CFP last date
20 May 2024
Reseach Article

Zigzag Ciphers: A Novel Transposition Method

Published on December 2013 by Mu. Annalakshmi, A. Padmapriya
International Conference on Computing and information Technology 2013
Foundation of Computer Science USA
IC2IT - Number 2
December 2013
Authors: Mu. Annalakshmi, A. Padmapriya
3472376b-4f67-45b7-84ec-3907accda62a

Mu. Annalakshmi, A. Padmapriya . Zigzag Ciphers: A Novel Transposition Method. International Conference on Computing and information Technology 2013. IC2IT, 2 (December 2013), 8-12.

@article{
author = { Mu. Annalakshmi, A. Padmapriya },
title = { Zigzag Ciphers: A Novel Transposition Method },
journal = { International Conference on Computing and information Technology 2013 },
issue_date = { December 2013 },
volume = { IC2IT },
number = { 2 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 8-12 },
numpages = 5,
url = { /proceedings/ic2it/number2/14393-1314/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computing and information Technology 2013
%A Mu. Annalakshmi
%A A. Padmapriya
%T Zigzag Ciphers: A Novel Transposition Method
%J International Conference on Computing and information Technology 2013
%@ 0975-8887
%V IC2IT
%N 2
%P 8-12
%D 2013
%I International Journal of Computer Applications
Abstract

The requirement of information security has undergone changes in the last several decades. Network security measures are needed to protect data during their transmission. Cryptography is probably the most important aspect of communications security and is becoming increasingly important as a basic building block for computer security. This paper sets out to develop a hybrid way of encryption of plain text by combining rail fence cipher and columnar transposition cipher. This approach provides more security to information when compared with simple columnar transposition.

References
  1. Atul Kahate, "Cryptography and Network Security", Tata Mc-Graw Hill, 2003.
  2. William Stallings, "Cryptography and Network Security: Principles and Practice", 4th Edition, Prentice Hall, 2006.
  3. Quist-Aphetsi Kester, "A Hybrid Cryptosystem based on Vigenere Cipher an Columnar Transposition Cipher" , International Journal of Advanced Technology and Engineering Research (2250-3536), Volume 3, Issue 1, Jan 2013.
  4. S. D. Padiya, D. N. Dakhane, "Plaintext Based Transposition Method", International Journal of Advanced Research and Software Engineering (2277 128X), Volume 2, Issue 7, July 2012.
  5. "Transposition method for cryptography" by Satish Bansal and Rajesh Shrivastava, The IUP Journal of Computer Sciences, Vol. V, No. 4, 2011.
  6. Rail Fence Cipher, Route Cipher, Columnar Transposition Cipher retrieved from http://en. wikipedia. org/Transposition
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Rail Fence Cipher Columnar Transposition