In order to maintain security, privacy and integrity of important information or data is a great challenge in today’s world. Cryptography is a technique to prevent important data from hackers and intruder by converting important information in encrypted text by using an encryption algorithm. This paper is a review of various symmetric and asymmetric cryptography techniques. In this paper some gaps have been identified after reviewing some algorithms like they don’t work for case sensitive data but merely works for uppercase alphabets, they don’t encrypt numerically, spaces and they don’t run on the special symbol. In our proposed solution an effort to expand the original 5X5 character set of the Play Fair algorithm will be done so as to include lower case alphabets(a-z), some symbols, numeric(0-9) and a special character ‘\0’ for space. So, a new algorithm will encrypt lowercase, numeric, symbols as well as spaces.
CITATION STYLE
Mehta, M., Goyar, V., & Bairwa, V. (2019). Security and authentication through text encryption and decryption based on substitution method. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue), 112–115. https://doi.org/10.35940/ijitee.I1017.0789S19
Mendeley helps you to discover research relevant for your work.