IJASCSE Vol 1, Issue 3, 2012
نویسندگان
چکیده
In polyalphabetic substitution the plain text’s letters are enciphered differently according to their position. The name polyalphabetic suggests that there are more than one key so we have used two keys combination instead of just one, in order to produce the cipher text. We can also use three or more keys to make the enciphering process more complicated. In this paper have produced ASCII Codes of the plain text and then we have reversed it said reverse ASCII Codes and then we have generated two keys named K1 and K2. K1 is generated by addition of reverse ASCII Codes and K2 is generated by addition of ASCII Codes. Then these K1 and K2 Keys are alternatively applied on Reverse ASCII codes in order to produce cipher text. On the Destination hand Deciphering is used to produce the plain text again. Our technique generates random cipher text for the same plain text and this is the major advantage of our technique.
منابع مشابه
IJASCSE, Vol 1 Issue 2, 2012
The game theory techniques are used to find the equilibrium of a market. Game theory refers to the ways in which strategic interactions among economic agents produce outcomes with respect to the preferences (or utilities) of those agents, where the outcomes in question might have been intended by none of the agents. The oligopolistic market structures are taken and how game theory applies to th...
متن کاملIjascse, Vol 1, Issue 4, 2012
AlN thin film was prepared over different metal substrates using DC sputtering at various sputtering parameters. The XRD spectra revealed the presence of mixed (cubic and hexagonal) phases for all samples other than samples prepared at 300W with Ar:N2 gas ratio of 14:6. The intensities of cubic phases observed at copper (Cu) substrates increased drastically with high sputtering power and N2 gas...
متن کامل