IUP Publications Online
Home About IUP Magazines Journals Books Archives
     
Recommend    |    Subscriber Services    |    Feedback    |     Subscribe Online
 
The IUP Journal of Computer Sciences :
Transposition Technique for Cryptography
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

Cryptography is the art and science of making secure communication systems. There are many techniques to encrypt plaintext and convert it to ciphertext. We developed a few transposition techniques earlier (Bansal 2011). In this paper, we have made an attempt to enhance those techniques and make them more advanced. One of the most important things is that all the old techniques such as rail fence and simple columns are key-based and the key is in any sequence or in any order to encrypt the plaintext. The best way is that the key depends either on one or two digits which involve with the plaintext. The key can be based on the number of pages, paragraphs or lines so that the sender or receiver can understand and easily decrypt the ciphertext into plaintext. Mainly two techniques are used in classic cryptography: Substitution and Transposition (Menezes et al., 1996). Transposition is simpler and more powerful technique than substitution because it not only substitutes the text, but also permutates the text. This paper basically presents some new transposition techniques that can be used in cryptography (N/W Security). In this paper, we have developed the old transposition algorithm which includes the key based on plaintext.

 
 
 

In cryptographic terms, the message in its original form is called plaintext and the encrypted form is called the ciphertext. The transmitter in a secure system encrypts the plaintext to hide its meaning. This reversible mathematical process produces an encrypted output called ciphertext. Cipher is an algorithm used to encrypt the message. Cryptanalysis is the science of breaking ciphers, and cryptanalysts try to defeat the security of cryptographic systems.

In this paper, the encryption algorithm is a block cipher which operates on blocks of data. Hence, the block size varies from one message to another, sent by the same user, but with different passwords.

In Satish (2011), transposition technique algorithm like reverse transposition cipher and odd-even techniques were used. These are simple and do not use any key. Usually, the algorithm used for encryption and decryption processes is well known. However, it is the key used for encryption and decryption that makes the process of cryptography more secure.

The key exchange is a major problem between the sender and the receiver because the same key is used for encryption and decryption (Stallings, 1999). The best way is to embed the key in the message or include it in the message or hide it. Since the length of the key is very short (either 1 or 2 digits which contain different meaning for algorithm), where the key is based on message like number of words or line for short message and number of paragraph or pages for long message, the key can be a sum of number of lines and number of pages which make the key more advanced.

 
 
 

Computer Sciences Journal, Business Intelligence, Enterprise Systems, Enterprise Resource Planning, Customer Relationship Management, CRM, Business Operations Management, Business Process Mining, Finite State Machine, Transactional Information System, Genetic Algorithms, Decision Making Process, Data Mining Tools, Online Analysis Processing, OLAP, Artificial Intelligence.