Please use this identifier to cite or link to this item:
https://ah.lib.nccu.edu.tw/handle/140.119/100322
DC Field | Value | Language |
---|---|---|
dc.creator | Adebayo, Olawale S.;Olalere, Morufu;Ugwu, Joel N. | |
dc.date | 2015-03 | |
dc.date.accessioned | 2016-08-16T08:23:43Z | - |
dc.date.available | 2016-08-16T08:23:43Z | - |
dc.date.issued | 2016-08-16T08:23:43Z | - |
dc.identifier.uri | http://nccur.lib.nccu.edu.tw/handle/140.119/100322 | - |
dc.description.abstract | The purpose of cryptography is to ensure information is made in such a way that an unintended individual will not have access to it or does not understand what it means when intercepted on a communication network. Some people try to defeat this purpose by using an extra ordinary means to harm the algorithmic construct of the system. The effort required for this purpose depends on the complexity of the algorithm and the number of cryptographic-ciphers used. Given that effort required to cryptanalyze ciphertext when one-algorithmic transformation was made is x-effort, then the effort required when n-algorithmic transformation was done is nx-effort. This paper implements multilevel encryption algorithm using two cryptosystem; RSA and Substitution cryptosystem with one transformation per each. It presents an algorithmic paradigm which can be implemented using any programming language. It simplifies the stages used for both encryption and decryption, presenting each stage in a sequential order. | |
dc.format.extent | 1963323 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.relation | 資管評論, 20(2), 57-75 | |
dc.relation | MIS review | |
dc.subject | Cryptography;n-Cryptographic;Ciphertext;Cryptosystem;Cryptanalysis;Multilevel Encryption;RSA Cryptosystem;Substitution Cryptosystem | |
dc.title | Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem | |
dc.type | article | |
dc.identifier.doi | 10.6131/MISR.2015.2002.03 | |
dc.doi.uri | http://dx.doi.org/10.6131/MISR.2015.2002.03 | |
item.cerifentitytype | Publications | - |
item.grantfulltext | open | - |
item.openairetype | article | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
Appears in Collections: | 期刊論文 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
20(2)-57-75.pdf | 1.92 MB | Adobe PDF2 | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.