2022
DOI: 10.4018/978-1-6684-5741-2.ch009
|View full text |Cite
|
Sign up to set email alerts
|

An Encryption and Decryption Model for Data Security Using Vigenere With Advanced Encryption Standard

Abstract: As the amount of data being sent has risen dramatically in recent years; protecting that data has become increasingly important. Cryptography is the process of transforming plain text messages into ones that can no longer be decoded. An information security system's algorithm for encrypting and decrypting data cannot function without them. Data transmission via a communication network can benefit greatly from the use of encryption. Short message service (SMS) is still popular despite the availability of severa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Similarly, the Zigzag cipher, functioning as a transposition cipher, rearranges the letters of the plaintext according to a specific pattern. Although the Zigzag cipher offers better security than the Caesar cipher, it is vulnerable to brute force and known plaintext attacks discerption regarding the reference 19,20 .…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, the Zigzag cipher, functioning as a transposition cipher, rearranges the letters of the plaintext according to a specific pattern. Although the Zigzag cipher offers better security than the Caesar cipher, it is vulnerable to brute force and known plaintext attacks discerption regarding the reference 19,20 .…”
Section: Resultsmentioning
confidence: 99%
“…The Vigenère key, in its pivotal role, contributes to both message encryption and decryption. The impact of this multifaceted involvement on the system's overall execution complexity merits thorough evaluation, as it may influence the efficiency of data protection measures and the system's responsiveness to user needs discerption regarding the reference 19,20 .…”
Section: Figure 3 Proposed Algorithmmentioning
confidence: 99%