ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. In this paper I am going to design a new algorithm that enhance the security of Simple Columnar Transposition Cipher using existing technique of rail fence and Caesar cipher.
Authors and Affiliations
Jawad Ahmad Dar
Image Encryption and Decryption Using Selective Block Encryption Technique
In the recent world, the need of information security has became a necessity with the progress in data exchange and communication by electronic system. Because of the growth of multimedia application, security becomes an...
ADAPTIVE LANDMARK IDENTIFICATION BASED ON PERTINENT REGION EXTRACTION
The main purpose of this paper is about the relative merits of automated feature detection protocols on cephalometric- related digital radiology images. While the domain dependent techniques such as handcrafted masks are...
Using Queuing theory the performance measures of cloud with infinite servers
Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...
Forming Packages of the Services as a Way for Keeping Existing Users and for Increasing ARPU
One company can sells two or more separate products in a package for a single price. It is called „bundling“. In this paper is described bundling in telecommunications area, that is, forming packages of the services, lik...
An Effective Approach for Web Document Classification using FP-Growth and Naïve Bayes Techniques
Exponential growth of the web increased the importance of web documents classification and data mining. To get the exact information, in the form of knowing what classes a web document belongs to, is expensive. Automatic...