Poly Substitution Method for Encryption and Decryption

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys ombinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2 and let the SCII values of e1 be 1 and e2 be 2 and take the text, add SCII alues of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters.

Authors and Affiliations

Jeetendra Kumar Ambulkar

Keywords

Related Articles

Efficiency of K-Means Clustering Algorithm in Mining Outliers from Large Data Sets

This paper presents the performance of k-means clustering algorithm, depending upon various mean values input methods. Clustering plays a vital role in data mining. Its main job is to group the similar data together base...

SEGMENTATION OF LUNG CANCER PET SCAN IMAGES USING FUZZY CMEANS

Image segmentation plays a vital role in medical image processing. Eventually, the proposed work is subjected to classify the tumour and non-tumour parts, followed by the segmentation of tumour region in PET scan images....

ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH

(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall prov...

IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY

Wireless sensor networks, trend of the past few years involves in eploying a large number of small nodes. The nodes then sense nvironmental changes and report them to other nodes over flexible network architecture. A p...

Extension of the Trusted Cloud Domain for the Composite Cloud Process

Internet is a "network of networks" that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless conn...

Download PDF file
  • EP ID EP85431
  • DOI -
  • Views 145
  • Downloads 0

How To Cite

Jeetendra Kumar Ambulkar (2010). Poly Substitution Method for Encryption and Decryption. International Journal on Computer Science and Engineering, 2(5), 1810-1812. https://europub.co.uk/articles/-A-85431