A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Jawad Ahmad Dar; Amit Verma;
Page : 9-16
Keywords : Cryptography; Cipher text; Substitution; Transposition; Caesar Cipher; Columnar Transposition Cipher; cryptanalysis; key; C;
Abstract
This paper is a step toward developing an encryption system which can encrypt any text message securely. An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures. the main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. In every important sector these networks are used to collect information or transfer them with a high level of security. For this reason here we require a strong encryption Technique. Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. Finally I have implemented this concept with the help of TURBO C++.
Other Latest Articles
- Impact of HIV/HBV Co-infection on Blood Donor CD4+ Cell Count in Jos, North-Central Nigeria
- Improving the Resource Allocation in Grid Computing using Fusion of SS-GA
- 1914 YILINA AİT “ASTİR” ALMANAĞINDA YER ALAN KARAMANLI YAZAR “EVANGELİNOS MİSAİLİDİS”E DAİR YAZI
- YUNAN ORDUSU’NUN İZMİR VE AYDIN’I İŞGALİ ESNASINDA YAŞANAN AŞIRILIKLARIN TEKRARLANMAMASI İÇİN BAŞBAKAN VENİZELOS’UN GENERAL NİDER’E GÖNDERDİĞİ TELGRAF
- İKİNCİ DÜNYA SAVAŞI SONRASINDA TÜRKİYE TURİZMİNDE YAŞANAN SORUNLAR (1945-1949)
Last modified: 2021-06-30 21:44:39