Implementation of Information Security System with Proposed Substitution Cipher Model using Cryptography Tools and Methods
Abstract
Keywords
Full Text:
PDFReferences
Sujith Ravi, Kevin Knight,’ Attacking Letter Substitution Ciphers with Integer Programming', Oct 2009, 33, 4; Proquest Science Journals Pg.321
A K Verma, Mauyank Dave and R.C Joshi,'Genetic Algorithm and Tabu Search Attack on the Mono Alphabetic Substitution Cipher in Adhoc Networks; Journal of Computer Science 3(3): 134-137, 2007
Diaa Salama Abd Elminaam).” Evaluating The Performance of Symmetric Encryption Algorithms”, International Journal of Network Security, Vol.10, No.3, PP.216–222, May 2010, Pg. 216
Aleksey Gorodilov, Vladimir Morozenko,” genetic algorithm for finding the key’s length and cryptanalysis of the permutation cipher”, International Journal "Information Theories & applications" Vol.15 / 2008.
William stallings, “Cryptograph and network security principles and practices”, Published by Prentice hall, 2010 (Fourth Edition)
Nalani N, G. Raghavendra Rao, “Cryptoanalysis of Simplified data encryption standard via optimization heuristics” , International Journal of Computer Science and Network security, Vol 6, IB, Jan 2006
Udaya kumar S, “A Block cipher based upon permutation, substitution, Iteration”, Journal of Information privacy & security;2007;3,1;Pg : 47
Sean Simmons,”Algebraic Cryptanalysis of simplified AES*”, ProQuest Science Journal, Cryptologia, October 2009; 33, 4, Pg. 305.
Darrell Whitley,'A Genetic Algorthm Tutorial', Computer Science Department, Colorado State University, Fort Collins, CO 80523.
Rafeel Pass, Abhi Shelat “A course in Crytography – Lecturer Notes”, 2007.
B. Raja Rao, “A novel information security scheme using cryptic_ steganography, Indian journal of computer science and engineering, Vol 1,No. 4 pg: 327-332
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.