International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 120 | Views: 266 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Rating: 6.5 / 10


A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar [5] | Amit Verma [8]


Abstract: Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. In this 2 paper I am going to compare The performance analysis of already designed new algorithm according to 15 Parameters with simple columnar transposition cipher.


Keywords: Cryptography, Cipher text, Substitution, Transposition, Caesar Cipher, Columnar Transposition Cipher, cryptanalysis, key


Edition: Volume 4 Issue 3, March 2015,


Pages: 1083 - 1088



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top