z-logo
open-access-imgOpen Access
Refined Imbricate Cryptography with addition of Polygram Substitution Cipher Method: an enhanced tool for security
Author(s) -
M Dharshini,
K. Gayathri,
S. Renuga Devi,
Balamurugan Gopalakrishnan
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1767/1/012048
Subject(s) - cipher , cryptography , running key cipher , ciphertext , computer science , encryption , process (computing) , computer security , transposition cipher , substitution (logic) , theoretical computer science , operating system , programming language
The booming of technologies these days make us more comfortable and also take us into the complex world. As information increases rapidly, the level of security also matters. As a technological paradigm, the security can be done using many cryptography techniques. Cryptography is a process of converting a plain text into a cipher text so that the data can be viewed or extracted only by an intended user. In this paper, we describe a methodology inorder to enhance the speed of encryption and decryption process. This process uses ciphertext formation via Imbricate Cryptography and Polygram Substitution Cipher Technique. On performing cryptography, there are a lot of improvements in the actual implementation. Most importantly, the advantage of combining these two algorithms is to make data more secure from the exploiters and also making the computer to process faster.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here