Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography

@inproceedings{Gorodilov2015InformationST,
  title={Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography},
  author={Aleksey Gorodilov and Vladim{\'i}r and Bethany Delman and 'Genetic and Sujith Ravi and Kevin Knight and 'Attacking},
  year={2015}
}
In polyalphabetic substitution ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys combinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1,e2… CONTINUE READING