CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography

by R. Venkateswaran, Dr. V. Sundaram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 7
Year of Publication: 2010
Authors: R. Venkateswaran, Dr. V. Sundaram
10.5120/741-1047

R. Venkateswaran, Dr. V. Sundaram . Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography. International Journal of Computer Applications. 3, 7 ( June 2010), 28-31. DOI=10.5120/741-1047

@article{ 10.5120/741-1047,
author = { R. Venkateswaran, Dr. V. Sundaram },
title = { Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 7 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number7/741-1047/ },
doi = { 10.5120/741-1047 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:19.345555+05:30
%A R. Venkateswaran
%A Dr. V. Sundaram
%T Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 7
%P 28-31
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper shows the possibility of exploiting the features of Genetic Algorithm with poly substitution methods in a linear way, to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography.

References
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Genetic Keys Mono Substitution Poly Substitution