Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8314
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sakshi | - |
dc.contributor.author | Thakral, Prateek | - |
dc.contributor.author | Goyal, Karan | - |
dc.contributor.author | Kumar, Tarun | - |
dc.contributor.author | Garg, Deepak | - |
dc.date.accessioned | 2022-11-16T04:39:51Z | - |
dc.date.available | 2022-11-16T04:39:51Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8314 | - |
dc.description.abstract | In the field of cryptography, to make cryptosystem more secure an evaluation of modulus operations on integral values followed by ASCII value generation on plain text characters have been deeply explored in this research paper. On the basis of this an extended algorithm has been proposed. In this, the Encryption technique consists of an extended combination of Vigenere and Caesar cipher which is the main key feature of this algorithm and then decryption of text along with ASCII algorithm and substitution methodology has been done. The Algorithm is initiated on the basis of inspection of various research papers, furthermore, reviews have been made for proving this system more reliable. In the proposed algorithm modified Vigenere table and ASCII values are taken into consideration for decreasing the steps to reduce complexity and making a more secure way of cryptography. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Nature Switzerland | en_US |
dc.subject | Computer security | en_US |
dc.subject | ASCII value | en_US |
dc.subject | Cryptography | en_US |
dc.title | Transfusion of Extended Vigenere Table and ASCII Conversion for Encryption Contrivance | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Book Chapters |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Transfuion of extended Vigenere table and ASCII Conversation for encryption Contrivance.pdf | 1.19 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.