Analysis of Modified Substitution Encryption Techniques
نویسندگان
چکیده
-In this paper we present some new approach for security enhancement of well known classical substitution cipher (Playfair and Hill cipher). Some drawback inherent the 5x5 Playfair cipher which adversely affect the security of this cipher and also Hill Cipher that succumbs to the known-plaintext attack .It is clear from above line due to some serious security reasons we cannot use these well known encryption techniques in practical life . This paper aim is to focus on modification that can enhance the security level of these classical encryption techniques so these can resist for different cryptanalysis attacks. Keyword-classical substitution cipher, Transposition cipher, Playfair cipher, Hill cipher.
منابع مشابه
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption
In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...
متن کاملEnhancing the security of caesar cipher substitution method using a randomized approach for more secure communication
Caesar cipher is an ancient, elementary method of encrypting plain text message into cipher text protecting it from adversaries. However, with the advent of powerful computers, there is a need for increasing the complexity of such techniques. This paper contributes in the area of classical cryptography by providing a modified and expanded version for Caesar cipher using knowledge of mathematics...
متن کاملA Secure Symmetric Image Encryption Based on Bit-wise Operation
This paper shows a symmetric image encryption based on bit-wise operation (XORing and Shifting). The basic idea is block ciphering (size of each block is 4 bytes) technique to cipher the secret bytes, after that ciphered bytes are again shuffled among N positions (N is the size of secret file). The scheme is combination of substitution as well as transposition techniques which provides addition...
متن کاملDesign and Analysis of a Novel Digital Image Encryption Scheme
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken...
متن کاملA Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture
Recently, a great number of chaos-based image encryption algorithms have been proposed. But most of them are either deficient in security or complicated. In this paper, we propose a permutation-substitution image encryption scheme based on generalized Arnold map. Only one round of permutation and one round of substitution are performed to get the desirable results. The generalized chaotic Arnol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013