A symmetric and a transposition cipher using the Euler’s totient function
Cryptography provides a method of exchanging sensitive information in a secured form while assuring its confidentiality. Encryption and decryption are the two steps in which the process gets completed. In the present work, we introduce two algorithms using modular arithmetic and ASCII symbols to enc...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Faculty of Science, University of Peradeniya, Sri Lanka
2019-12-01
|
Series: | Ceylon Journal of Science |
Subjects: | |
Online Access: | https://cjs.sljol.info/articles/7672 |