ISSN 2394-5125
 

Research Article 


Provision of Security Using Substitution Ciphers

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish.

Abstract
In recent decade many organizations are facing seviour problems from message hacking and security threats at different levels of organization. The security threats can be overcome with efficient cryptographic techniques. The cryptographic industry has many challenges such as responding the threats on time before being late. The rapid attacks of malicious software highly demands strict implementation of cryptographic techniques. The emerging technologies in cryptographic techniques rises confidence level to overcome security problems in various domains of industries.In the present paper different classical cryptographic techniques are discussed and analysed their respective flaws to analyse the security tools in cryptography industry.

Key words: cryptography, security, encryption, decryption


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by N.SureshKumar
Articles by Ashok Kumar Nanda
Articles by Purnachand Kollapudi
Articles by Bachu Harish
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. Provision of Security Using Substitution Ciphers. JCR. 2020; 7(4): 918-923. doi:10.31838/jcr.07.04.177


Web Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. Provision of Security Using Substitution Ciphers. http://www.jcreview.com/?mno=98983 [Access: April 10, 2021]. doi:10.31838/jcr.07.04.177


AMA (American Medical Association) Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. Provision of Security Using Substitution Ciphers. JCR. 2020; 7(4): 918-923. doi:10.31838/jcr.07.04.177



Vancouver/ICMJE Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. Provision of Security Using Substitution Ciphers. JCR. (2020), [cited April 10, 2021]; 7(4): 918-923. doi:10.31838/jcr.07.04.177



Harvard Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish (2020) Provision of Security Using Substitution Ciphers. JCR, 7 (4), 918-923. doi:10.31838/jcr.07.04.177



Turabian Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. 2020. Provision of Security Using Substitution Ciphers. Journal of Critical Reviews, 7 (4), 918-923. doi:10.31838/jcr.07.04.177



Chicago Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. "Provision of Security Using Substitution Ciphers." Journal of Critical Reviews 7 (2020), 918-923. doi:10.31838/jcr.07.04.177



MLA (The Modern Language Association) Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish. "Provision of Security Using Substitution Ciphers." Journal of Critical Reviews 7.4 (2020), 918-923. Print. doi:10.31838/jcr.07.04.177



APA (American Psychological Association) Style

N.SureshKumar, Ashok Kumar Nanda, Purnachand Kollapudi, Bachu Harish (2020) Provision of Security Using Substitution Ciphers. Journal of Critical Reviews, 7 (4), 918-923. doi:10.31838/jcr.07.04.177