Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++
Jawad Ahmad Dar [5] | Amit Verma [8]
Abstract: This paper is a step toward developing an encryption system which can encrypt any text message securely. An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures. the main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. In every important sector these networks are used to collect information or transfer them with a high level of security. For this reason here we require a strong encryption Technique. Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. Finally I have implemented this concept with the help of TURBO C++.
Keywords: Cryptography, Cipher text, Substitution, Transposition, Caesar Cipher, Columnar Transposition Cipher, cryptanalysis, key, C
Edition: Volume 4 Issue 4, April 2015,
Pages: 9 - 16
Similar Articles with Keyword 'Cryptography'
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya [12] | R. Sathya [8]