Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/1768
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdebayo, Olawale Surajudeen-
dc.contributor.authorOlalere, Morufu-
dc.contributor.authorUgwu, Joel-
dc.date.accessioned2021-06-06T17:35:38Z-
dc.date.available2021-06-06T17:35:38Z-
dc.date.issued2015-
dc.identifier.citationDOI: 10.6131/MISR.2015.2002.03en_US
dc.identifier.issn10.6131/MISR.2015.2002.03-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1768-
dc.description.abstractThe purpose of cryptography is to ensure information is made in such a way that an unintended individual will not have access to it or does not understand what it means when intercepted on a communication network. Some people try to defeat this purpose by using an extra ordinary means to harm the algorithmic construct of the system. The effort required for this purpose depends on the complexity of the algorithm and the number of cryptographic-ciphers used. Given that effort required to cryptanalyze ciphertext when one-algorithmic transformation was made is x-effort, then the effort required when n-algorithmic transformation was done is nx-effort. This paper implements multilevel encryption algorithm using two cryptosystem; RSA and Substitution cryptosystem with one transformation per each. It presents an algorithmic paradigm which can be implemented using any programming language. It simplifies the stages used for both encryption and decryption, presenting each stage in a sequential orderen_US
dc.language.isoenen_US
dc.publisherMIS Reviewen_US
dc.relation.ispartofseriesVolume 20;2-
dc.subjectCryptographyen_US
dc.subjectn-Cryptographyen_US
dc.subjectCryptosystemen_US
dc.subjectCiphertexten_US
dc.subjectMultilevel Encryptionen_US
dc.subjectRSA Cryptosystemen_US
dc.subjectSubstitution Cryptosystemen_US
dc.titleImplementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystemen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
MISR 20-2 03 Prof. Adebayo.pdf1.77 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.