International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
An Approach of Hybrid Transposition Method based on ASCII Value in Cryptography

Author :Vishal Thakor, Papri Ghosh, Pravin Bhathawala

Article Citation :Vishal Thakor ,Papri Ghosh ,Pravin Bhathawala , (2017 ) " An Approach of Hybrid Transposition Method based on ASCII Value in Cryptography " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 104-107, Volume-5,Issue-7

Abstract : Every day millions of people interact electronically through different computer applications such as e-mail, ecommerce websites, ATM machines, or different mobile device applications and uses Internet either directly or indirectly to transfer the data over the networks. With perpetual growth of Internet usage, the demand for data security while transferring and storing the data has increased. This has further led to increase the importance of cryptography and its various technics for security reasons. In this paper, a hybrid cryptography method is proposed which uses both substitution and transposition technics to secure the plain text. The proposed method first applies substitution with the help of three different keys followed by transposition using forth key consist of matrix size on equivalent ASCII values of plaintext. The forte of the method is its all four keys. Within the same manner decryption will be done at receiver's facet but in reverse way of encryption. Keywords - Cryptography, Encryption, Decryption, Cryptanalysis, Symmetric key, Asymmetric key, Hybrid, Transposition

Type : Research paper

Published : Volume-5,Issue-7


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-8790   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 65
| Published on 2017-09-12
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY