Evaluation of Cipher Application Based on Digital Permutation Technical
Main Article Content
Abstract
Security is one of the most prominent and important terms at the present time in order to protect our information and data that we want to preserve from any interference or intrusion. Security and the protection of our data can be achieved in several ways, the most important of which is cryptography.
Due to the importance of documents and information that institutions need to deal with or transfer via the Internet, and therefore unauthorized persons or through hackers can view and manipulate them. Therefore, these documents must be encrypted using cipher methods and techniques .
In this study, it was proposed new cipher application based on digital permutation technical . The application encrypts text files and it is characterized by high randomness . This system works on permutation of the letters and symbols many times until to get the ciphertext.
After the application, testing and evaluation of the system by the intended users, it was found that the system achieves the objectives of this study and meets the needs and requirements of the users in an easy and uncomplicated manner.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.