Loading

A Study on Encryption in Poly Alphabetic Ciphers
Syed Usman Basha1, S. Brintha Rajakumari2

1Syed Usman Basha, Research Scholar, BIHER, Chennai (Tamil Nadu), India.

2Dr. S. Brintha Rajakumari, Department of Computer Science, BIHER, Chennai (Tamil Nadu), India.  

Manuscript received on 16 August 2024 | Revised Manuscript received on 03 November 2024 | Manuscript Accepted on 15 November 2024 | Manuscript published on 30 November 2024 | PP: 13-15 | Volume-11 Issue-11, November 2024 | Retrieval Number: 100.1/ijies.C72650911322 | DOI: 10.35940/ijies.C7265.11111124

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet in nowadays has been in use in all departments of a society and it has been used by people of all ages for different purposes. With its increasing usage, security has become a major concern for secure data transfer over the internet. At this juncture, the importance of cryptography peeks in. Poly alphabetic cipher is one among the types of cryptography in which an alphabet can be substituted to any other alphabet. This article focuses light on different methods of generating Cipher text on the basis of Poly Alphabetic Cipher.

Keywords: Cryptography, Poly Alphabetic, Cipher, Alberti, Trithemius, Vigenère.
Scope of the Article: Computer Science and Applications