ABSTRACT
요약
1. Introduction
2. Related Works
2.1 Encryption Process
2.2 Classical Cryptography
2.3 Representative Types of Substitution
3. Proposed Flow-chart Model
3.1 Table Creation Flow
3.2 Encryption Flow
3.3 Decryption Flow
4. Full Process of Flow
4.1 Setting Coding Environment
4.2 Table Creation
4.3 Integrated Flow
5. Experimental Study
5.1 Test Process
5.2 Test Program
5.3 Result of Program Running
6. Conclusion
References