An Extension to Traditional Qwerty Cryptographic Method
DOI:
https://doi.org/10.32628/CSEIT195151Keywords:
Transmission, Intruder, Decrypt, Cipher, Gibberish.Abstract
Cryptography comes from the Greek word kryptos which means hidden. The aim of our research is to provide secrecy for the data during transmission. In this we discuss about the qwerty cipher algorithm, its merits and demerits. The existing qwerty algorithm is based on the use of a keyboard which is not much secured. We have proposed an enhancement to the existing algorithm by using a diagonalized qwerty algorithm which is more secure and highly difficult for the intruder to understand or decrypt the cipher text, even if it is decrypted the result would be gibberish.
References
- ”Transformation of plain Text with two ciphers”,(Rajani Bala,Swapnika saxena,Sonal beniwal), Volume 3, Issue 5, May 2013.
- “Implementation of Ceasar Cipher with Rail Fence for Enhancing Data Security”,(Ajit Singh, Aarti Nandal, Swati Malik), Volume 2, Issue 12 , December 2012.
- “An Extension to Traditional Playfair Cryptographic Method”( Ravindra Babu, Uday Kumar, Vinay Babu, Aditya, Komuraiah), Volume 17, No.5, March 2011.
- “An Improved Ceasar Cipher Algorithm”,(Ochoche Abraham, GaniyO.Shefiu), Volume 2, Issue-5,1198-1202.
- "Alpha-Qwerty Cipher: An Extended Vigenere Cipher”( Khalid Imam Rahmani,Neeta Wadhwa, Vaibhv Malhotra), Volume 3, No.3, May, 2012.
- William Stalling “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004 .
- Atul Kahate (2009), Cryptography and Network Security, second edition, McGraw-Hill.
- William Stallings, Cryptography and Network Security, 5th impression, 2008.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.