[PDF][PDF] Randomized text encryption: A new dimension in cryptography

J Memon, MZ Abd Rozan, M Uddin… - … on Computers and …, 2014 - researchgate.net
Cryptography refers to protecting transmitted information from unauthorized interception or
tampering, while cryptanalysis is art of breaking such secret ciphers and reading …

A Novel Approach of Text Encryption Using Random Numbers and Hash Table

AK Das, N Kar - Advances in Cyber Security: Second International …, 2021 - Springer
In modern days, word files are used to carry out information storage and other multiple
operations. The word file allows the users to write valuable text and information in plain text …

[PDF][PDF] Analysis of various cryptography techniques: a survey

N Tayal, R Bansal, S Gupta, S Dhall - International Journal of …, 2016 - academia.edu
Maintaining the confidentiality of data during communication has always been a prime
concern of many researchers. Several encryption mechanisms have been developed in …

A Review of Text Encryption Techniques

H Agrawal, M Sharma - Asian Journal of Computer …, 2014 - informaciontechnologica.com
In the today world, security is required to transmit confidential information over the network.
Security is also demanding in wide range of applications. Cryptographic algorithms play a …

[HTML][HTML] κ-lookback random-based text encryption technique

MJ Al-Muhammed, RA Zitar - Journal of King Saud University-Computer …, 2019 - Elsevier
Although many encryption methods are available, there is always an ongoing need for more
to resist the adversaries' ever-growing analytical skills and techniques. We propose in this …

Text encryption based on Huffman coding and ElGamal cryptosystem

KM Singh, LD Singh, T Tuithung - Recent Patents on …, 2021 - ingentaconnect.com
Background: Data that are in the form of text, audio, image, and video are used everywhere
in our modern scientific world. These data are stored in physical storage, cloud storage and …

A review and analysis on text data encryption techniques

S Kumar, K Patidar, R Kushwah… - International Journal of …, 2017 - search.proquest.com
In the current age there is need of data security in every field. This paper deals with text data
security. In this area there are several research works have already been done and some in …

[PDF][PDF] Text encryption algorithms based on pseudo random number generator

M Mishra, VH Mankar - International Journal of Computer Applications, 2015 - Citeseer
This paper presents algorithms for encryption and decryption developed using pseudo
random number generator (PRNG) and non-Linear functions. PRNG used in the work are …

Implementation of textual information encryption using 128, 192 and 256 bits advanced encryption standard algorithm

OC Abikoye, QA Garba… - Annals. Computer Science …, 2017 - eprints.lmu.edu.ng
Individual or organizational sensitive data and information need to be prevented from
unauthorized access. Several reports of middle man attacks and intrusion in form of hacking …

[PDF][PDF] An improved cryptographic technique to encrypt text using double encryption

Y Rajput, D Naik, C Mane - International Journal of Computer Applications, 2014 - Citeseer
This work proposes an improved scheme to encrypt the plain text message for its security.
All the conventional encryption techniques are very weak and brute force attack and …