Start Submission Become a Reviewer

Reading: A symmetric and a transposition cipher using the Euler’s totient function

Download

A- A+
Alt. Display

Research Articles

A symmetric and a transposition cipher using the Euler’s totient function

Authors:

A. P. Madushani,

University of Peradeniya, Peradeniya, LK
About A. P.
Department of Mathematics, Faculty of Science
X close

P. G. R. S. Ranasinghe

University of Peradeniya, Peradeniya, LK
About P. G. R. S.
Department of Mathematics, Faculty of Science
X close

Abstract

Cryptography provides a method of exchanging sensitive information in a secured form while assuring its confidentiality. Encryption and decryption are the two steps in which the process gets completed. In the present work, we introduce two algorithms using modular arithmetic and ASCII symbols to encrypt and decrypt messages. Our schemes are based on symmetric ciphers, in which a secret key is exchanged between the sender and the receiver for the encoding and decoding process to take place.
How to Cite: Madushani, A. P., & Ranasinghe, P. G. R. S. (2019). A symmetric and a transposition cipher using the Euler’s totient function. Ceylon Journal of Science, 48(4), 327–330. DOI: http://doi.org/10.4038/cjs.v48i4.7672
Published on 09 Dec 2019.
Peer Reviewed

Downloads

  • PDF (EN)

    comments powered by Disqus