International Journal of Advanced Multidisciplinary Research and Studies
Volume 6, Issue 1, 2026
Design and Development of a Higher Level Encryption System Platform: A Comprehensive Approach to User Education and Ecryption Reproduction
Author(s): Arnold Kabaya, M Mupeta
Abstract:
Secure communication has been required since thousands of years. This led to the invention of cryptography. In ancient world, primitive methods were adopted for passing messages secretly. But with the invention of internet and world wide web, which is used for communicating via mail, messages, online shopping, online banking, etc., increased the need of information security. Thus a proper understanding of various methods of cryptography and its implementation can fulfill the requirements of securing valuable and sensitive information. This paper takes us through the various methods of cryptography adopted in the ancient period, medieval period and the modern era.
Ancient Egyptians and ancient Mesopotamians were the first to use basic encryption. The practice became more sophisticated in ancient Greece with philosophers like Polybios.
Encryption dates back almost 4,000 years to the earliest uses of hieroglyphics. It has been used for everything from children's games to warfare in the intervening years and remains an important part of daily life today. In ancient Egypt, some hieroglyphs were substituted for others, possibly as a way to make texts more socially appropriate in various contexts. Other early ciphers included the ATBASH cipher and the Caesar cipher.
Encryption is the process of putting information into a coded system and using a key to decipher it. It is different from encoding because a code can be reversed through the same mechanism that created it, whereas encryption requires a secret key. The basis of encryption is cryptography, the practice of writing and solving codes. There have historically been many uses for encryption, and there are uses today as well by anyone who wants to create secret information that can only be read by parties with the appropriate knowledge. It has applications in digital data security, warfare, games, mystery novels, and much more. The history of cryptography and the associated history of encryption is much longer than many people realize. It has increased in complexity over the years. Today, there are some forms of encryption that are effectively impossible to crack without the necessary information. People have long found good reasons to encrypt information to keep it away from prying eyes.
Keywords: Higher Level Encryption, ATBASH, Caesar
Pages: 1067-1074
Download Full Article: Click Here

