International Journal of Computer Science and Mobile Computing (IJCSMC)
Combination of encryption and decryption for secure communication is an application. Here, the authors are using permutation and substitution technique to make the people's data more secure. It is concerned in hiding the information in secure and robust manner so that the confidentiality of the data remains. This paper also attempts to identify the requirement of good key generation algorithm and its decryption. This allows the user to choose whether or not they want to encrypt the data and have it password protected and the type of algorithm to use for encryption.