ENHANCING THE DATA SECURITY OF SIMPLE COLUMNAR TRANSPOSITION CIPHER BY CAESAR CIPHER AND RAIL FENCE CIPHER TECHNIQUE.
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 11
Abstract
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique ,Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. In this paper I am going to design a new algorithm that enhance the security of Simple Columnar Transposition Cipher using existing technique of rail fence and Caesar cipher.
Authors and Affiliations
Jawad Ahmad Dar
Integrating Mutiview clusters with Tensor Methods
Integrating multiview cluster is an crucial issue in heterogeneous environment. Spectral clustering is used for integrating cluster in heterogeneous environment. In this paper, we used Principal Modularity Maximization b...
A Comparative Study of cloud and mCloud Computing
Cloud Computing is one of the latest technology. It makes many changes in industry. It is a platform which includes technology, resources and infrastructure. It is a concept of sharing resources to achieve economical ben...
Analysis of Fuzzy Fault Tree using Intuitionstic Fuzzy Numbers
In generally fuzzy seats are used to analyses the system reliability. In present paper we have presented a new approach to evaluate the reliability of fuzzy fault tree using Intuitionstic Fuzzy Numbers. In application of...
Improved Block Based Segmentation and Compression Techniques for Compound Images
Image compression is to minimize the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. The compound image compression normally based on three classification methods tha...
THE IMPLEMENTATION OF PROGRAMMABLE WIRELESS ROUTER USING JAVA
Nowadays available wireless routers do have extra levels of embedded security. Existing Wireless routers can be configured for invisible mode. So that wireless network cannot be scanned by outside wireless clients. If th...