Encryption of Data based on Triple encryption and Affine Algorithm
DOI:
https://doi.org/10.31695/IJASRE.2021.34010Keywords:
Cryptography, Encryption, Caesar Cipher, Reversing Cipher, Affine CipherAbstract
In recent years in view of the recent scientific and technological development, Encryption has emerged as a solution and is critical in the information security system. To protect the shared data, a variety of techniques are needed. To begin, data must be encrypted before being sent from sender to receiver using a cryptographic algorithm for encryption. Second, the receiver can display the original data using decryption techniques.
Encryption is a well-known method of safeguarding classified information. It is a procedure for converting text or data into an unreadable format for the purpose of hiding this data or is converting plaintext to ciphertext is an operation. In conjunction with an algorithm or a key. The current research focuses on using cryptography to protect data as it is being transmitted, we implemented three encrypt techniques (Caesar-Reversing-zigzag) by combining the three codes called triple encryption for encrypting the message, re-encoding the encrypted text using the affine cipher. The present work is implemented by using Visual Basic 6.
References
Kshitij Bhetwal." MULTIMEDIA SECURITY USING ENCRYPTION AND DECRYPTION".
Anurag Rawal*, Gaurav Chhikara, Gaganjot Kaur, Hitesh Khanna."Cryptography Algorithm". Student, Department of CSE Manav Rachna University Faridabad, Haryana, India.
Dr. Prerna Mahajan & Abhishek Sachdeva . "A Study of Encryption Algorithms AES, DES and RSA for Security".
Benni Purnamaa, Hetty Rohayani.AHb
. "A New Modified Caesar Cipher Cryptography Method with Legible Ciphertext from a Message to Be Encrypted". Informatic System, b Computer System, STIKOM Dinamika Bangsa, Jambi 36138, Indonesia.
https://www.tutorialspoint.com/cryptography_with_python/cryptography_with_python_reverse_cipher.htm.
M A Budiman, Amalia and N I Chayanie Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan . "An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security". Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia.
Sriramoju Ajay Babu . "MODIFICATION AFFINE CIPHERS ALGORITHM FOR CRYPTOGRAPHY PASSWORD".1Programmer Analyst, Randstad Technologies, EQT Plaza 625 Liberty Avenue, Suite 1020 Pittsburgh, Pennsylvania -15222, USA.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2021 Zahraa Salah Dhaief

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.