Cryptography is considered to be a disciple of science of achieving security by converting sensitive information to an un-interpretable form such that it cannot be interpreted by anyone except the transmitter and intended recipient. An innumerable set of cryptographic schemes persist in which each of it has its own affirmative and feeble characteristics. In this paper we have we have developed a traditional or character oriented Polyalphabetic cipher by using a simple algebraic equation. In this we made use of iteration process and introduced a key K0 obtained by permuting the elements of a given key seed value. This key strengthens the cipher and it does not allow the cipher to be broken by the known plain text attack. The cryptanalysis pe...
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were pr...
International audienceIn this paper we propose a new approach to investigate the security of the McE...
Today it is necessary to keep information secure and cryptography is the most common technique for d...
It is possible to cryptanalyze simple substitution ciphers (both monoand polyalphabetic) by using a ...
The rapid development of electronic exchange ofdigital information increases the importance of infor...
Monoalphabetic cipher is an encryption substitution method that maps each alphabet to another alphab...
Polyalphabetic cipher cryptosystem is the study of mathematical techniques that related to...
Abstract: Cryptography is the art of keeping message secret by different methods. In this paper, a n...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
Abstract-With the exponential growth of internet and network applications such as e-commerce, the de...
Graphs may be used for the design of stream ciphers, block ciphers or public-key ciphers. This paper...
In this paper conventional Playfair Cipher is being modified by encrypting the plaintext in blocks. ...
The emerging threats to information security are increasing at an alarming rate. The most influentia...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were pr...
International audienceIn this paper we propose a new approach to investigate the security of the McE...
Today it is necessary to keep information secure and cryptography is the most common technique for d...
It is possible to cryptanalyze simple substitution ciphers (both monoand polyalphabetic) by using a ...
The rapid development of electronic exchange ofdigital information increases the importance of infor...
Monoalphabetic cipher is an encryption substitution method that maps each alphabet to another alphab...
Polyalphabetic cipher cryptosystem is the study of mathematical techniques that related to...
Abstract: Cryptography is the art of keeping message secret by different methods. In this paper, a n...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
Abstract-With the exponential growth of internet and network applications such as e-commerce, the de...
Graphs may be used for the design of stream ciphers, block ciphers or public-key ciphers. This paper...
In this paper conventional Playfair Cipher is being modified by encrypting the plaintext in blocks. ...
The emerging threats to information security are increasing at an alarming rate. The most influentia...
Block ciphers play a key role in many cryptographic protocols that provide communications security i...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...
Recently, the Little Dragon Two and Poly-Dragon multivariate based public-key cryptosystems were pr...
International audienceIn this paper we propose a new approach to investigate the security of the McE...
Today it is necessary to keep information secure and cryptography is the most common technique for d...