CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Overview on Disrupted Transposition Cipher for Security Enhancement

by B. Mahalakshmi, Ch. Sravan Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 13
Year of Publication: 2016
Authors: B. Mahalakshmi, Ch. Sravan Kumar
10.5120/ijca2016910308

B. Mahalakshmi, Ch. Sravan Kumar . An Overview on Disrupted Transposition Cipher for Security Enhancement. International Journal of Computer Applications. 143, 13 ( Jun 2016), 9-12. DOI=10.5120/ijca2016910308

@article{ 10.5120/ijca2016910308,
author = { B. Mahalakshmi, Ch. Sravan Kumar },
title = { An Overview on Disrupted Transposition Cipher for Security Enhancement },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 13 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number13/25135-2016910308/ },
doi = { 10.5120/ijca2016910308 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:46:26.405379+05:30
%A B. Mahalakshmi
%A Ch. Sravan Kumar
%T An Overview on Disrupted Transposition Cipher for Security Enhancement
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 13
%P 9-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptographic plays a significant role in the internet world. Cryptography comes from the Greek words “secret communication” in the presence of third parties. Cryptographic techniques are used to protect information like substitution and transposition. Caesar cipher is one of the simplest and most extensively known substitution techniques. In Caesar cipher each letter in the plaintext is replaced by a letter in some fixed number of positions down the alphabet. Zigzag cipher is a form of transposition cipher. It derives its name from the way in which it is encoded. In a Disrupted transposition cipher certain positions in a grid are blanked out, and not used when filling in the plaintext. This breaks up regular patterns and makes the cryptanalyst's job more difficult. Caesar Substitution Cipher, Zigzag Cipher and Disrupted Transposition Cipher Techniques are used independently then cipher text acquired is easy to break. To reduce the drawback of substitution and transposition techniques, in this paper we proposed combination of substitution and transposition techniques in order to provide to secure cipher text.

References
  1. William Stallings 2009 cryptography and network security
  2. https://books.google.co.in/books?isbn=0486320316
  3. Jawad Ahmad Dar “Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques” IJSR, 2012.
  4. Rail Fence Cipher, Route Cipher, Columnar transposition Cipher retrieved from http://en.wikipedia.org/Transposition
  5. Mu. Annalakshmi, A. Padmapriya, Zigzag Ciphers: A Novel Transposition Method.
  6. Network Security and Cryptography by Atul Kahate.
  7. Ajit Singh, Aarti Nandal, Swati Malik “Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security” in December 2012.
  8. https://en.wikipedia.org/wiki/Caesar_cipher.
  9. Mr. Vinod Saroha, Suman Mor, Anurag Dagar, “Enhancing Security of Caesar Cipher by Double Columnar Transposition Method” in October 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Substitution Transposition Caesar Cipher Zigzag Cipher Disrupted Transposition Cipher Cipher Text.