However, with the increase of process in the encryption and decryption, the modified Polybius cipher obtained a longer execution time of 0.0031ms, being identified as its tradeoff. In the proposed method, each element produced in the digraphs exhibits a wider range of possible values. The results of the study revealed that the modified Polybius cipher offers a more secure plaintext-ciphertext conversion and is difficult to break, as evident in the frequency analysis. The modification is done through shifting cell elements for every encrypted character using a secret key and its ASCII decimal code equivalents. This paper proposes a modification on the traditional 5x5 Polybius square in cryptography, through dynamically generated matrices. Data and information in all forms should be safeguarded to avoid leakage of information, data theft, and robbery through intruders and hackers. This is an introductory article that is primarily aimed at undergraduate students in the area of computer science, in order to enrich their understanding of the field.įor all industries, cybersecurity is regarded as one of the major areas of concern that needs to be addressed. This article presents the basic differences between the fundamental types of cryptography as well as practical examples of encrypting information using various cipher systems, which will help to understand them. The use of hash functions and digital signatures also contribute to the security of systems and the privacy of information. Asymmetric key cryptography is more secure than symmetric but at the cost of greater computational complexity. Symmetric and asymmetric key cryptography are the two fundamental forms of cryptography. E-commerce, banking, military, and corporations are the prominent operators of this technology, although it is, directly or indirectly, linked to almost every single person nowadays. Nonetheless, in today’s world, it supports data protection and privacy while ensuring the authenticity and confidentiality of the data. This technique is in use since many centuries. Cryptography is a secure technique of data communication and exchange that relies on encryption and decryption protocols.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |