ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. In this paper I am going to design a new algorithm that enhance the security of Simple Columnar Transposition Cipher using existing technique of rail fence and Caesar cipher.
Authors and Affiliations
Jawad Ahmad Dar
Cloud Computing and its challenges: A Review
Cloud computing is today’s one of the most recent topics due to its cost-efficiency and flexibility and ubiquitous computing. This paper gives a review our early of Cloud computing, its major characteristics and some iss...
An Overview on Advance Metering System
The term "Smart meter" typically refers to an electrical meter, but the term is also starting to be applied to the measurement of natural gas and water consumption. Similar meters, usually referred to as interval or time...
Smartphone Monitoring System
This Monitoring System is a software that allows supervisors to monitor their employee's office cell phone. All incoming call details, outgoing call details, text details, emails and multimedia messages can be seen and i...
Optimistic Rough Sets Attribute Reduction using Dynamic Programming
Nowadays, and with the current progress in technologies and business sales, databases with large amount of data exist especially in Retail Companies. The main objective of this study is to reduce the complexity of the cl...
Survey of Dimensionality Reduction and Mining Techniques on Scientific Data
Dimensionality reduction techniques on scientific data are currently a focused approach to understand the underlying scientific knowledge in a dataset resulted from scientific experiments and simulations. The sole purpos...