Figure 2 - uploaded by Neel Adwani
Content may be subject to copyright.
Flowchart for understanding the process of deciphering an Esocipher

Flowchart for understanding the process of deciphering an Esocipher

Source publication
Preprint
Full-text available
This paper proposes a whole new concept in the field of Cryptography , i.e., EsoCiphers. Short for Esoteric Cipher, EsoCipher is an algorithm, which can be understood by a few, who have the knowledge about its backend architecture. The idea behind this concept is derived from esoteric programming languages, but EsoCiphers will be having a practical...

Similar publications

Preprint
Full-text available
Till now geometric structures don't play a major role in cryptography. Gilbert, MacWilliams and Sloane introduced in 1974 an authentication scheme in the projective plane and showed its perfectness in the sense of the definition of Shannon. In this paper we will show that this authentication scheme also fulfills the requirement of completeness acco...
Article
Full-text available
- Cryptography is the art of securing and keeping text or message from other people except those who receive it. Caesar Cipher algorithm is a classic algorithm that is vulnerable to hacker attacks by the brute force method. Caesar Cipher with 7 methods, the first is a transposition, the second is a permutation, the third is binary converting, the f...
Research
Full-text available
In this paper, we have used a modified Hill cipher for encrypting a binary image. Here, we have illustrated the process of encryption by considering a couple of examples. The security of the image is totally achieved, as the encrypted version of the image, does not reveal any feature of the original image.
Article
Full-text available
Cryptography is the science of writing messages in unknown form using mathematical models. In Cryptography, several ciphers were introduced for the encryption schemes. Recent research focusing on designing various mathematical models in such a way that tracing the inverse of the designed mathematical models is infeasible for the eve droppers. In th...
Article
Full-text available
The advent of the digital era and computer-based remote communications has significantly enhanced the applicability of various sciences over the past two decades, notably data science (DS) and cryptography (CG). Data science involves clustering and categorizing unstructured data, while cryptography ensures security and privacy aspects. Despite cert...