Published November 30, 2024 | Version CC-BY-NC-ND 4.0
Journal article Open

A Study on Encryption in Poly Alphabetic Ciphers

  • 1. Research Scholar, BIHER, Chennai (Tamil Nadu), India.

Contributors

Contact person:

  • 1. Research Scholar, BIHER, Chennai (Tamil Nadu), India.
  • 2. Department of Computer Science, BIHER, Chennai (Tamil Nadu), India.

Description

Abstract: Internet in nowadays has been in use in all departments of a society and it has been used by people of all ages for different purposes. With its increasing usage, security has become a major concern for secure data transfer over the internet. At this juncture, the importance of cryptography peeks in. Poly alphabetic cipher is one among the types of cryptography in which an alphabet can be substituted to any other alphabet. This article focuses light on different methods of generating Cipher text on the basis of Poly Alphabetic Cipher.

Files

C72650911322.pdf

Files (519.7 kB)

Name Size Download all
md5:3b9c8df266cb2d7a722a5f8c09f6b72a
519.7 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2024-11-15
Manuscript received on 16 August 2024 | Revised Manuscript received on 03 November 2024 | Manuscript Accepted on 15 November 2024 | Manuscript published on 30 November 2024.

References

  • Bellare, Mihir, Rogaway, Philip, " Introduction to Modern Cryptography", p.10, September 2005.
  • Khan, David, " The Codebreakers", 1967, ISBN 978-0-684-83130-5.
  • Lenon, Brian, " Passwords: Philology, Security, Authentication", p. 26, 2018, ISBN: 978-0-674-98537-7.
  • Sands, Kevin, " Top 10 Codes, Keys and Ciphers", September 2015.
  • Salomon, David, " Data Privacy and Security", p. 63, ISBN 0-387-00311-8.
  • Laurence Dwight Smith, " Cryptography: The Science of Secret Writing", p. 81, 1955, ISBN 978-0-486-20247-1.
  • Salomon, David, " Coding for Data and Computer Communications", ISBN 0-387-21245-0. Doi: https://doi.org/10.1007/b102531
  • Kartha, R. S., & Paul, Dr. V. (2020). New Polyalphabetic Substitution Scheme for Secure Communication. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 3, pp. 3303–3310). https://doi.org/10.35940/ijitee.C9043.019320
  • Onome, Dr. O. A. (2022). Advanced Cyber Exploitation and Mitigation Methodology. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 4, pp. 8–15). https://doi.org/10.35940/ijese.C2525.0310422
  • K Priyadharshini, R Aroul Canessane, Data Integrity, Data Privacy and Data Confidentiality Issues in Multi-User Cloud. (2019). In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6, pp. 1705–1708). https://doi.org/10.35940/ijeat.F8421.088619
  • Garg, S., & Mondal, T. (2024). Review on Data Privacy, Protection, and Security Challenges in Blockchain Adoption Across Diverse Domains. In International Journal of Management and Humanities (Vol. 10, Issue 7, pp. 20–38). https://doi.org/10.35940/ijmh.G1696.10070324
  • Manna, A., Sengupta, A., & Mazumdar, C. (2019). A Methodology for Eliciting Data Privacy Requirements and Resolving Conflicts. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 4, pp. 8366–8374). https://doi.org/10.35940/ijrte.D9049.118419