Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Reyes, Olivia A."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Publication
    Encryption and decryption algorithms using a substitution cipher and planar graph
    (Don Mariano Marcos Memorial State University - South La Union Campus, 2023-04) Molina, Rose Marie P.; Ramirez, Christian V.; Reyes, Olivia A.
    This study employed pure basic research that deals with the formulation of algorithms for encoding and decoding data using substitution Cipher and planar graph. The encrypted message was sent either through graph or linear form. Moreover, weight of the edges and label of vertices of the planar graph were used to enhance the security of the algorithm created. In addition, a computer program was developed using the Python computer software based from the formulated encryption and decryption algorithms using a substitution cipher and planar graph. As a result, the TeAM EleGATe encryption and TEAM ProTex decryption algorithms were constructed in terms of its weight of the edges and label of vertices. Additionally, a computer program was developed using the Python Programming Language based from the formulated encryption and decryption algorithms.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback