A symmetric and a transposition cipher using the Euler’s totient function

Cryptography provides a method of exchanging sensitive information in a secured form while assuring its confidentiality. Encryption and decryption are the two steps in which the process gets completed. In the present work, we introduce two algorithms using modular arithmetic and ASCII symbols to enc...

Full description

Bibliographic Details
Main Authors: A. P. Madushani, P. G. R. S. Ranasinghe
Format: Article
Language:English
Published: Faculty of Science, University of Peradeniya, Sri Lanka 2019-12-01
Series:Ceylon Journal of Science
Subjects:
Online Access:https://cjs.sljol.info/articles/7672