Enhancing The Security of Caesar Cipher Using Double Substitution Method
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 7
Abstract
Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher is an example of substitution technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A single columnar transposition followed by a double substitution is applied on a Caesar cipher in order to make it a stronger and a more secure cipher.
Authors and Affiliations
Shahid Bashir Dar
Modern Steganographic technique: A survey
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The...
An Approach of Zero Correlation Linear Cryptanalysis
Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which ar...
SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW
Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typicall...
Privacy preservation for Neural Network Training
Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the...