Poly Substitution Method for Encryption and Decryption
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys ombinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2 and let the SCII values of e1 be 1 and e2 be 2 and take the text, add SCII alues of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters.
Authors and Affiliations
Jeetendra Kumar Ambulkar
Efficiency of K-Means Clustering Algorithm in Mining Outliers from Large Data Sets
This paper presents the performance of k-means clustering algorithm, depending upon various mean values input methods. Clustering plays a vital role in data mining. Its main job is to group the similar data together base...
SEGMENTATION OF LUNG CANCER PET SCAN IMAGES USING FUZZY CMEANS
Image segmentation plays a vital role in medical image processing. Eventually, the proposed work is subjected to classify the tumour and non-tumour parts, followed by the segmentation of tumour region in PET scan images....
ENERGY CONSERVATION IN CLOUD ENVIRONMENTS USING ALTERNATIVE EMAIL-ID APPROACH
(100%)Cloud computing is a new Model for deliver and accessing the services over the Internet. So cloud provider responsibility to verify the user or client is Authorized or not.For this purpose cloud provider shall prov...
IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY
Wireless sensor networks, trend of the past few years involves in eploying a large number of small nodes. The nodes then sense nvironmental changes and report them to other nodes over flexible network architecture. A p...
Extension of the Trusted Cloud Domain for the Composite Cloud Process
Internet is a "network of networks" that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless conn...