A Novel Cipher Technique Using Substitution and Transposition Methods

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The most fitting issue in the technological era is to provide security as most of the communications are done through the internet. Various classical encryption techniques such as Caesar cipher, Hill cipher, One-time pad, Rail- Fence techniques, and Columnar transpositions ciphers were designed to secure the data used in communication. These techniques are vulnerable to various active and passive attacks. To enhance security, we propose a new algorithm based on substitution and transposition techniques in which some bits are deleted and permuted in another place. The structure of ciphertext obtained through this algorithm is complex and thus, provides a high level of security. It can be used for the text of any length.

Cite

CITATION STYLE

APA

Ritu, Niram, Narwal, E., & Gill, S. (2022). A Novel Cipher Technique Using Substitution and Transposition Methods. In Lecture Notes in Networks and Systems (Vol. 434, pp. 123–129). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-1122-4_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free