ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.

Abstract

Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. In this paper I am going to design a new algorithm that enhance the security of Simple Columnar Transposition Cipher using existing technique of rail fence and Caesar cipher.

Authors and Affiliations

Jawad Ahmad Dar

Keywords

Related Articles

Web Content Filtering Techniques: A Survey

For many, accessing the Internet is a mixed blessing; in worst case, it can create serious problems. Web Content Filtering is a firewall to block certain sites from being accessed. Content filtering and the products that...

“MOBILE MALWARE DETECTION TECHNIQUES”

The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet acc...

Role of CMS Services in fulfilling the basic requirement of an ideal E-Learning website

During the past decades, researchers, schools, and governments around the world have supported enhancing student learning by using digital tools, i.e. the e-learning. E-learning is essentially the computer and network en...

Moodle Based LMS and Open Source Software (OSS) Efficiency in e-Learning

This paper describes the designing and real time implementation of web based Learning Management Systems (LMSs) based on Moodle open source. We are giving attention to Moodle based LMS system implementation in our colleg...

A SURVEY OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS (MANET)

Mobile ad hoc networks is a collection of mobile nodes that dynamically change the topology of MANETs ,that allows nodes to join and leave the network at any point of time. In MANET mobile nodes are communicate each othe...

Download PDF file
  • EP ID EP126948
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Jawad Ahmad Dar (2014). ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.. International Journal of Computer Science & Engineering Technology, 5(11), 1054-1061. https://europub.co.uk/articles/-A-126948