Implementation of hybrid encryption method using caesar cipher algorithm
In daily life,we use Internet or accessing information from various sources.Some of the procedure requires us to sending our own information.The objective of this project is to explore the way of doing encryption,improve certain aspect of the existing algorithm and to find out a way to create better...
| Main Author: | Charomie, Tat Wi |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/4678/ http://umpir.ump.edu.my/id/eprint/4678/1/CHAROMIE_AL_TAT_WI.PDF |
Similar Items
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Visual execution of caesar cipher methods and its application
by: Nur Syafiqa, Ismail
Published: (2014)
by: Nur Syafiqa, Ismail
Published: (2014)
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012)
by: Jamel, Sapi’ee
Published: (2012)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Secure text transfer via bluetooth using hybrid encryption
by: Fakhrul Hakimi, Saidi
Published: (2012)
by: Fakhrul Hakimi, Saidi
Published: (2012)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2010)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
by: Moh, Heng Huong
Published: (2014)
by: Moh, Heng Huong
Published: (2014)
Dynamic determinant matrix-based block cipher algorithm
by: Juremi, Julia
Published: (2018)
by: Juremi, Julia
Published: (2018)
Data encryption in e-counselling system (DEECS)
by: Athirah Fayyadhah, Othman
Published: (2009)
by: Athirah Fayyadhah, Othman
Published: (2009)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
Hardware Implementation Of Rc4a Stream Cipher Algorithm
by: Al Noman, Abdullah
Published: (2007)
by: Al Noman, Abdullah
Published: (2007)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
A new approach to data encryption based on the synchronous stream cipher with bit-level diffusion
by: Muda, Zaiton, et al.
Published: (2013)
by: Muda, Zaiton, et al.
Published: (2013)
Exploring self-invertible 3×3 matrices for cipher trigraphic polyfunction with distinct encryption keys
by: Yunos, Faridah, et al.
Published: (2024)
by: Yunos, Faridah, et al.
Published: (2024)
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
by: Hassan Disina, Abdulkadir
Published: (2018)
by: Hassan Disina, Abdulkadir
Published: (2018)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
An embedded cryptosystem implementing symmetric cipher and public-key crypto algorithms in hardware
by: Hau, Yuan Wen
Published: (2005)
by: Hau, Yuan Wen
Published: (2005)
Improving the cost factor of DLBCA lightweight block cipher algorithm
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
Discourse structure of annual reports / Caesar Delwis @ Dealwis
by: Delwis @ Dealwis, Caesar
Published: (1999)
by: Delwis @ Dealwis, Caesar
Published: (1999)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
Implementation of ump course registration system using heuristic method
by: Wong, Wei Leong
Published: (2012)
by: Wong, Wei Leong
Published: (2012)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
A block cipher based on genetic algorithm
by: Zakaria, Nur Hafiza
Published: (2016)
by: Zakaria, Nur Hafiza
Published: (2016)
Schelkunoff array synthesis methods using adaptive-iterative algorithm
by: Abdul Latiff, Nurul Mu'azzah
Published: (2003)
by: Abdul Latiff, Nurul Mu'azzah
Published: (2003)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
Multiple objectives hybrid metaheuristic for spatial-based redistricting : the framework and algorithms
by: Bong, Chin Wei
Published: (2006)
by: Bong, Chin Wei
Published: (2006)
Box-jenkins and genetic algorithm hybrid model for electricity forecasting system
by: Mahpol, Khairil Asmani
Published: (2005)
by: Mahpol, Khairil Asmani
Published: (2005)
Similar Items
-
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010) -
Visual execution of caesar cipher methods and its application
by: Nur Syafiqa, Ismail
Published: (2014) -
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018) -
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012) -
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)