DATA SECURITY USING VIGENERE CIPHER AND GOLDBACH CODES ALGORITHM (original) (raw)

Implementation of Vigenere Cipher as Cryptographic Algorithm in Securing Text Data Transmission

Imam Sujono

Innovare Academics Sciences Pvt. Ltd, 2020

View PDFchevron_right

An Enhanced Vigenere Cipher For Data Security

Engr Irfan Riaz Shohab Sandhu

View PDFchevron_right

Modified Vigenère cipher algorithm based on new key generation method

Haval Tariq Sadeeq, Indonesian Journal of Electrical Engineering and Computer Science

Indonesian Journal of Electrical Engineering and Computer Science, 2022

View PDFchevron_right

A Hybrid Cryptographic Scheme of Modified Vigenère Cipher using Randomized Approach for Enhancing Data Security

Sazzad Hossain Saju

International Journal of Computer Applications, 2021

View PDFchevron_right

A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication

G. Dobhal

Wirel. Pers. Commun., 2021

View PDFchevron_right

Survey: Recent Modifications in Vigenere Cipher

Ranju S Kartha

IOSR Journal of Computer Engineering, 2014

View PDFchevron_right

A Modified Version of Vigenere Cipher using 95×95 Table

khairun Nahar

International Journal of Engineering and Advanced Technology, 2020

View PDFchevron_right

An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication

Chahat Khatri

Procedia Computer Science, 2016

View PDFchevron_right

Vigenere Cipher: Trends, Review and Possible Modifications

Abdulrahman Olaniyan, Al-Amin Aliyu

View PDFchevron_right

A Modified Key Generation Scheme of Vigenère Cipher Algorithm using Pseudo-Random Number and Alphabet Extension

Khatalyn Mata, Antolin Alipio, R. Blanco

2021 7th International Conference on Computer and Communications (ICCC)

View PDFchevron_right

Caesar Cipher with Goldbach Code Compression for Efficient Cryptography

Jancarlo Arroyo, WARSE The World Academy of Research in Science and Engineering

International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), 2020

View PDFchevron_right

Combination Vigenere Cipher and One Time Pad for Data Security

achmad daengs

International Journal of Engineering & Technology

View PDFchevron_right

A Cryptosystem Based On Vigenere Cipher By Using Mulitlevel Encryption Scheme

Dr. Sanjeev K U M A R Mandal

View PDFchevron_right

Key Generation for Vigenere Ciphering Based on Genetic Algorithm

Asraa Abdullah Hussein

JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences

View PDFchevron_right

Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher

Siti Agustini

International Journal of Artificial Intelligence & Robotics (IJAIR), 2019

View PDFchevron_right

SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm

bazeer ahamed

Journal of the Operations Research Society of China, 2020

View PDFchevron_right

Design of Digital Image Application Using Vigenere Cipher Algorithm

Entik Insanudin, Yana Aditia

View PDFchevron_right

Using Genetic Algorithm for the Breaking Vigenere Cipher

Zurab Kochladze

2017

View PDFchevron_right

An Improvement of RC4 Cipher Using Vigenere Cipher

Seifedine Kadry

Arxiv preprint arXiv:1111.5641, 2011

View PDFchevron_right

A HYBRID CRYPTOSYSTEM BASED ON VIGENERE CIPHER AND COLUMNAR TRANSPOSITION CIPHER

Kester Quist-Aphetsi

2013

View PDFchevron_right

Application of Message Security Application Using Vigenere Cipher Algorithm Utilizing One Time Pad (OTP) Algorithm as a Key Generator

Akbar Iskandar

Journal of Physics: Conference Series

View PDFchevron_right

A cryptanalytic attack on Vigenère cipher using genetic algorithm

safaa omran

2011 IEEE Conference on Open Systems, 2011

View PDFchevron_right

Encryption and Decryption Application on Images with Hybrid Algorithm Vigenere and RSA

auli damayanti

Contemporary Mathematics and Applications (ConMathA)

View PDFchevron_right

Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File

Imam Saputra

View PDFchevron_right

Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents

Yusuf Yudi Prayudi

International Journal of Computer Applications, 2015

View PDFchevron_right