Implementation and Result Analysis of Polyalphabetic Approach to Caesar Cipher
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: In the modern world as there is drastic hike in use of internet for our daily work there is need to keep our information safe and secure so that an intruder can’t misuse it. Cryptography was established to solve this problem. Cryptography is an art of transforming information (Plain Text) using encrypting algorithms into a form that is not readable (Cipher Text) without access to specific decoding algorithms.In this paper the author presents a novel approach to cryptographic techniques and illustrates the result and analysis of the proposed algorithm and points out that it is with improved security from many kind of attacks.This paper is partitioned in following sections: 1st section contain basic introduction about cryptography and Caesar Cipher, 2nd section includes proposed system, 3rd contain performance analysis where proposed system is compared with other techniques, 4th include Conclusion and Future Scope and last section contains References
Authors and Affiliations
Prachi Patni
Vehicular Adhoc Network (VANETs) Security Enhancement Using Autonomic Framework and Trust Based Routing Algorithm
Abstract: The security protocols in the area of Vehicular Ad-hoc Networks (VANETs) have gained an immense importance from the research community. A noteworthy improvement in the research associated to trust management in...
An Enhanced Detection of Outlier using Independent Component Analysis among Multiple Data Instances via Oversampling
Abstract: Anomaly is a pattern of data that does not conforms to expected behavior. It is also referred as outlier, exceptions, peculiarities, surprise etc. Anomaly detection aims to identify a small group of insta...
The Development of A Project Based Learning (PJBL) Models To Build An Attitude of Obedience To The traffic Rules Of two Wheeled Vehicles For Junior High School Students
This study aims to produce a product in the form of a Project Based Learning model to build a compliant attitude to traffic regulations. The study subjects were taken as many as 42 students consisting of 9 limited test s...
Token Sequencing Approach to Prevent SQL Injection Attacks
: Internet, the network of networks represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. Many web applications remain under the attack of hackers who intentional...
An Analysis of students’ performance using classification algorithms
In recent years, the analysis and evaluation of students‟ performance and retaining the standard of education is a very important problem in all the educational institutions. The most important goal of the paper...