Enhancement Caesar Cipher for Better Security
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: Cryptography is an art and science of converting original message into non readable form. Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. In this project, encryption will be implemented information that makes it hard to be readable and secure. For that matter, encryption method known as Caesar cipher, one of the simplest and most widely used encryption techniques. In this encryption, it uses the three methods in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in many encryption projects to make data secure and better.
Authors and Affiliations
Programmer Enas Ismael Imran , Programmer Farah abdulameerabdulkareem
Handling Toll Traffic Using Rfid In Highway Scenario Environment
Abstract: In this research paper, we consider the wireless sensor networks (WSNs) in toll road using RFID. Sensor network are collection of sensor node and they co-operatively send sensed data to base station. In a real...
Comparison of different Ant based techniques for identification of shortest path in Distributed Network
Interference Aware & SINR Estimation in Femtocell Networks
In wireless communication two main limitations are capacity and range. In the areas of high population density cellular service is far superior compared to scarcely populated areas. The initial cell...
Filter Based addressing protocol for effective Node Auto configuration in Ad hoc Network
MANET is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications, such as sensing, Internet access to deprived communities, and dis...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s &nb...