Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher is an example of substitution technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A single columnar transposition followed by a double substitution is applied on a Caesar cipher in order to make it a stronger and a more secure cipher
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be ...
In the current of information technology, we need a way to properly secure message. Message seu...
AbstractCommunication is a basic process of exchanging information. It involves sender, receiver and...
Cryptography is an art and science of converting original message into non readable form. There are ...
Cryptography is about constructing and analyzingprotocol that prevents third parties or the public f...
Cryptography is about constructing and analyzingprotocol that prevents third parties or the public f...
In daily life, we use internet or accessing information from various sources. Some of the procedure...
Abstract-With the exponential growth of internet and network applications such as e-commerce, the de...
AbstractIn a secret message, cryptography is more directed to the encrypted message while steganogra...
The caesar cipher modification will be combine with the transposition cipher, it would be three time...
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the ...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be ...
Cloud cryptography is the art of converting plain text into an unreadable format, which protects dat...
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be ...
In the current of information technology, we need a way to properly secure message. Message seu...
AbstractCommunication is a basic process of exchanging information. It involves sender, receiver and...
Cryptography is an art and science of converting original message into non readable form. There are ...
Cryptography is about constructing and analyzingprotocol that prevents third parties or the public f...
Cryptography is about constructing and analyzingprotocol that prevents third parties or the public f...
In daily life, we use internet or accessing information from various sources. Some of the procedure...
Abstract-With the exponential growth of internet and network applications such as e-commerce, the de...
AbstractIn a secret message, cryptography is more directed to the encrypted message while steganogra...
The caesar cipher modification will be combine with the transposition cipher, it would be three time...
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the ...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be ...
Cloud cryptography is the art of converting plain text into an unreadable format, which protects dat...
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be ...
In the current of information technology, we need a way to properly secure message. Message seu...
AbstractCommunication is a basic process of exchanging information. It involves sender, receiver and...