An Extension to Traditional Qwerty Cryptographic Method

Authors

  • V. Vennila  Assistant Professor, Department of Information Technology, Bon Secours College for Women, Thanjavur, Tamil Nadu, India
  • S. Umamaheswari  Assistant Professor, Department of Information Technology, Bon Secours College for Women, Thanjavur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195151

Keywords:

Transmission, Intruder, Decrypt, Cipher, Gibberish.

Abstract

Cryptography comes from the Greek word kryptos which means hidden. The aim of our research is to provide secrecy for the data during transmission. In this we discuss about the qwerty cipher algorithm, its merits and demerits. The existing qwerty algorithm is based on the use of a keyboard which is not much secured. We have proposed an enhancement to the existing algorithm by using a diagonalized qwerty algorithm which is more secure and highly difficult for the intruder to understand or decrypt the cipher text, even if it is decrypted the result would be gibberish.

References

  1. ”Transformation of plain Text with two ciphers”,(Rajani Bala,Swapnika saxena,Sonal beniwal), Volume 3, Issue 5, May 2013.
  2. “Implementation of Ceasar Cipher with Rail Fence for Enhancing Data Security”,(Ajit Singh, Aarti Nandal, Swati Malik), Volume 2, Issue 12 , December 2012.
  3. “An Extension to Traditional Playfair Cryptographic Method”( Ravindra Babu, Uday Kumar, Vinay Babu, Aditya, Komuraiah), Volume 17, No.5, March 2011.
  4. “An Improved Ceasar Cipher Algorithm”,(Ochoche Abraham, GaniyO.Shefiu), Volume 2, Issue-5,1198-1202.
  5. "Alpha-Qwerty Cipher: An Extended Vigenere Cipher”( Khalid Imam Rahmani,Neeta Wadhwa, Vaibhv Malhotra), Volume 3, No.3, May, 2012.
  6. William Stalling “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004 .
  7. Atul Kahate (2009), Cryptography and Network Security, second edition, McGraw-Hill.
  8. William Stallings, Cryptography and Network Security, 5th impression, 2008.

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
V. Vennila, S. Umamaheswari, " An Extension to Traditional Qwerty Cryptographic Method, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.340-342, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT195151