Analysis of Modified Substitution Encryption Techniques

نویسندگان

  • Gulshan Soni
  • Umesh Gupta
  • Nikhil Singh
چکیده

-In this paper we present some new approach for security enhancement of well known classical substitution cipher (Playfair and Hill cipher). Some drawback inherent the 5x5 Playfair cipher which adversely affect the security of this cipher and also Hill Cipher that succumbs to the known-plaintext attack .It is clear from above line due to some serious security reasons we cannot use these well known encryption techniques in practical life . This paper aim is to focus on modification that can enhance the security level of these classical encryption techniques so these can resist for different cryptanalysis attacks. Keyword-classical substitution cipher, Transposition cipher, Playfair cipher, Hill cipher.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication

Caesar cipher is an ancient, elementary method of encrypting plain text message into cipher text protecting it from adversaries. However, with the advent of powerful computers, there is a need for increasing the complexity of such techniques. This paper contributes in the area of classical cryptography by providing a modified and expanded version for Caesar cipher using knowledge of mathematics...

متن کامل

A Secure Symmetric Image Encryption Based on Bit-wise Operation

This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides addition...

متن کامل

Design and Analysis of a Novel Digital Image Encryption Scheme

In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken...

متن کامل

A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture

Recently, a great number of chaos-based image encryption algorithms have been proposed. But most of them are either deficient in security or complicated. In this paper, we propose a permutation-substitution image encryption scheme based on generalized Arnold map. Only one round of permutation and one round of substitution are performed to get the desirable results. The generalized chaotic Arnol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013