Title of article :
Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography
Author/Authors :
R. Venkateswaran، نويسنده , , V. Sundaram، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Abstract :
This paper shows the possibility of exploiting the features of Genetic Algorithm with poly substitution methods in a linear way, to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In polyalphabetic substitution ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys combinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2 and let the ASCII values of e1 be 1 and e2 be 2 and take the text, add ASCII values of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters. We can use Poly substitution method combining the features of cryptography for text encryption by 2 keys and 3 keys and even more then 3 keys to make the decryption process more complicated.
Keywords :
Genetic Keys , Poly Substitution , Mono Substitution , Decryption , Encryption
Journal title :
International Journal of Computer Applications
Journal title :
International Journal of Computer Applications