1. Refined Imbricate Cryptography with addition of Polygram Substitution Cipher Method: an enhanced tool for security
- Author
-
K. Gayathri, M. Dharshini, B. Gopalakrishnan, and S. Renuga Devi
- Subjects
History ,business.industry ,Computer science ,Substitution cipher ,Polygram ,Cryptography ,Arithmetic ,business ,Computer Science Applications ,Education - Abstract
The booming of technologies these days make us more comfortable and also take us into the complex world. As information increases rapidly, the level of security also matters. As a technological paradigm, the security can be done using many cryptography techniques. Cryptography is a process of converting a plain text into a cipher text so that the data can be viewed or extracted only by an intended user. In this paper, we describe a methodology inorder to enhance the speed of encryption and decryption process. This process uses ciphertext formation via Imbricate Cryptography and Polygram Substitution Cipher Technique. On performing cryptography, there are a lot of improvements in the actual implementation. Most importantly, the advantage of combining these two algorithms is to make data more secure from the exploiters and also making the computer to process faster.
- Published
- 2021
- Full Text
- View/download PDF