A Study on Encryption in Poly Alphabetic Ciphers
Main Article Content
Abstract
Internet in nowadays has been in use in all departments of a society and it has been used by people of all ages for different purposes. With its increasing usage, security has become a major concern for secure data transfer over the internet. At this juncture, the importance of cryptography peeks in. Poly alphabetic cipher is one among the types of cryptography in which an alphabet can be substituted to any other alphabet. This article focuses light on different methods of generating Cipher text on the basis of Poly Alphabetic Cipher.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Bellare, Mihir, Rogaway, Philip, “ Introduction to Modern Cryptography”, p.10, September 2005.
Khan, David, “ The Codebreakers”, 1967, ISBN 978-0-684-83130-5.
Lenon, Brian, “ Passwords: Philology, Security, Authentication”, p. 26, 2018, ISBN: 978-0-674-98537-7.
Sands, Kevin, “ Top 10 Codes, Keys and Ciphers”, September 2015.
Salomon, David, “ Data Privacy and Security”, p. 63, ISBN 0-387-00311-8.
Laurence Dwight Smith, “ Cryptography: The Science of Secret Writing”, p. 81, 1955, ISBN 978-0-486-20247-1.
Salomon, David, “ Coding for Data and Computer Communications”, ISBN 0-387-21245-0. Doi: https://doi.org/10.1007/b102531
Kartha, R. S., & Paul, Dr. V. (2020). New Polyalphabetic Substitution Scheme for Secure Communication. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 3, pp. 3303–3310). https://doi.org/10.35940/ijitee.C9043.019320
Onome, Dr. O. A. (2022). Advanced Cyber Exploitation and Mitigation Methodology. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 4, pp. 8–15). https://doi.org/10.35940/ijese.C2525.0310422
K Priyadharshini, R Aroul Canessane, Data Integrity, Data Privacy and Data Confidentiality Issues in Multi-User Cloud. (2019). In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6, pp. 1705–1708). https://doi.org/10.35940/ijeat.F8421.088619
Garg, S., & Mondal, T. (2024). Review on Data Privacy, Protection, and Security Challenges in Blockchain Adoption Across Diverse Domains. In International Journal of Management and Humanities (Vol. 10, Issue 7, pp. 20–38). https://doi.org/10.35940/ijmh.G1696.10070324
Manna, A., Sengupta, A., & Mazumdar, C. (2019). A Methodology for Eliciting Data Privacy Requirements and Resolving Conflicts. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 4, pp. 8366–8374). https://doi.org/10.35940/ijrte.D9049.118419