Published November 30, 2024
| Version CC-BY-NC-ND 4.0
Journal article
Open
A Study on Encryption in Poly Alphabetic Ciphers
Creators
- 1. Research Scholar, BIHER, Chennai (Tamil Nadu), India.
- 1. Research Scholar, BIHER, Chennai (Tamil Nadu), India.
- 2. Department of Computer Science, BIHER, Chennai (Tamil Nadu), India.
Description
Abstract: Internet in nowadays has been in use in all departments of a society and it has been used by people of all ages for different purposes. With its increasing usage, security has become a major concern for secure data transfer over the internet. At this juncture, the importance of cryptography peeks in. Poly alphabetic cipher is one among the types of cryptography in which an alphabet can be substituted to any other alphabet. This article focuses light on different methods of generating Cipher text on the basis of Poly Alphabetic Cipher.
Files
C72650911322.pdf
Files
(519.7 kB)
Name | Size | Download all |
---|---|---|
md5:3b9c8df266cb2d7a722a5f8c09f6b72a
|
519.7 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijies.C7265.11111124
- EISSN
- 2319-9598
Dates
- Accepted
-
2024-11-15Manuscript received on 16 August 2024 | Revised Manuscript received on 03 November 2024 | Manuscript Accepted on 15 November 2024 | Manuscript published on 30 November 2024.
References
- Bellare, Mihir, Rogaway, Philip, " Introduction to Modern Cryptography", p.10, September 2005.
- Khan, David, " The Codebreakers", 1967, ISBN 978-0-684-83130-5.
- Lenon, Brian, " Passwords: Philology, Security, Authentication", p. 26, 2018, ISBN: 978-0-674-98537-7.
- Sands, Kevin, " Top 10 Codes, Keys and Ciphers", September 2015.
- Salomon, David, " Data Privacy and Security", p. 63, ISBN 0-387-00311-8.
- Laurence Dwight Smith, " Cryptography: The Science of Secret Writing", p. 81, 1955, ISBN 978-0-486-20247-1.
- Salomon, David, " Coding for Data and Computer Communications", ISBN 0-387-21245-0. Doi: https://doi.org/10.1007/b102531
- Kartha, R. S., & Paul, Dr. V. (2020). New Polyalphabetic Substitution Scheme for Secure Communication. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 3, pp. 3303–3310). https://doi.org/10.35940/ijitee.C9043.019320
- Onome, Dr. O. A. (2022). Advanced Cyber Exploitation and Mitigation Methodology. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 4, pp. 8–15). https://doi.org/10.35940/ijese.C2525.0310422
- K Priyadharshini, R Aroul Canessane, Data Integrity, Data Privacy and Data Confidentiality Issues in Multi-User Cloud. (2019). In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6, pp. 1705–1708). https://doi.org/10.35940/ijeat.F8421.088619
- Garg, S., & Mondal, T. (2024). Review on Data Privacy, Protection, and Security Challenges in Blockchain Adoption Across Diverse Domains. In International Journal of Management and Humanities (Vol. 10, Issue 7, pp. 20–38). https://doi.org/10.35940/ijmh.G1696.10070324
- Manna, A., Sengupta, A., & Mazumdar, C. (2019). A Methodology for Eliciting Data Privacy Requirements and Resolving Conflicts. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 4, pp. 8366–8374). https://doi.org/10.35940/ijrte.D9049.118419