Security and authentication through text encryption and decryption based on substitution method

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In order to maintain security, privacy and integrity of important information or data is a great challenge in today’s world. Cryptography is a technique to prevent important data from hackers and intruder by converting important information in encrypted text by using an encryption algorithm. This paper is a review of various symmetric and asymmetric cryptography techniques. In this paper some gaps have been identified after reviewing some algorithms like they don’t work for case sensitive data but merely works for uppercase alphabets, they don’t encrypt numerically, spaces and they don’t run on the special symbol. In our proposed solution an effort to expand the original 5X5 character set of the Play Fair algorithm will be done so as to include lower case alphabets(a-z), some symbols, numeric(0-9) and a special character ‘\0’ for space. So, a new algorithm will encrypt lowercase, numeric, symbols as well as spaces.

Cite

CITATION STYLE

APA

Mehta, M., Goyar, V., & Bairwa, V. (2019). Security and authentication through text encryption and decryption based on substitution method. International Journal of Innovative Technology and Exploring Engineering, 8(9 Special Issue), 112–115. https://doi.org/10.35940/ijitee.I1017.0789S19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free