A Study on Encryption in Poly Alphabetic Ciphers

Main Article Content

Syed Usman Basha
Dr. S. Brintha Rajakumari

Abstract

Internet in nowadays has been in use in all departments of a society and it has been used by people of all ages for different purposes. With its increasing usage, security has become a major concern for secure data transfer over the internet. At this juncture, the importance of cryptography peeks in. Poly alphabetic cipher is one among the types of cryptography in which an alphabet can be substituted to any other alphabet. This article focuses light on different methods of generating Cipher text on the basis of Poly Alphabetic Cipher.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Syed Usman Basha and Dr. S. Brintha Rajakumari , Trans., “A Study on Encryption in Poly Alphabetic Ciphers”, IJIES, vol. 11, no. 11, pp. 13–15, Nov. 2024, doi: 10.35940/ijies.C7265.11111124.
Section
Articles

How to Cite

[1]
Syed Usman Basha and Dr. S. Brintha Rajakumari , Trans., “A Study on Encryption in Poly Alphabetic Ciphers”, IJIES, vol. 11, no. 11, pp. 13–15, Nov. 2024, doi: 10.35940/ijies.C7265.11111124.
Share |

References

Bellare, Mihir, Rogaway, Philip, “ Introduction to Modern Cryptography”, p.10, September 2005.

Khan, David, “ The Codebreakers”, 1967, ISBN 978-0-684-83130-5.

Lenon, Brian, “ Passwords: Philology, Security, Authentication”, p. 26, 2018, ISBN: 978-0-674-98537-7.

Sands, Kevin, “ Top 10 Codes, Keys and Ciphers”, September 2015.

Salomon, David, “ Data Privacy and Security”, p. 63, ISBN 0-387-00311-8.

Laurence Dwight Smith, “ Cryptography: The Science of Secret Writing”, p. 81, 1955, ISBN 978-0-486-20247-1.

Salomon, David, “ Coding for Data and Computer Communications”, ISBN 0-387-21245-0. Doi: https://doi.org/10.1007/b102531

Kartha, R. S., & Paul, Dr. V. (2020). New Polyalphabetic Substitution Scheme for Secure Communication. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 3, pp. 3303–3310). https://doi.org/10.35940/ijitee.C9043.019320

Onome, Dr. O. A. (2022). Advanced Cyber Exploitation and Mitigation Methodology. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 4, pp. 8–15). https://doi.org/10.35940/ijese.C2525.0310422

K Priyadharshini, R Aroul Canessane, Data Integrity, Data Privacy and Data Confidentiality Issues in Multi-User Cloud. (2019). In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6, pp. 1705–1708). https://doi.org/10.35940/ijeat.F8421.088619

Garg, S., & Mondal, T. (2024). Review on Data Privacy, Protection, and Security Challenges in Blockchain Adoption Across Diverse Domains. In International Journal of Management and Humanities (Vol. 10, Issue 7, pp. 20–38). https://doi.org/10.35940/ijmh.G1696.10070324

Manna, A., Sengupta, A., & Mazumdar, C. (2019). A Methodology for Eliciting Data Privacy Requirements and Resolving Conflicts. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 4, pp. 8366–8374). https://doi.org/10.35940/ijrte.D9049.118419

Most read articles by the same author(s)

1 2 > >>