Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption

D Veera, R Mangrulkar, C Bhadane… - Journal of Information …, 2024 - Taylor & Francis
In today's social networking era, information security breaches are at an all-time high,
especially when it comes to texts and images, which should come as no surprise. Integrity is …

[PDF][PDF] Modifikasi Algoritma Caesar Cipher pada Kode ASCII dalam Meningkatkan Keamanan Pesan Teks

HD Purnomo, I Sembiring - Journal of Information …, 2022 - journal.shantibhuana.ac.id
Theft of personal data is a criminal act and violates the law in the field of information
technology. Therefore, the security of personal data must have a higher level of security …

An Algorithm for Color-Based Password Authentication to Increase Security Level

SR Selamat, SY Cai, NH Hassan… - Innovation in Research of …, 2024 - jurnal.unsil.ac.id
Security level in authentication is essential to decrease the possibility of an account being
guessed. Several authentication methods are widely used nowadays, covering digital …

Optimization of the gronsfeld cipher key using okamoto-uchiyama public-key cryptosystem for data security

A Ridho, S Efendi - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
All aspects of life requires security, including in computer. Cryptography is one of the
methods continually developed in computer security. Combining ciphers is an effort to …

Une approche cryptographique pour l'authentification de données multimédia dans l'Internet des Objets basée sur les blockchains

BT Asare - 2022 - theses.hal.science
Les cyberattaques hautement sophistiquées et les occurrences de failles de sécurité sur
l'IoT (Internet des Objets) croissent de jour en jour. La technologie des blockchains de par …

An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms

E Nwokedi, O Adeniyi Ojerinde, J Ojeniyi… - Proceedings of the 5th …, 2021 - dl.acm.org
With the evolution of cryptography in the twentieth century, classical ciphers (transposition
ciphers) are gradually being pushed out because it now possesses low security ratings …

A Novel Way of Decrypting Single Columnar Transposition Ciphers

NM Adyapak, B Vineetha… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Single columnar transposition is an encryption technique used in text encryption to produce
cipher text which is a permutation of its original text. In this study, cryptanalysis of Single …

A Novel Hybrid Cipher Using Cipher Squares for Better Security

AV Jayanthi - … Intelligence and Cognitive Informatics: Proceedings of …, 2021 - Springer
Cryptography uses encryption and decryption to secure information. In the field of
Information Security, many algorithms have been devised to encrypt and decrypt the …

Alternatives to Huffman Coding by Comparison to Other Algorithms

M Gupta - 2021 Innovations in Power and Advanced Computing …, 2021 - ieeexplore.ieee.org
With advancements in technology and the Data Boom due to the Internet of things (IoT), the
world now generates considerable amounts of data. Take the example of self-driving cars …

Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion

JT Tarigan, DI Putra - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Steganography technique is a technique to hide data or information into other media such
as digital images, text, sound, or video. One of the simplest methods of Steganography in the …