
2587-3636
DOI10.36120/2587-3636.v35i1.87-96

Cover

Abstract The article offers theoretical and practical material on encryption and decryption of text messages using a codeword cipher. Is shown an example of the implementation of the algorithm for cryptographic transformations of the specified cipher in the Python programming language. The development and execution of the Python program code was carried out in a free interactive cloud environment — Google Colab.
AbstractList The article offers theoretical and practical material on encryption and decryption of text messages using a codeword cipher. Is shown an example of the implementation of the algorithm for cryptographic transformations of the specified cipher in the Python programming language. The development and execution of the Python program code was carried out in a free interactive cloud environment — Google Colab.
Author GRADINARI, Oxana
RUSSU, Nicolai
BOGDANOVA, Violeta
Author_xml – sequence: 1
  givenname: Oxana
  orcidid: 0000-0003-2628-4251
  surname: GRADINARI
  fullname: GRADINARI, Oxana
– sequence: 2
  givenname: Violeta
  orcidid: 0000-0003-4140-6317
  surname: BOGDANOVA
  fullname: BOGDANOVA, Violeta
– sequence: 3
  givenname: Nicolai
  orcidid: 0009-0009-8307-6329
  surname: RUSSU
  fullname: RUSSU, Nicolai
BookMark eNqNkMlqwzAAREVJoWmaXyj6AaeyZGs5ltAlkNIechdaE4EtGdlp8N_XSUrPPQ0zw8zh3YNZTNEB8FiiFaElRk-45qwglNDVN6lDuZqcoDdg_pfPwLzkNSsQxeQOLPs-aFRVDDPG-RzoDzcckk1N2gejGpidSW3rolVDSLGHPmUY2q5xUzaEuIcqQhdNHrtzD1WzTzkMhxYe-0sLTbLulLKFIcKvcfqOD-DWq6Z3y19dgN3ry279Xmw_3zbr521hRE2LCnuOjHeaaIopZ5QZVNYEi1ppLpRQRldCWUa0JkZbxajj3iNWGVtxhwVZAHa9PcZOjSfVNLLLoVV5lCWSF1jyDEWeocgLLDk5QaclvS5NTn2fnf_v8AfdynO7
ContentType Journal Article
DBID AAYXX
CITATION
ADTOC
UNPAY
DOI 10.36120/2587-3636.v35i1.87-96
DatabaseName CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
EISSN 2587-3636
EndPage 96
ExternalDocumentID 10.36120/2587-3636.v35i1.87-96
10_36120_2587_3636_v35i1_87_96
GroupedDBID AAYXX
CITATION
M~E
ADTOC
UNPAY
ID FETCH-LOGICAL-c956-42f80cfeb3b6268767c0153295ab89a9acb49ad73bb3cbda76e8ff074cd48e293
IEDL.DBID UNPAY
ISSN 1857-0623
2587-3636
IngestDate Thu Aug 28 10:55:59 EDT 2025
Tue Jul 01 03:55:36 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c956-42f80cfeb3b6268767c0153295ab89a9acb49ad73bb3cbda76e8ff074cd48e293
ORCID 0000-0003-2628-4251
0009-0009-8307-6329
0000-0003-4140-6317
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.36120/2587-3636.v35i1.87-96
PageCount 10
ParticipantIDs unpaywall_primary_10_36120_2587_3636_v35i1_87_96
crossref_primary_10_36120_2587_3636_v35i1_87_96
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-03-00
PublicationDateYYYYMMDD 2024-03-01
PublicationDate_xml – month: 03
  year: 2024
  text: 2024-03-00
PublicationDecade 2020
PublicationTitle Acta et commentationes Științe ale Educației
PublicationYear 2024
SSID ssib044727788
Score 2.2509634
Snippet The article offers theoretical and practical material on encryption and decryption of text messages using a codeword cipher. Is shown an example of the...
SourceID unpaywall
crossref
SourceType Open Access Repository
Index Database
StartPage 87
Title Methodological recommendations for implementing an encryption algorithm using a codeword in Python
URI https://doi.org/10.36120/2587-3636.v35i1.87-96
UnpaywallVersion publishedVersion
Volume 35
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2587-3636
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044727788
  issn: 1857-0623
  databaseCode: M~E
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NT8IwFG8EDp78iBoxSnrwujHWrVuPxECICcgBEjwtbdfqIgyCQ4IH_3Zft0HQg8Fjs7yleXt97_fr3gdC91S5kpPY3NxrbnnMceBIea7FBFOO5lrEwlwN9Ae0N_YeJ_6kJIqmFmbv_z2B4Os0Xd-cAkqo_UH8pGXDitEKqlEfsHcV1caDYfvZsCrT08ih-Ty3nUxREvzHi35Eo-NVuuCbNZ9O90JM9xQ9bTdXZJa82atM2PLzV9_Gw3d_hk5KtInbhXmcoyOVXiDRz6dGb70eNpx4NlPldKV3DDAWJ7MyrxwiG-YpBltebnLvgvn0Zb5MstcZNjnz8BSbsvg1kFicpHi4Mc0ILtGo2xk99Kxy1IIlTSNCz9WhIzUQawEEBxxkIAEmEJf5XISMMy6Fx3gcECGIFDEPqAq1BvQhYy9UgBiuUDWdp-oaYS8OTMyjsa9iD8hL2AqUbOlQ8kC6gSZ11NxqPFoUDTUiICK5uiKjrsioK8rVFcGK0Tpydh_mQJGb_4vcomq2XKk7gBiZaKBK_6vTKK3rG10myoA
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8JAEN4oHDz5iBoxavbgtaV02233SIyEmIAcIMFTs09thEKwSPDXO9sWgh4MHjfNNJvp7Mz3beeB0D3VvuRE2Zt7w52AeR4cqcB3mGDaM9wIJezVQK9Pu6PgaRyOK6Joa2F2_t8TCL5e0w_tKaCEup8kTFsurBg9RHUaAvauofqoP2i_WFZlexp5tJjntpUpS4L_eNGPaHS0zOZ8veKTyU6I6Zyg583mysySd3eZC1d-_erbuP_uT9FxhTZxuzSPM3Sgs3MkesXU6I3Xw5YTT6e6mq70gQHG4nRa5ZVDZMM8w2DLi3XhXTCfvM4Waf42xTZnHp5iWxa_AhKL0wwP1rYZwQUadh6HD12nGrXgSNuIMPBN7EkDxFoAwQEHGUmACcRnIRcx44xLETCuIiIEkULxiOrYGEAfUgWxBsRwiWrZLNNXCAcqsjGPqlCrAMhL3Iq0bJlY8kj6kSEN1NxoPJmXDTUSICKFuhKrrsSqKynUlcCK0Qbyth9mT5Hr_4vcoFq-WOpbgBi5uKvs6huisclP
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Methodological+recommendations+for+implementing+an+encryption+algorithm+using+a+codeword+in+Python&rft.jtitle=Acta+et+commentationes%3A+%C8%98tiin%C8%9Be+ale+Educa%C8%9Biei&rft.au=GRADINARI%2C+Oxana&rft.au=BOGDANOVA%2C+Violeta&rft.au=RUSSU%2C+Nicolai&rft.date=2024-03-01&rft.issn=1857-0623&rft.eissn=2587-3636&rft.volume=35&rft.issue=1&rft.spage=87&rft.epage=96&rft_id=info:doi/10.36120%2F2587-3636.v35i1.87-96&rft.externalDBID=n%2Fa&rft.externalDocID=10_36120_2587_3636_v35i1_87_96
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1857-0623&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1857-0623&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1857-0623&client=summon