Zigzag Ciphers: A Novel Transposition Method

نویسنده

  • Mu. Annalakshmi
چکیده

The requirement of information security has undergone changes in the last several decades. Network security measures are needed to protect data during their transmission. Cryptography is probably the most important aspect of communications security and is becoming increasingly important as a basic building block for computer security. This paper sets out to develop a hybrid way of encryption of plain text by combining rail fence cipher and columnar transposition cipher. This approach provides more security to information when compared with simple columnar transposition.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decrypting classical cipher text using Markov chain Monte Carlo

We investigate the use of Markov Chain Monte Carlo (MCMC) methods to attack classical ciphers. MCMC has previously been used to break simple substitution ciphers. Here, we extend this approach to transposition ciphers and to substitution-plus-transposition ciphers. Our algorithms run quickly and perform fairly well even for key lengths as high as 40.

متن کامل

The Code d'Azur and Phoenix Ciphers- A Note on a New Class of Block Ciphers Based on Matrix Transposition

In this note I describe the use of transposition of binary matrices to create maximal diffusion and confusion in a block cipher. © 2008 University of Newcastle upon Tyne. Printed and published by the University of Newcastle upon Tyne, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details RYAN, P. Y. A.. The Code d'Azur and Phoenix Cip...

متن کامل

Cryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm

In Today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is Cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to the cryptanalysis of transposition ciphers using an improv...

متن کامل

Cryptanalysis of Substitution Ciphers Using Scatter Search

This paper presents an approach for the automated cryptanalysis of substitution ciphers based on a recent evolutionary metaheuristic called Scatter Search. It is a population-based metaheuristic founded on a formulation proposed two decades ago by Fred Glover. It uses linear combinations on a population subsets to create new solutions while other evolutionary approaches like genetic algorithms ...

متن کامل

Classical Ciphers and Cryptanalysis

Cryptography is the study of transmitting secret messages securely from one party to another. To accomplish this task, the original text, called plaintext, is “translated” into an encrypted version, called ciphertext, which is sent to the intended recipient. The recipient decrypts the text to obtain the original message. Cryptanalysis is process of analyzing the “hidden” message to learn inform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013