Research Article

Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography

by  R. Venkateswaran, Dr. V. Sundaram
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Issue 7
Published: June 2010
Authors: R. Venkateswaran, Dr. V. Sundaram
10.5120/741-1047
PDF

R. Venkateswaran, Dr. V. Sundaram . Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography. International Journal of Computer Applications. 3, 7 (June 2010), 28-31. DOI=10.5120/741-1047

                        @article{ 10.5120/741-1047,
                        author  = { R. Venkateswaran,Dr. V. Sundaram },
                        title   = { Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 3 },
                        number  = { 7 },
                        pages   = { 28-31 },
                        doi     = { 10.5120/741-1047 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A R. Venkateswaran
                        %A Dr. V. Sundaram
                        %T Article:Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography%T 
                        %J International Journal of Computer Applications
                        %V 3
                        %N 7
                        %P 28-31
                        %R 10.5120/741-1047
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper shows the possibility of exploiting the features of Genetic Algorithm with poly substitution methods in a linear way, to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography.

References
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Decryption Genetic Keys Mono Substitution Poly Substitution

Powered by PhDFocusTM