A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
This paper is a step toward developing an encryption system which can encrypt any text message securely. An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures .the main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. In every important sector these networks are used to collect information or transfer them with a high level of security. For this reason here we require a strong encryption Technique. Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. Finally I have implemented this concept with the help of TURBO C++.
Introducing an Encryption Algorithm based on IDEA
International Data Encryption Algorithm (IDEA) is one of the encryption algorithms that is widely used for security purpose. IDEA block cipher operates with 64-bit plain text block and 64-bit cipher text block, and a 128...
Political Economy and the Local Governance in Kenya during the Pre - August 2010 Constitution: A Synoptic Review
"This paper explores how changing economic circumstances have affected performance of the government, in terms of governance, during the pre-August 2010 Constitutional dispensation. Further, the review introduces issues...
Comparative Study on Dysfunctional Attitudes among Parents having Children with Intellectual Disability and without Intellectual Disability
According to cognitive therapy one reason to blame themselves is that they are programmed to do so because of negative and distorted cognition. The maladaptive impact of excessive parental self blame and guilt and self b...
Automatic Detection and Counting of Vehicles Based on Image Processing
Abstract—When a driver enters a certain parking area, the driver takes a long time to find an available parking space. Design and implementation of a system for image based automatic detection and counting of vehicles ha...
A Secure Approach for Privacy-Preserving in Information Brokering System using Query Forwarding
There is an increasing need for information sharing via on-demand access in different organizations. Information Brokering Systems (IBSs) have been introduced to connect large-scale lightly-associated data sources. This...