z-logo
open-access-imgOpen Access
Security and Authentication through Text Encryption and Decryption based on Substitution Method
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.i1017.0789s19
Subject(s) - encryption , computer science , character (mathematics) , hacker , cryptography , substitution (logic) , theoretical computer science , authentication (law) , symbol (formal) , symmetric key algorithm , computer security , character encoding , set (abstract data type) , scheme (mathematics) , public key cryptography , mathematics , programming language , mathematical analysis , geometry
In order to maintain security, privacy and integrity of important information or data is a great challenge in today’s world. Cryptography is a technique to prevent important data from hackers and intruder by converting important information in encrypted text by using an encryption algorithm. This paper is a review of various symmetric and asymmetric cryptography techniques. In this paper some gaps have been identified after reviewing some algorithms like they don’t work for case sensitive data but merely works for uppercase alphabets, they don’t encrypt numerically, spaces and they don’t run on the special symbol. In our proposed solution an effort to expand the original 5X5 character set of the Play Fair algorithm will be done so as to include lower case alphabets(a-z), some symbols, numeric(0-9) and a special character ‘\0’ for space. So, a new algorithm will encrypt lowercase, numeric, symbols as well as spaces.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here