Poly Substitution Method for Encryption and Decryption

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys ombinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2 and let the SCII values of e1 be 1 and e2 be 2 and take the text, add SCII alues of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters.

Authors and Affiliations

Jeetendra Kumar Ambulkar

Keywords

Related Articles

Improved Self Fused Check pointing Replication for Handling Multiple Faults in Cloud Computing

The performance of checkpointing replication fault tolerance technique is severely bottlenecks due to handling of number of replicas generated for a large number of nodes to tolerate multiple faults such as multiple fail...

Quantum Black Holes and pseudotelepathy in biological organisms

Superposed state of quantum registers can be used to describe inflationary universe. One can speak of a quantum superposition of universes during inflation. It has been proposed by Zizzi that a cosmic consciousness event...

Development of Behavioral Based System from Sports Video

A system for detecting and analyzing behavior of a sports person from their facial expression extracted from a sports video from the basis of this project. Shot Segmentation, Object Frame Selection, Image Segmentation, F...

DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE 

Frequent pattern mining in databases plays a vital role in many data mining tasks like classification, sequential patters, clustering, association rules analysis etc. There are numerous mining algorithms for finding asso...

Quantum Computation and Consciousness in Cyclic and Mythological Models of Universe

Cyclic models such as Steinhardt-Turok model, Baum-Frampton model, and CCC models have been proposed for the universe. It has been postulated that the value of the physical constants in different aeons may possibly be di...

Download PDF file
  • EP ID EP85431
  • DOI -
  • Views 131
  • Downloads 0

How To Cite

Jeetendra Kumar Ambulkar (2010). Poly Substitution Method for Encryption and Decryption. International Journal on Computer Science and Engineering, 2(5), 1810-1812. https://europub.co.uk/articles/-A-85431