Poly Substitution Method for Encryption and Decryption

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys ombinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2 and let the SCII values of e1 be 1 and e2 be 2 and take the text, add SCII alues of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters.

Authors and Affiliations

Jeetendra Kumar Ambulkar

Keywords

Related Articles

RGB & GRAY SCALE COMPONENT ON MPQ-BTC IN IMAGE COMPRESSION

Block Truncation Coding (BTC) is novel digital technique in image processing using which images can be coded efficiently. BTC has played an important role in the sense that many coding techniques have been developed base...

NODE ADDRESSING SCHEMES FOR SCALABLE ROUTING IN HIERARCHICAL WSN

Wireless Sensor Network has a capacity of communication computation with node in a network. The sensor performs many significant tasks in a selective area. In this paper proposing the new idea to improve issues on node a...

QUALITY OF SERVICE FOR MOBILE AD-HOC WIRELESS NETWORKS

Mobile ad-hoc network (MANET) is a wireless network without infrastructure. Nodes can commutate each other without central infrastructure; because they are self organised and self configurable with easy deployment. To co...

AN ANDROID APPLICATION FOR ATM WITH A SECURED PIN-ENTRY METHODS

One of the most commonly occurringproblems in the recent years are the ATM (Automatic teller machine) frauds. People lose their money due to lack of awareness. The major reason for such kind of actions is the attacks mad...

Improvised Interpolation of Contour Lines Using Spider Weaving Approach

Geographically contours are virtual lines drawn across the terrain to join points that are at same elevation from certain reference point. Contours are essential morphological features that are used along with the associ...

Download PDF file
  • EP ID EP85431
  • DOI -
  • Views 143
  • Downloads 0

How To Cite

Jeetendra Kumar Ambulkar (2010). Poly Substitution Method for Encryption and Decryption. International Journal on Computer Science and Engineering, 2(5), 1810-1812. https://europub.co.uk/articles/-A-85431