Zigzag Ciphers: A Novel Transposition Method
نویسنده
چکیده
The requirement of information security has undergone changes in the last several decades. Network security measures are needed to protect data during their transmission. Cryptography is probably the most important aspect of communications security and is becoming increasingly important as a basic building block for computer security. This paper sets out to develop a hybrid way of encryption of plain text by combining rail fence cipher and columnar transposition cipher. This approach provides more security to information when compared with simple columnar transposition.
منابع مشابه
Decrypting classical cipher text using Markov chain Monte Carlo
We investigate the use of Markov Chain Monte Carlo (MCMC) methods to attack classical ciphers. MCMC has previously been used to break simple substitution ciphers. Here, we extend this approach to transposition ciphers and to substitution-plus-transposition ciphers. Our algorithms run quickly and perform fairly well even for key lengths as high as 40.
متن کاملThe Code d'Azur and Phoenix Ciphers- A Note on a New Class of Block Ciphers Based on Matrix Transposition
In this note I describe the use of transposition of binary matrices to create maximal diffusion and confusion in a block cipher. © 2008 University of Newcastle upon Tyne. Printed and published by the University of Newcastle upon Tyne, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details RYAN, P. Y. A.. The Code d'Azur and Phoenix Cip...
متن کاملCryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm
In Today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is Cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to the cryptanalysis of transposition ciphers using an improv...
متن کاملCryptanalysis of Substitution Ciphers Using Scatter Search
This paper presents an approach for the automated cryptanalysis of substitution ciphers based on a recent evolutionary metaheuristic called Scatter Search. It is a population-based metaheuristic founded on a formulation proposed two decades ago by Fred Glover. It uses linear combinations on a population subsets to create new solutions while other evolutionary approaches like genetic algorithms ...
متن کاملClassical Ciphers and Cryptanalysis
Cryptography is the study of transmitting secret messages securely from one party to another. To accomplish this task, the original text, called plaintext, is “translated” into an encrypted version, called ciphertext, which is sent to the intended recipient. The recipient decrypts the text to obtain the original message. Cryptanalysis is process of analyzing the “hidden” message to learn inform...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013