{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T07:14:40Z","timestamp":1651821280581},"reference-count":26,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"abstract":"<jats:p>This article describes how the encryption algorithm (called Tu-vera) depends on the transformation of a phrase written in English into a sequence of propositional logic formulas which can be understand by a human receiver. This happens if the receiver has a set of reserved words and he\/she knows the level of unfolding manipulation that the receiver needs to perform in the transformation of the phrase\/sentence. The Tu-vera algorithm requires several steps like a) to give a phrase; b) to re-order words of the given phrase in order to form a propositional logic formula; c) to make use of background knowledge by performing substitutions; d) to answer questions in general subjects (like literature, biology and so forth); e) to change synonyms\/antonyms (if this is feasible); f) to perform actions in order to give value to both or one operand of the logic formula and g) to conclude the final answer of the logic formula (true or false) depending of the logic values of the operands in the logic formula. Finally, a working example, in the subject of universal history is introduced.<\/jats:p>","DOI":"10.4018\/ijseus.2018040105","type":"journal-article","created":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T17:13:45Z","timestamp":1519060425000},"page":"49-59","source":"Crossref","is-referenced-by-count":0,"title":["Tu-vera"],"prefix":"10.4018","volume":"9","author":[{"given":"Maria","family":"Vargas-Vera","sequence":"first","affiliation":[{"name":"Independent Researcher, Milton Keynes, UK"}]}],"member":"2432","reference":[{"key":"IJSEUS.2018040105-0","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"IJSEUS.2018040105-1","author":"A. A.Bruen","year":"2011","journal-title":"Cryptography, Information Theory and Error Correction. A Handbook for the 21st Century"},{"key":"IJSEUS.2018040105-2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-06856-4"},{"key":"IJSEUS.2018040105-3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40657-7"},{"key":"IJSEUS.2018040105-4","author":"W.Clocksin","year":"1981","journal-title":"Programing in Prolog"},{"key":"IJSEUS.2018040105-5","doi-asserted-by":"publisher","DOI":"10.2307\/2686311"},{"key":"IJSEUS.2018040105-6","unstructured":"Harvey, C. N. (2002). Mikhail Tukhachevsky in the Russian Civil War [PhD thesis]. University of Glasgow, UK."},{"key":"IJSEUS.2018040105-7","unstructured":"Hobbs, J., & Riloff, E. (2010). Information Extraction. In N. Indurkhya & F.J. Damerau (Eds.), Handbook of Natural Language Processing (2nd ed.). Chapman & Hall\/CRC Press, Taylor & Francis Group."},{"key":"IJSEUS.2018040105-8","doi-asserted-by":"publisher","DOI":"10.1515\/9781400885626"},{"key":"IJSEUS.2018040105-9","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2009.5384830"},{"key":"IJSEUS.2018040105-10","unstructured":"Itomorrowmag.com. (2017). Cryptography. RSA Security, PKCS #1: RSA Cryptography Standard. Retrieved May, 2017 from http:\/\/www.itomorrowmag.com\/emc-plus\/rsa-labs\/standards-initiatives\/pkcs-rsa-cryptography-standard.htm"},{"key":"IJSEUS.2018040105-11","first-page":"123","article-title":"Design and implementation of a secure distributed data repository.","author":"A.Iyengar","year":"1998","journal-title":"Proceedings of the 14th IFIP International Information Security Conference (SEC 98)"},{"key":"IJSEUS.2018040105-12","first-page":"29","article-title":"Plutus: scalable secure file sharing on untrusted storage.","author":"M.Kallahalla","year":"2003","journal-title":"Proceedings of the Second USENIX Conference on File and Storage Technologies (FAST)"},{"key":"IJSEUS.2018040105-13","author":"M.Keith","year":"2012","journal-title":"Every Day Cryptography"},{"key":"IJSEUS.2018040105-14","author":"E.Mendelson","year":"2009","journal-title":"Introduction to Mathematical Logic"},{"key":"IJSEUS.2018040105-15","article-title":"Strong security for network-attached storage.","author":"E. L.Miller","year":"2002","journal-title":"Proceedings of the 2002. Conference on File and Storage Technologies (FAST)"},{"key":"IJSEUS.2018040105-16","doi-asserted-by":"publisher","DOI":"10.6028\/jres.106.023"},{"key":"IJSEUS.2018040105-17","unstructured":"Quist-Aphetsi K. (2013). A Hybrid Cryptosystem based on Vigenere Cypher and Columnar Transposition Cypher. International Journal of advanced Technology & Engineering Research, 3(1), 141-147."},{"key":"IJSEUS.2018040105-18","article-title":"Pond: the ocean store prototype.","author":"S.Rhea","year":"2003","journal-title":"Proceedings of the Second USENIX Conference on File and Storage Technologies (FAST)"},{"key":"IJSEUS.2018040105-19","unstructured":"Shinde M.R. & Taur R.D. (2015). Encryption Algorithm for Data Security and Privacy in Cloud Storage. American Journal of Computer Science and Engineering Science."},{"key":"IJSEUS.2018040105-20","author":"A. I.Todorsky","year":"1964","journal-title":"Mikhail Tukhachevsky"},{"key":"IJSEUS.2018040105-21","author":"M. N.Tukhachevsky","year":"1931","journal-title":"Deep Battle"},{"key":"IJSEUS.2018040105-22","unstructured":"Tukhachevsky M. N. (1939). Der rota Marshall Tuchatschewskis Aufstieg und Fall."},{"key":"IJSEUS.2018040105-23","author":"M. N.Tukhachevsky","year":"1964","journal-title":"Collection of works of the Marshal Mikhail Tukhachevsky"},{"issue":"4","key":"IJSEUS.2018040105-24","first-page":"63","article-title":"Methodology for the Elaboration of Quizzes using Propositional Logic Calculus in an E-Learning Environment.","volume":"7","author":"M.Vargas-Vera","year":"2016","journal-title":"IJKSR Journal"},{"key":"IJSEUS.2018040105-25","author":"R.Wobst","year":"2007","journal-title":"Cryptology Unlocked"}],"container-title":["International Journal of Smart Education and Urban Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=201181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:33:17Z","timestamp":1651818797000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSEUS.2018040105"}},"subtitle":["An Encryption Algorithm Using Propositional Logic Calculus"],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":26,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijseus.2018040105","relation":{},"ISSN":["2574-8254","2574-8270"],"issn-type":[{"value":"2574-8254","type":"print"},{"value":"2574-8270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}