Poly Substitution Method for Encryption and Decryption

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5

Abstract

In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys ombinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2 and let the SCII values of e1 be 1 and e2 be 2 and take the text, add SCII alues of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters.

Authors and Affiliations

Jeetendra Kumar Ambulkar

Keywords

Related Articles

A Novel Search Engine to trace Medical Information Needs using Medical Domain Ontology

Information retrieval in medical domain is now sharing major part of the web search. Now a day’s most of the people especially adults are browsing health care and medical information at their homes using internet. Medica...

Supervised Learning Approach for Spam Classification Analysis using Data Mining Tools

E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing...

Dynamic Signature Verification System Using Statistics Analysis

In this paper, a new technique for dynamic signature modeling and classification framework is proposed. Raw dynamic data obtained from a digitizer are analyzed using statistic tools. The variation within the same person...

Compact Dual Polarization Lidar System description and data processing

This paper describes the constructional features of a compact dual polarization lidar (CDPL) system developed for remote sensing the suspended particulate matter and clouds in the atmosphere. The new lidar system employs...

Audio Watermarking Based On The PSK Modulation

Audio watermarking is a technique, which can be used to embed information into the digital representation of audio signals. The main challenge is to hide data representing some information without compromising the qualit...

Download PDF file
  • EP ID EP85431
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Jeetendra Kumar Ambulkar (2010). Poly Substitution Method for Encryption and Decryption. International Journal on Computer Science and Engineering, 2(5), 1810-1812. https://europub.co.uk/articles/-A-85431