

share/java/apache-ant/lib/ant-apache-bsf.pom.share/java/apache-ant/lib/ant-apache-log4j.jar.share/java/apache-ant/lib/ant-apache-log4j.pom.share/java/apache-ant/lib/ant-apache-oro.jar.share/java/apache-ant/lib/ant-apache-oro.pom.share/java/apache-ant/lib/ant-apache-regexp.jar.share/java/apache-ant/lib/ant-apache-regexp.pom.share/java/apache-ant/lib/ant-apache-resolver.jar.share/java/apache-ant/lib/ant-apache-xalan2.jar.share/java/apache-ant/lib/ant-apache-xalan2.pom.share/java/apache-ant/lib/ant-commons-logging.jar.share/java/apache-ant/lib/ant-commons-logging.pom.share/java/apache-ant/lib/ant-commons-net.jar.share/java/apache-ant/lib/ant-commons-net.pom.share/java/apache-ant/lib/ant-imageio.jar.share/java/apache-ant/lib/ant-imageio.pom.share/java/apache-ant/lib/ant-javamail.jar.share/java/apache-ant/lib/ant-javamail.pom.share/java/apache-ant/lib/ant-jdepend.jar.share/java/apache-ant/lib/ant-jdepend.pom.share/java/apache-ant/lib/ant-junit.jar.share/java/apache-ant/lib/ant-junit.pom.share/java/apache-ant/lib/ant-junit4.jar.share/java/apache-ant/lib/ant-junit4.pom.share/java/apache-ant/lib/ant-junitlauncher.jar.share/java/apache-ant/lib/ant-junitlauncher.pom.share/java/apache-ant/lib/ant-launcher.jar.

share/java/apache-ant/lib/ant-launcher.pom.In this approach the encryption is simply adding the key to the plain text number to get the cipher text number while decryption is subtracting the key from the cipher text number to get the plain text, normally a crypt-analyst can easily find out key but in this odd-even approach a combination of two numbers is used for encryption.

In Mono alphabetic substitution, a character in the plain text is always changed to the same character in the cipher text regardless of its position in the text. This paper describes one such application of Mono alphabetic substitution. This paper presents an approach of odd-even based cryptography which implies encryption to be applied must be different for the odd and even numbers. This paper describes how such an odd-even based encryption is applied, and how this approach makes a Cryptanalyst's job much tougher. Every character is represented as a number, which is either odd or even they are to be encrypted differently.
