Data Security and Cryptography Substitution Techniques Algorithms implementation

Main Article Content

Abdulmajid M. Afat Afat

Abstract

Cryptography and data security have been used
to make data more secure for many years, military
communications are having a major impact on growing
cryptography field. Although the internet have been invited
in the ends 1960's, but it is not appear to public until invent
the World Wide Web (www) in 1989. The World Wide Web
allows people to e-mail each other and transfer data. This
appeared as one reason in growing use of computer. In
addition needs to make e-commerce more secure.
Cryptography understanding helps to find better ways or
protocols to make transfer data faster and more efficient.
This paper starts with a brief background about security
and cryptography. It provides central concepts of
cryptography. Also provides an account of substitution
techniques algorithms and their implementation. The
implementation will be as an application in c# language that
reads a text, encodes it by a specified algorithm and decodes
the encrypted text. In addition explaining the mathematical
functions used in the algorithms

Article Details

How to Cite
Afat, A. M. A. (2024). Data Security and Cryptography Substitution Techniques Algorithms implementation. The International Journal of Engineering & Information Technology (IJEIT), 6(1). https://doi.org/10.36602/ijeit.v6i1.292
Section
Artical

References

Cornelius Lowell Robling. “Cryptography and data security”.

By Addison-Wesley Longman Publishing Co., Inc., 1982.

William Stallings. “Cryptography and network security. By

Pearson Education India”, 2011.

Mark Stamp and Richard M. Low. “APPLI ED

CRYPTANALYSIS Breaking Ciphers in the Real World”, John

Wiley & Sons 2007.