Loading

A Study on Encryption in Poly Alphabetic Ciphers
Syed Usman Basha1, S. Brintha Rajakumari2

1Syed Usman Basha, Research Scholar, BIHER, Chennai (Tamil Nadu), India.

2Dr. S. Brintha Rajakumari, Department of Computer Science, BIHER, Chennai (Tamil Nadu), India.  

Manuscript received on 16 August 2024 | Revised Manuscript received on 03 November 2024 | Manuscript Accepted on 15 November 2024 | Manuscript published on 30 November 2024 | PP: 13-15 | Volume-11 Issue-11, November 2024 | Retrieval Number: 100.1/ijies.C72650911322 | DOI: 10.35940/ijies.C7265.11111124

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The internet is now in use in all departments of society and is utilised by people of all ages for various purposes. With its increasing usage, security has become a significant concern for secure data transfer over the internet. At this juncture, the importance of cryptography pokes in. Polyalphabetic cypher is one type of cryptography in which an alphabet can be substituted for another. This article explores various methods for generating Cypher text using the Polyalphabetic Cypher.

Keywords: Cryptography, Poly Alphabetic, Cipher, Alberti, Trithemius, Vigenère.
Scope of the Article: Computer Science and Applications