Security and Authentication through Text Encryption and Decryption based on Substitution Method
Munish Mehta1, Vijay Goyar2, Vishnu Bairwa3

1Dr. Munish Mehta, Department of Computer Application, National Institute of Technology, Kurukshetra (Haryana), India.

2Vijay Goyar, Department of Computer Application, National Institute of Technology, Kurukshetra (Haryana), India.

3Vishnu Bairwa, Department of Computer Application, National Institute of Technology, Kurukshetra (Haryana), India.

Manuscript received on 09 August 2019 | Revised Manuscript received on 17 August 2019 | Manuscript Published on 26 August 2019 | PP: 112-115 | Volume-8 Issue-9S August 2019 | Retrieval Number: I10170789S19/19©BEIESP DOI: 10.35940/ijitee.I1017.0789S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In order to maintain security, privacy and integrity of important information or data is a great challenge in today’s world. Cryptography is a technique to prevent important data from hackers and intruder by converting important information in encrypted text by using an encryption algorithm. This paper is a review of various symmetric and asymmetric cryptography techniques. In this paper some gaps have been identified after reviewing some algorithms like they don’t work for case sensitive data but merely works for uppercase alphabets, they don’t encrypt numerically, spaces and they don’t run on the special symbol. In our proposed solution an effort to expand the original 5X5 character set of the Play Fair algorithm will be done so as to include lower case alphabets(a-z), some symbols, numeric(0-9) and a special character ‘’ for space. So, a new algorithm will encrypt lowercase, numeric, symbols as well as spaces.

Keywords: Cipher, Cryptanalysis, Decryption, Encryption, Private Key, Public Key, Substitution, Transposition.
Scope of the Article: Encryption Methods and Tools