Academic literature on the topic 'Transposition cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transposition cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Transposition cipher"

1

Garg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (June 2017): 22–25. http://dx.doi.org/10.25046/aj020504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (July 20, 2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.

Full text
Abstract:
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be no longer safe. Therefore, a security is needed that can make data safe from groups that are not concerned. Caesar Cipher Algorithm, which is the position of the original letter location changed through the alphabet. Transposition algorithm, which uses character permutations. Caesar Cipher and Transposition can secure data and restore data without changing the original form (plaintext).Keywords - Data Theft, Security, Caesar Chiper, Cipher Transposition Abstrack - Adanya pencurian data dan penyalahgunaan data oleh kelompok yang tidak bersangkutan menyebabkan data tidak terjaga lagi. Oleh karena itu, dibutuhkan suatu keamanan yang bisa membuat data aman dari kelompok yang tidak bersangkutan. Algoritma Caesar Cipher, yaitu posisi letak huruf asal diubah melalui alfabet. Algoritma Transposisi, yaitu menggunakan permutasi karakter. Caesar Cipher dan Transposisi dapat mengamankan data dan mengembalikan data tanpa merubah bentuk dari aslinya (plainteks).Kata Kunci - Pencurian Data, Keamanan, Caesar Chiper, Trasposisi Chiper
APA, Harvard, Vancouver, ISO, and other styles
4

Alkathiry, Omar, and Ahmad Al-Mogren. "A Powerful Genetic Algorithm to Crack a Transposition Cipher." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 395–99. http://dx.doi.org/10.7763/ijfcc.2014.v3.335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (December 27, 2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.

Full text
Abstract:
Pada penelitian ini, digunakan algoritma columnar transposition sebagai metode transposisi dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang sebagai metode substitusi. Penyandian pesan menggunakan metode super enkripsi dengan algoritma columnar transposition dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang menghasilkan pesan akhir yang tidak mengubah, menambah maupun mengurangi pesan awal, sehingga dapat di implementasikan pada pesan dengan baik. Penyandian ini melipat gandakan keamanan suatu pesan, dimana keamanan pertama terletak pada enkripsi pesan dengan columnar transposition dan keamanan yang kedua terletak pada algoritma hill cipher yang telah dimodifikasi, sehingga membuat pesan akan semakin sulit untuk dipecahkan. Hasil dari penelitian ini dapat dijadikan sebagai tambahan pustaka mengenai kriptografi serta solusi bagi pihak yang menggunakan teknologi informasi dan komunikasi untuk dapat melakukan pengiriman pesan dengan aman.
APA, Harvard, Vancouver, ISO, and other styles
6

Ritter, Terry. "TRANSPOSITION CIPHER WITH PSEUDO-RANDOM SHUFFLING: THE DYNAMIC TRANSPOSITION COMBINER." Cryptologia 15, no. 1 (January 1991): 1–17. http://dx.doi.org/10.1080/0161-119191865731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lokman, Syiham Mohd, Chuah Chai Wen, Nurul Hidayah Binti Ab Rahman, and Isredza Rahmi Binti A. Hamid. "A Study of Caesar Cipher and Transposition Cipher in Jawi Messages." Advanced Science Letters 24, no. 3 (March 1, 2018): 1651–55. http://dx.doi.org/10.1166/asl.2018.11130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ineke Pekereng, Magdalena A., and Alz Danny Wowor. "Square transposition: an approach to the transposition process in block cipher." Bulletin of Electrical Engineering and Informatics 10, no. 6 (December 1, 2021): 3385–92. http://dx.doi.org/10.11591/eei.v10i6.3129.

Full text
Abstract:
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
APA, Harvard, Vancouver, ISO, and other styles
9

Syarif, Akhmad. "Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA." Jurnal Teknologi Informasi 4, no. 2 (December 10, 2020): 234–40. http://dx.doi.org/10.36294/jurti.v4i2.1350.

Full text
Abstract:
Abstract - Cryptography is the art of securing and keeping text or message from other people except those who receive it. Caesar Cipher algorithm is a classic algorithm that is vulnerable to hacker attacks by the brute force method. Caesar Cipher with 7 methods, the first is a transposition, the second is a permutation, the third is binary converting, the fourth is logistic gate calculation, the sixth is converting ASCII and the seventh is converting Hexa. With seven combinations of these methods, it can improve Caesar’s algorithm Cipher from hacker attacks and add variations to the modification of Caesar Cipher in classical encryption. Making ciphertext very complex and to overcome so many possibilities that must be tried.Keywords - Caesar Cipher, Modification, Convert, Transposition. Abstrak - Kriptografi adalah seni dalam mengamankan dan merahasiakan suatu teks atau pesan dari orang lain kecuali yang menerima. Algoritma Caesar Cipher adalah algoritma klasik yang rentan akan serangan hacker dengan metode brute force. Pada penelitian ini dilakukan memodifikasi algoritma Caesar Cipher dengan 7 metode yaitu pertama adalah tranposisi, ke-dua permutasi, ke-tiga convert biner, ke-empat perhitungan gerbang logika, ke-enam convert ASCII dan ke-tujuh convert hexa. Dengan tujuh kombinasi metode ini harapan bisa memperkuat algoritma Caesar Cipher dari serangan hacker dan menambah variasi modifikasi dari Caesar Cipher dalam enkripsi klasik. Menjadikan ciphertext sangat komplek dan untuk mengatasinya begitu banyak kemungkinan yang harus dicoba. Kata Kunci - Caesar Cipher, Modifikasi, Mengubah, Transposisi.
APA, Harvard, Vancouver, ISO, and other styles
10

Sokouti, Massoud. "An approach in improving transposition cipher system." Indian Journal of Science and Technology 2, no. 8 (August 20, 2009): 9–15. http://dx.doi.org/10.17485/ijst/2009/v2i8.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Transposition cipher"

1

Clark, Andrew J. "Optimisation heuristics for cryptology." Thesis, Queensland University of Technology, 1998. https://eprints.qut.edu.au/15777/1/Andrew_Clark_Thesis.pdf.

Full text
Abstract:
The aim of the research presented in this thesis is to investigate the use of various optimisation heuristics in the fields of automated cryptanalysis and automated cryptographic function generation. These techniques were found to provide a successful method of automated cryptanalysis of a variety of the classical ciphers. Also, they were found to enhance existing fast correlation attacks on certain stream ciphers. A previously proposed attack of the knapsack cipher is shown to be flawed due to the absence of a suitable solution evaluation mechanism. Finally, a new approach for finding highly nonlinear Boolean functions is introduced.
APA, Harvard, Vancouver, ISO, and other styles
2

Clark, Andrew J. "Optimisation Heuristics for Cryptology." Queensland University of Technology, 1998. http://eprints.qut.edu.au/15777/.

Full text
Abstract:
The aim of the research presented in this thesis is to investigate the use of various optimisation heuristics in the fields of automated cryptanalysis and automated cryptographic function generation. These techniques were found to provide a successful method of automated cryptanalysis of a variety of the classical ciphers. Also, they were found to enhance existing fast correlation attacks on certain stream ciphers. A previously proposed attack of the knapsack cipher is shown to be flawed due to the absence of a suitable solution evaluation mechanism. Finally, a new approach for finding highly nonlinear Boolean functions is introduced.
APA, Harvard, Vancouver, ISO, and other styles
3

Fojtová, Lucie. "Softwarová podpora výuky klasické kryptoanalýzy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218739.

Full text
Abstract:
Number of today's modern cipher systems are based on the classical symmetric cipher systems, such as the transposition principle in the DES cipher. Successful analysis and deciphering of these ciphers is therefore underlined by solid knowledge of the elementary cryptanalysis methods. This implies the importance of classical cryptanalysis education -- for better a understanding of the field, using visual means is of utmost importance. The aim of the thesis is to summarize selected cipher methods of the classical cryptanalysis, namely the mono-- and polyalphabetical substitution and transposition route cipher. Along with the theoretical part, ciphering/deciphering software is introduced to be used for educational purposes, particularly a website and a standalone application providing tools for ciphering, analysis and code breaking of the classical cipher based code.
APA, Harvard, Vancouver, ISO, and other styles
4

Bayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.

Full text
Abstract:
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective is to make clear the essence of the algorithms’ behavior. When describing some more difficult algorithms the block scheme is added. At the end of each algorithm’s description the example of practical usage is written. The chapter no. five discusses the hardware implementation. Hardware and software implementation is compared from the practical point of view. Several design instruments are described and different hardware design programming languages with their progress, advantages and disadvantages are mentioned. Chapter six discourses the hardware implementation design of chosen ciphers. Concretely the design of stream cipher with pseudo-random sequence generator is designed in VHDL and also in Matlab. As the second design was chosen the block cipher GOST, which was designed in VHDL too. Both designs were tested and verified and then the results were summarized.
APA, Harvard, Vancouver, ISO, and other styles
5

Vozák, Petr. "Knihovna algoritmů pro šifrování textu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237044.

Full text
Abstract:
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text ciphering. The presented paper describes at first basic theoretical background of cryptology and basic distribution of cryptographic algorithms. Then it describes a brief history of encryption from beginning to present. Theoretical description of ciphering methods and its implementation details are discussed here. All basic types of conventional encryption algorithms and also some modern ciphering methods are included; these are substitution, transposition, steganographic or combinations encryption systems. The result of this thesis is the library of algorithms for text ciphering in Java with a sample application, which demonstrates its funcionality.
APA, Harvard, Vancouver, ISO, and other styles
6

MILICHOVSKÁ, Eva. "Historie šifrovacích metod a jejich aplikace." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-385158.

Full text
Abstract:
I deal with historical encryption procedures and with their application in teaching in my diploma thesis. I present a brief list of some encryption methods in following chapters which were used from antiquity to the mid-20th century. There are prepared specific worksheets for encryption and decryption in this thesis. For several ciphers, the required tools are included in this work, too.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Transposition cipher"

1

Courville, Joseph B. Manual for cryptanalysis of the columnar double transposition cipher: A study of cryptanalysis. South Gate, Calif., U.S.A. (10240 Virginia Ave, South Gate 90280): J.B. Courville, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

General Solution for the Double Transposition Cipher (Cryptographic Series C-84). Aegean Park Pr, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barker, Wayne G. Cryptanalysis of the Double Transposition Cipher: Includes Problems and Computer Programs (Cryptographic Series , No 69). Aegean Park Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

F, Friedman William. Military Cryptanalysis: Transposition and Fractionating Systems (Cryptographic Series , No 61, Part 4). Aegean Park Pr, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

F, Friedman William. Military Cryptanalysis, Part IV: Transposition and Fractionating Systems (Cryptographic Series, No 61). Aegean Park Pr, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Transposition cipher"

1

Weik, Martin H. "transposition cipher." In Computer Science and Communications Dictionary, 1832. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boryczka, Urszula, and Kamil Dworak. "Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms." In Computational Collective Intelligence. Technologies and Applications, 623–32. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11289-3_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shukla, Apratim, Mayank K. Tolani, Dipan Polley, Abhishek Thazhethe Kalathil, and N. Subhashini. "Enyo: A Multistage Partition and Transposition Based Cipher." In Communication and Intelligent Systems, 395–407. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Song, Jun, Fan Yang, Maocai Wang, and Huanguo Zhang. "Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm." In Advances in Computation and Intelligence, 795–802. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92137-0_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ritu, Niram, Ekta Narwal, and Sumeet Gill. "A Novel Cipher Technique Using Substitution and Transposition Methods." In Rising Threats in Expert Applications and Solutions, 123–29. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1122-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mishra, Girish, and Sarvjeet Kaur. "Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing." In Advances in Intelligent Systems and Computing, 293–302. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2220-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhowmik, Sandeep, and Sriyankar Acharyya. "Application of GA in Key Generation for Image Transposition Cipher Algorithm." In Communications in Computer and Information Science, 342–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jain, Ashish, Prakash C. Sharma, Santosh K. Vishwakarma, Nirmal K. Gupta, and Vaibhav C. Gandhi. "Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing, 467–78. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jain, Ashish, Nirmal K. Gupta, Santosh K. Vishwakarma, and Prakash C. Sharma. "Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing, 321–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Salomon, David. "Transposition Ciphers." In Data Privacy and Security, 39–57. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Transposition cipher"

1

Djamalilleil, As'ad, Muslim Muslim, Yulita Salim, Erick Irawadi Alwi, Huzain Azis, and Herman. "Modified Transposition Cipher Algorithm for Images Encryption." In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pal, Jayanta Kumar, J. K. Mandal, and Somsubhra Gupta. "Composite Transposition Substitution Chaining Based Cipher Technique." In 2008 16th International Conference on Advanced Computing and Communications. IEEE, 2008. http://dx.doi.org/10.1109/adcom.2008.4760485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fernando, Maricel Grace Z., Ariel M. Sison, and Ruji P. Medina. "Securing Private Key using New Transposition Cipher Technique." In 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2019. http://dx.doi.org/10.1109/ecice47484.2019.8942798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wulandari, Gia S., Wahyu Rismawan, and Siti Saadah. "Differential evolution for the cryptanalysis of transposition cipher." In 2015 3rd International Conference on Information and Communication Technology (ICoICT ). IEEE, 2015. http://dx.doi.org/10.1109/icoict.2015.7231394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tiozon, Mark Julius P., Jessie R. Paragas, and Neil M. Pascual. "Implementation of Traditional Transposition Cipher with Salting Principle." In 2021 3rd International Conference on Research and Academic Community Services (ICRACOS). IEEE, 2021. http://dx.doi.org/10.1109/icracos53680.2021.9702062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krishna, B. Hari, I. Raja Sekhar Reddy, S. Kiran, and R. Pradeep Kumar Reddy. "Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers." In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016. http://dx.doi.org/10.1109/wispnet.2016.7566299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Putrie, Vike Maylana, Christy Atika Sari, De Rosal Ignatius Moses Setiadi, and Eko Hari Rachmawanto. "Super Encryption using Transposition-Hill Cipher for Digital Color Image." In 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2018. http://dx.doi.org/10.1109/isriti.2018.8864361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jain, Mamta, and Saroj Kumar Lenka. "Secret data transmission using vital image steganography over transposition cipher." In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Benlcouiri, Younes, Moulay Chrif Ismaili, and Abdelmalek Azizi. "Substitution & transposition on images by using advanced affine cipher." In 2014 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2014. http://dx.doi.org/10.1109/icmcs.2014.6911335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Siregar, Saidi, F. Fadlina, and Surya Nasution. "Enhancing Data Security of Columnar Transposition Cipher by Fibonacci Codes Algorithm." In Proceedings of the Third Workshop on Multidisciplinary and Its Applications, WMA-3 2019, 11-14 December 2019, Medan, Indonesia. EAI, 2020. http://dx.doi.org/10.4108/eai.11-12-2019.2290839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography