The most fitting issue in the technological era is to provide security as most of the communications are done through the internet. Various classical encryption techniques such as Caesar cipher, Hill cipher, One-time pad, Rail- Fence techniques, and Columnar transpositions ciphers were designed to secure the data used in communication. These techniques are vulnerable to various active and passive attacks. To enhance security, we propose a new algorithm based on substitution and transposition techniques in which some bits are deleted and permuted in another place. The structure of ciphertext obtained through this algorithm is complex and thus, provides a high level of security. It can be used for the text of any length.
CITATION STYLE
Ritu, Niram, Narwal, E., & Gill, S. (2022). A Novel Cipher Technique Using Substitution and Transposition Methods. In Lecture Notes in Networks and Systems (Vol. 434, pp. 123–129). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-1122-4_14
Mendeley helps you to discover research relevant for your work.