Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation operations. The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original Caesar cipher was restricted only for alpha...
AbstractCryptography is one of the most popular fields of study these days as it is necessary to mai...
In this paper, a new technique for protected and locked broadcasting of message is presented. This a...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Cryptography is about constructing and analyzing protocol that prevents third parties or the publi c...
Cryptography is about constructing and analyzingprotocol that prevents third parties or the public f...
Cryptography is an art and science of converting original message into non readable form. There are ...
Abstract-With the exponential growth of internet and network applications such as e-commerce, the de...
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the ...
In daily life,we use Internet or accessing information from various sources.Some of the procedure re...
Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is e...
Abstract: In this modern world every communication including financial transactions are taking place...
The caesar cipher modification will be combine with the transposition cipher, it would be three time...
Cloud cryptography is the art of converting plain text into an unreadable format, which protects dat...
AbstractCryptography is one of the most popular fields of study these days as it is necessary to mai...
In this paper, a new technique for protected and locked broadcasting of message is presented. This a...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Secured Communication involves Encryption process at the sending end and Decryption process at the r...
Cryptography is about constructing and analyzing protocol that prevents third parties or the publi c...
Cryptography is about constructing and analyzingprotocol that prevents third parties or the public f...
Cryptography is an art and science of converting original message into non readable form. There are ...
Abstract-With the exponential growth of internet and network applications such as e-commerce, the de...
Many Ciphers have been developed to provide data security. This paper sets out to contribute to the ...
In daily life,we use Internet or accessing information from various sources.Some of the procedure re...
Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is e...
Abstract: In this modern world every communication including financial transactions are taking place...
The caesar cipher modification will be combine with the transposition cipher, it would be three time...
Cloud cryptography is the art of converting plain text into an unreadable format, which protects dat...
AbstractCryptography is one of the most popular fields of study these days as it is necessary to mai...
In this paper, a new technique for protected and locked broadcasting of message is presented. This a...
Hackers should be prevented from disclosing sensitive data when sent from one device to another over...