Transposition Cipher

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 267 Experts worldwide ranked by ideXlab platform

Jawad Ahmad Dar - One of the best experts on this subject based on the ideXlab platform.

  • Modified Encryption Technique by Triple Substitution on Playfair Square Cipher Using 6 By 6 Matrix with Five Iteration Steps
    2015
    Co-Authors: Monika Arora, Anish Sandiliya, Jawad Ahmad Dar
    Abstract:

    An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures. The main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. This paper is a step toward developing an encryption system which can encrypt any text messages securely. Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to Cipher text. Substitution and Transposition are techniques for encoding. When Caesar Cipher substitution, Rail fence Cipher and Columnar Transposition Cipher techniques are used individually, Cipher text obtained is easy to crack. This Paper will present a perspective on combination of techniques like substitution and Transposition with play fair square Cipher to enhance

  • ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR Transposition Cipher BY CAESAR Cipher AND RAIL FENCE Cipher TECHNIQUE.
    2014
    Co-Authors: Jawad Ahmad Dar
    Abstract:

    Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to Cipher text. Substitution and Transposition are techniques for encoding. When Caesar Cipher substitution, Rail fence Cipher and Columnar Transposition Cipher techniques are used individually, Cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and Transposition. Combining Caesar Cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a Cipher text that is hard to crack. In this paper I am going to design a new algorithm that enhance the security of Simple Columnar Transposition Cipher using existing technique of rail fence and Caesar Cipher.

  • implementation of one time pad Cipher with rail fence and simple columnar Transposition Cipher for achieving data security
    2014
    Co-Authors: Jawad Ahmad Dar, Sandeep Sharma
    Abstract:

    Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to Cipher text. Substitution and Transposition are techniques for encoding. When Caesar Cipher substitution, Rail fence Cipher and Columnar Transposition Cipher techniques are used individually, Cipher text obtained is easy to crack. This Paper will present a perspective on combination of techniques like Rail fence and colounar Transposition with one time pad Cipher. One Time Pad is an example of substitution method. In this paper I will presented how to improve security of One Time Pad Cipher to make it more secure and strong by Its implementation with Rail fence and columnar Transposition Cipher

Mohadeseh Kanafchian - One of the best experts on this subject based on the ideXlab platform.

Tomoaki Sato - One of the best experts on this subject based on the ideXlab platform.

  • Double Cipher Implementation in a Ubiquitous Processor Chip
    2012
    Co-Authors: Masa-aki Fukase, Tomoaki Sato
    Abstract:

    This paper focuses on improving the Cipher strength of a particular ubiquitous processor HCgorilla. The reason why this is called the ubiquitous processor is due to its specific features for ubiquitous computing. Ubiquitous computing is really a leading edge trend of next generation information and communication technologies. One of the most promising solutions for ubiquitous computing applied to HCgorilla is exploiting not higher speed but parallelism. It has progressed the overall status of ubiquitous and processor techniques. The basic organization of HCgorilla follows multicore and multiple pipelines. These are Java compatible media pipelines (shortened to pipes hereafter) with sophisticated structures and Cipher pipes. The Cipher pipe implements Transposition Cipher called RAC (random number addressing cryptography) by using a hardware RNG (random number generators). Although RAC is excellent at software-transparency, it is not always sufficient for practical security. Since emerging ubiquitous environment requires strong security as well as high performance, it is also a crucial issue to enhance Cipher strength. Thus, the improved HCgorilla in this study embeds two RNGs. These are used for double Cipher, that is, the one for RAC and the other for a substitution Cipher by data sealing. This approach promises strong Cipher strength without any overhead for hardware cost, power dissipation, throughput, etc. Various aspects of the improved HCgorilla are evaluated.

  • Double Cipher implementation in a ubiquitous processor chip
    The 8th Electrical Engineering Electronics Computer Telecommunications and Information Technology (ECTI) Association of Thailand - Conference 2011, 2011
    Co-Authors: Masa-aki Fukase, Harunobu Uchiumi, Takumi Ishihara, Naomichi Mimura, Kazuki Narita, Tatsuya Takaki, Tomoaki Sato
    Abstract:

    This paper focuses on improving the Cipher strength of a particular ubiquitous processor HCgorilla. The reason why this is called the ubiquitous processor is because it progresses the overall status of ubiquitous and processor techniques. Ubiquitous computing is really a leading edge trend of next generation information and communication technologies. One of the most promising solutions for ubiquitous computing is exploiting not higher speed but parallelism in advanced circuits. In order to do this, it is really worthwhile to exploit hardware parallelism. Actually, the basic organization of HCgorilla follows multicore and multiple pipelines. These are Java compatible media pipes and Cipher pipes. While the Cipher pipe has been so far built in only one hardware RNG (random number generators), the improved HCgorilla makes it to have two RNGs. The novelty of this study is to use them for double Cipher, that is, the one for Transposition Cipher called RAC (random number addressing cryptography) and the other for a substitution Cipher by data sealing. Various aspects of the improved HCgorilla are studied. Those are the alternatives to this design, internal architectures or algorithms, comparison results with conventional works, encryption/decryption performance, the benefits and costs of this approach, new knowledge to be drawn from this design. According to evaluation, the double Cipher promises practically secure strength without any overhead.

Sandeep Sharma - One of the best experts on this subject based on the ideXlab platform.

  • implementation of one time pad Cipher with rail fence and simple columnar Transposition Cipher for achieving data security
    2014
    Co-Authors: Jawad Ahmad Dar, Sandeep Sharma
    Abstract:

    Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to Cipher text. Substitution and Transposition are techniques for encoding. When Caesar Cipher substitution, Rail fence Cipher and Columnar Transposition Cipher techniques are used individually, Cipher text obtained is easy to crack. This Paper will present a perspective on combination of techniques like Rail fence and colounar Transposition with one time pad Cipher. One Time Pad is an example of substitution method. In this paper I will presented how to improve security of One Time Pad Cipher to make it more secure and strong by Its implementation with Rail fence and columnar Transposition Cipher

Robert Talbert - One of the best experts on this subject based on the ideXlab platform.

  • Fixed Points of Columnar Transpositions
    Journal of Discrete Mathematical Sciences and Cryptography, 2015
    Co-Authors: Beth Bjorkman, Robert Talbert
    Abstract:

    AbstractA columnar Transposition Cipher encrypts messages by inserting the plaintext into a rectangular grid one row at a time and then removing the contents of the grid one column at a time to produce the Ciphertext. The grid is created by choosing a natural number C and then making a grid with C columns and [L/C] rows, where L is the length of the message. We denote the columnar Transposition with these parameters by πC,L. It is evident that πC,L is a permutation on the positions of characters in the message. In this paper, we prove several results about the fixed points of this permutation for general C and L. We first locate positions in the message that are always fixed and prove that no column in the enCiphering grid can contain more than one fixed point. We then give several results that provide a method of iteratively checking columns for nontrivial fixed points. Our results culminate in an algorithm for finding the fixed points of πC,L whose time complexity depends only on the number of columns c...

  • The Cycle Structure and Order of the Rail Fence Cipher
    Cryptologia, 2006
    Co-Authors: Robert Talbert
    Abstract:

    Abstract Any Transposition Cipher used on a message having length L may be thought of as a permutation on the set {0, 1,…, L − 1}. We derive an explicit formula for the permutation implementing a columnar Transposition Cipher using C columns on a text of length L. We then specialize to the rail fence Cipher and derive a formula for an iterated rail fence Cipher. Using these formulae, we examine the order of the rail fence Cipher in the group S L . Its order is determined to be the order of 2 in the multiplicative group of units ℤ L *. Finally, we use the mathematical results to describe an attack on an iterated rail fence Cipher in which the number of iterations is unknown.