Light weight proactive padding based crypto security system in distributed cloud environment

N Indira, S Rukmanidevi, AV Kalpana - International Journal of …, 2020 - Springer
The organization maintains various information in cloud which is a loosely coupled
environment. However, the nature of cloud encourages the threats in different level. Among …

[PDF][PDF] Improving the extended 10× 10 Polybius square key matrix for playfair, bifid, and polybius cipher

GMM Manliclic, KAR Lamac, RC Regala… - United International J …, 2023 - uijrt.com
The Polybius Square is a cryptographic algorithm modified and enhanced over time to fit
modern standards. A modification that is the focus of this study is the extension of the 5x5 …

An efficient cryptosystem using playfair cipher together with graph labeling techniques

B Deepa, V Maheswari, V Balaji - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Cryptography is the branch of Discrete Mathematics which deals with the transmission of
secret communications between intended parties without the knowledge of third party …

A hybrid combination of substitution and transposition ciphers for efficient encryption using graph labeling

VN Shruthy, M Veerasamy - TWMS Journal of Applied and …, 2021 - belgelik.isikun.edu.tr
In this study, we conceptualise a hybrid approach of plaintext encryption by making use of
Substitution and Transposition cipher technique namely Playfair Cipher and Simple …

Secure message transfer using RSA algorithm and improved playfair cipher in cloud computing

PN Hemanth, NA Raj, N Yadav - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Nowadays people around the world are interested in sharing information among
themselves, but they are worried about the security aspect while sharing any information …

[PDF][PDF] Implementation of Modified Playfair CBC Algorithm

P Goyal, G Sharma, SS Kushwah - International Journal of …, 2016 - researchgate.net
These days, Information Security is the most summon aspects in the web and network
application due to their swiftly origination. Therefore, secure exchanged data over the …

[PDF][PDF] Word-based encryption algorithm using dictionary indexing with variable encryption key length

A Al-Jarrah, A Albsharat, M Al-Jarrah - International Journal of …, 2022 - academia.edu
This paper proposes a new algorithm for text encryption utilizing English words as a unit of
encoding. The algorithm vanishes any feature that could be used to reveal the encrypted text …

A new 3D playfair based secure cipher generation model

E Elahi, H Raza, S Ali - 2017 13th International Conference on …, 2017 - ieeexplore.ieee.org
In this paper, a new 3D generalized playfair model is proposed that takes three letters of text
message at the same time and generates cipher text accordingly. The 3D cipher structure …

i3d-playfair: An improved 3d playfair cipher algorithm

RS Villafuerte, AM Sison… - 2019 IEEE Eurasia …, 2019 - ieeexplore.ieee.org
Security of information is one of the most concerned issues during data transmission
wherein cryptographic schemes are needed. This paper intends to improve the encryption …

[PDF][PDF] A Playfair Cipher-based Secured Patients' Information Transaction System

MI Jabiullah, AD Arni, BB Brishti - Journal of Network Security and …, 2021 - researchgate.net
Secured patient's information transaction between doctors and expert doctors from home
and abroad, from remote to global for many reasons. A secured patients' information …