Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Implementation of Cryptography Technique using Columnar Transposition

Print
PDF
IJCA Special Issue on Recent Trends in Information Security
© 2014 by IJCA Journal
RTINFOSEC
Year of Publication: 2014
Authors:
Malay B. Pramanik

Malay B Pramanik. Article: Implementation of Cryptography Technique using Columnar Transposition. IJCA Special Issue on Recent Trends in Information Security RTINFOSEC:19-23, February 2014. Full text available. BibTeX

@article{key:article,
	author = {Malay B. Pramanik},
	title = {Article: Implementation of Cryptography Technique using Columnar Transposition},
	journal = {IJCA Special Issue on Recent Trends in Information Security},
	year = {2014},
	volume = {RTINFOSEC},
	pages = {19-23},
	month = {February},
	note = {Full text available}
}

Abstract

Cryptography is an art and science of converting original message into non-readable form. There are two techniques for converting data into non-readable form: 1) Transposition technique 2) Substitution technique. Transposition ciphers use the letters of the plaintext message, but they permute the order of the letters. Columnar Transposition involves writing the plaintext out in rows, and then reading the ciphertext off in columns. In this Cryptography there is use of three aspects of Columnar Transposition; Single Transposition using ROT-13 applicable to message of the Algorithm, Double Transposition using Caesar Cipher in second round of an Algorithm and Triple Transposition were it combine both the concept and use reverse of the message in second round of the Algorithm.

References

  • R. I Salawu & S. O Adetona, "The Art and Science of Secured Communication", Institute of Security of Nigeria, Nigeria 2007
  • James Irvine & David Harie, "Data Communications & Network: An Engineering Approach", John Wiley & Sons ltd. , 2002
  • Brian J. Winkel, Cipher A. Deavours, David Kahn, and Louis Kruh "The German Enigma Cipher Machine: Beginnings, Success, and Ultimate Failure", Artech House, August 2005.
  • Tyma Paul, "Software Development Secure", Start Newsletter, Feb 2003.
  • Madsen Wayne, "An International Survey of Encryption Policy", 1998
  • S. O Adetona, "Messages Secrecy in Electioneering environment", proceedings of Institute of Security, Nigeria,2009
  • Stamper, David, "Essential of Data Communication", Saratoga Group
  • Eric Maiwald, "Network Security a Beginner's Guide", Second Edition, McGraw Hill, Osborne, 2003.
  • Ed Tittel, "Theory and Problems of Computer Networking", McGraw Hill, Osborne, 2002