Enhancement Caesar Cipher for Better Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Cryptography is an art and science of converting original message into non readable form. Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. In this project, encryption will be implemented information that makes it hard to be readable and secure. For that matter, encryption method known as Caesar cipher, one of the simplest and most widely used encryption techniques. In this encryption, it uses the three methods in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in many encryption projects to make data secure and better.
Authors and Affiliations
Programmer Enas Ismael Imran , Programmer Farah abdulameerabdulkareem
Connected Component Clustering Based Text Detection with Structure Based Partition and Grouping
Abstract: Extraction of text from natural scene images is a challenging problem because of its complex backgrounds and large variations of text patterns. In this paper, we presents an innovative scene text detection algo...
Selection of Legendre Moments for Content Based Image Retrieval Using ACO Based Algorithm
Abstract : Feature selection is an important step in Content Based Image Retrieval (CBIR) which has a great impact on reducing complexity and increasing efficiency of CBIR frameworks. Swarm Intelligence (SI) methods, as...
Mood Therapy and Software Design
Abstract: In this study the focus was ontheimpactofMood on theSoftware development, especiallytheimpacton the psychologicaltreatmentofthe user fromthenegative impact ofthese Moodandgetridofitduring work. Oftheformulasuse...
A note on application of Tensor Space Model for semantic problems
A Model is an abstract representation of system that allows the investigation of properties of the system and in some cases prediction of future outcomes We have seen many mathematical models but Tensor Space Mo...
A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attac...