A Novel Secure Transposition Cipher Technique using Arbitrary Zigzag Patterns

نویسندگان

چکیده

Symmetric cipher cryptography is an efficient technique for encrypting bits and letters to maintain secure communication data confidentiality. Compared asymmetric cryptography, symmetric has the speed advantage required various real-time applications. Yet, with distribution of micro-devices wider utilization Internet Things (IoT) Wireless Sensor Network (WSN), lightweight algorithms are operate on such devices. This paper proposes a based scheme consisting multiple zigzag patterns, secret key variable length, block size. The proposed system uses transposition principles generate encryption patterns particular initial point over grid. total number cells in grid its dimension variable. Various can be created same grid, leading different outcomes grids. For n cells, n! * (n-1!) generated. information encapsulated private key. Thus, huge possible variation size, which kept hidden, security technique. Moreover, padding used; two paddings lengths lead completely output even pattern inputs, improves system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Zigzag Ciphers: A Novel Transposition Method

The requirement of information security has undergone changes in the last several decades. Network security measures are needed to protect data during their transmission. Cryptography is probably the most important aspect of communications security and is becoming increasingly important as a basic building block for computer security. This paper sets out to develop a hybrid way of encryption of...

متن کامل

Using Genetic Algorithms to Break a Simple Transposition Cipher

Genetic Algorithms are search algorithm. They use a metaphor where an optimization problem takes the place of an environment and feasible solutions are considered as individuals living in that environment. This paper focuses on using GAs to cryptanalyse a transposition cipher. A certain method is used to find the possible key length. It is shown that such algorithm could be used to discover the...

متن کامل

Perfectly Secure Cipher System

We present a perfectly secure cipher system based on the concept of fake bits which has never been used in either classical or quantum cryptography.

متن کامل

A Columnar Transposition cipher in a contemporary setting

A simple cryptographic method, a type of columnar transposition cipher, is described which may be used in series with other methods to provide practical hybrid encryption. The method involves the use of a deterministic Cryptographic Pseudo Random Number Generator (CPRNG) to specify an unbiased random transposition of blocks of plain-text or intermediate text. The decryption process involves app...

متن کامل

A Secure Self-synchronized Stream Cipher

We follow two main objectives in this article. On the one hand, we introduce a security model called LORBACPA for self-synchronized stream ciphers which is stronger than the blockwise LOR-IND-CPA, where we show that standard constructions as delayed CBC or similar existing self-synchronized modes of operation are not secure in this stronger model. Then, on the other hand, following contribution...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2022

ISSN: ['2158-107X', '2156-5570']

DOI: https://doi.org/10.14569/ijacsa.2022.0130133