Abstract |
: |
In this study we explore the features of Genetic
Algorithm with poly substitution methods to
generate ASCII values of the given text and then
applying conversion, transposition with the features
of Cryptography. In PS ciphers the plaintext letters
are enciphered differently depending upon their
placement in the text. As the name polyalphabetic
suggests this is achieved by using several two, three
keys and random keys combinations instead of just
one, as is the case in most of the simpler crypto
systems. Using two keys, we take 2 keys e1,e2 and
let the ASCII values of e1 be 1 and e2 be 2 and take
the text, add ASCII values of e1 to first character
and ASCII values of e2 to second character.
Alternatively add the value of e1 and e2 to
consecutive characters. |