Data Security and Cryptography Substitution Techniques Algorithms implementation
DOI:
https://doi.org/10.36602/ijeit.v6i1.292Abstract
Cryptography and data security have been used
to make data more secure for many years, military
communications are having a major impact on growing
cryptography field. Although the internet have been invited
in the ends 1960's, but it is not appear to public until invent
the World Wide Web (www) in 1989. The World Wide Web
allows people to e-mail each other and transfer data. This
appeared as one reason in growing use of computer. In
addition needs to make e-commerce more secure.
Cryptography understanding helps to find better ways or
protocols to make transfer data faster and more efficient.
This paper starts with a brief background about security
and cryptography. It provides central concepts of
cryptography. Also provides an account of substitution
techniques algorithms and their implementation. The
implementation will be as an application in c# language that
reads a text, encodes it by a specified algorithm and decodes
the encrypted text. In addition explaining the mathematical
functions used in the algorithms
Downloads
References
Cornelius Lowell Robling. “Cryptography and data security”.
By Addison-Wesley Longman Publishing Co., Inc., 1982.
William Stallings. “Cryptography and network security. By
Pearson Education India”, 2011.
Mark Stamp and Richard M. Low. “APPLI ED
CRYPTANALYSIS Breaking Ciphers in the Real World”, John
Wiley & Sons 2007.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 The International Journal of Engineering & Information Technology (IJEIT)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.










