ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. In this paper I am going to design a new algorithm that enhance the security of Simple Columnar Transposition Cipher using existing technique of rail fence and Caesar cipher.
Authors and Affiliations
Jawad Ahmad Dar
Paramount role of sequencing in Ubiquitous forms of Nucleotide
Protein microarrays allow biologist to measure the characteristics of amino acid sequence on a small chip. It generates voluminous of data and new intelligent methods are needed to analyze them. Sequence alignment is cha...
PERFORMANCE EVALUATION ISSUES OF QUERY PROCESSING THROUGH CLIENT SERVER ARCHITECTURE
The development of distributed systems has been affected by the need to accommodate an increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is important technology and an alternative...
Various Aspects of Minutia As a Fingerprint Feature
Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerpr...
Brain Cancer Classification Using GLCM Based Feature Extraction in Artificial Neural Network
Brain tumor is one of the major reasons of death among people. It is indication that the chances of survival can be greater than before if the tumor is detected correctly at its early stage. This paper classifies the typ...
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...