The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Data sharing through the networks becomes an important aspect in today's computing scenario. The main advantage of networks is fast transmission of data, at the same time the disadvantage is the security threats. This paper describes about the cryptography for ensuring data confidentiality and also discusses about substitution cipher. Cryptanalysis is done with an example data to show how the encipherment algorithms are broken which will help the researchers to develop more secured encipherment algorithms.

Keywords

Network Security, Security Threats, Cryptography, Cryptanalysis, Substitution Cipher .
User
Notifications