Academic literature on the topic 'Transposition cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transposition cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Transposition cipher"

1

G. M. Karpura Dheepan. "Advanced Nonlinear Analysis Technique in Modern Transposition Ciphers." Communications on Applied Nonlinear Analysis 31, no. 6s (2024): 653–69. http://dx.doi.org/10.52783/cana.v31.1250.

Full text
Abstract:
Particularly with modern transposition ciphers, the evolving field of cryptography requires advances in safe encryption methods. The key problem fixed is the absence of robust security against advanced cryptanalytic methods provided by traditional transposition ciphers. This work uses chaos theory to automate the production of substitution boxes (S-boxes), which are fundamental to transposition ciphers, so addressing this constraint. Strong nonlinearity and resistance to differential and linear cryptanalysis are produced by the proposed method by combining chaos-driven algorithms. The experime
APA, Harvard, Vancouver, ISO, and other styles
2

Ostia, Mary Grace, Alessa Crisostomo, David Jhozel Lucas, et al. "An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher." International Journal of Computing Sciences Research 8 (January 1, 2024): 3202–16. https://doi.org/10.25147/ijcsr.2017.001.1.214.

Full text
Abstract:
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption performance. Method –Proposedadjustmentsincludeexpandingthegridto14x14,usingtableshuffling instead of random character insertion, and strategically inserting random special characters in odd-length plaintexts. Results –The algorithm demonstrated improved encryption, producing more random ciphertext sequences and successfully recovering original characters during decryption. Conclusion –The developed algorithm outperforms the
APA, Harvard, Vancouver, ISO, and other styles
3

Yu, Zizhen. "Historical research on classification of Classical Cryptography." Theoretical and Natural Science 11, no. 1 (2023): 165–71. http://dx.doi.org/10.54254/2753-8818/11/20230403.

Full text
Abstract:
Cryptography is now being applied frequently in peoples daily lives. Their bank passcode, computer password, and digital signature all are applications of cryptography. Inside cryptography, Classical Cipher is a basic and important area as modern cryptography is developed from Classical Cryptography. By making a consummate system of Classical Cryptography, it increases peoples interest in exploring basic cryptography principles. This essay focuses mainly on the topic of classification of Classical Cipher. By reading related materials like books, journals, magazines and so on, the historical re
APA, Harvard, Vancouver, ISO, and other styles
4

Garg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (2017): 22–25. http://dx.doi.org/10.25046/aj020504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hassan, A., A. Garko, S. Sani, U. Abdullahi, and S. Sahalu. "Combined Techniques of Hill Cipher and Transposition Cipher." Trends Journal of Sciences Research 1, no. 1 (2023): 57–64. http://dx.doi.org/10.31586/jml.2023.822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.

Full text
Abstract:
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be no longer safe. Therefore, a security is needed that can make data safe from groups that are not concerned. Caesar Cipher Algorithm, which is the position of the original letter location changed through the alphabet. Transposition algorithm, which uses character permutations. Caesar Cipher and Transposition can secure data and restore data without changing the original form (plaintext).Keywords - Data Theft, Security, Caesar Chiper, Cipher Transposition Abstrack - Adanya pencurian data dan penya
APA, Harvard, Vancouver, ISO, and other styles
8

Agustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 5 (2023): 195–200. http://dx.doi.org/10.18860/jrmm.v2i5.21036.

Full text
Abstract:
The issue of message security or an information is very important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstudy, two
APA, Harvard, Vancouver, ISO, and other styles
9

Agustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 4 (2023): 132–37. http://dx.doi.org/10.18860/jrmm.v2i4.14470.

Full text
Abstract:
The issue of message security or an information is particularly important. A science that studies aboutsecuring the confidentiality of messages using passwords is called cryptography. To enhance security, twoalgorithmsarecombinedtosecuremessages.Superencryptionisaconceptthatusesacombinationoftwoormoresubstitutionandpermutation(transposition)cryptographytechniquestoobtainanalgorithmthatis more difficult to crack. The first thing to do is to encrypt the message using a substitution technique(Cipher Substitution), then re-encrypt it using a permutation technique (Cipher Transposition). In thisstu
APA, Harvard, Vancouver, ISO, and other styles
10

Wahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.

Full text
Abstract:
Pada penelitian ini, digunakan algoritma columnar transposition sebagai metode transposisi dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang sebagai metode substitusi. Penyandian pesan menggunakan metode super enkripsi dengan algoritma columnar transposition dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang menghasilkan pesan akhir yang tidak mengubah, menambah maupun mengurangi pesan awal, sehingga dapat di implementasikan pada pesan dengan baik. Penyandian ini melipat gandakan keamanan suatu pesan, dimana keamanan pertama terletak p
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Transposition cipher"

1

Clark, Andrew J. "Optimisation heuristics for cryptology." Thesis, Queensland University of Technology, 1998. https://eprints.qut.edu.au/15777/1/Andrew_Clark_Thesis.pdf.

Full text
Abstract:
The aim of the research presented in this thesis is to investigate the use of various optimisation heuristics in the fields of automated cryptanalysis and automated cryptographic function generation. These techniques were found to provide a successful method of automated cryptanalysis of a variety of the classical ciphers. Also, they were found to enhance existing fast correlation attacks on certain stream ciphers. A previously proposed attack of the knapsack cipher is shown to be flawed due to the absence of a suitable solution evaluation mechanism. Finally, a new approach for finding highly
APA, Harvard, Vancouver, ISO, and other styles
2

Clark, Andrew J. "Optimisation Heuristics for Cryptology." Queensland University of Technology, 1998. http://eprints.qut.edu.au/15777/.

Full text
Abstract:
The aim of the research presented in this thesis is to investigate the use of various optimisation heuristics in the fields of automated cryptanalysis and automated cryptographic function generation. These techniques were found to provide a successful method of automated cryptanalysis of a variety of the classical ciphers. Also, they were found to enhance existing fast correlation attacks on certain stream ciphers. A previously proposed attack of the knapsack cipher is shown to be flawed due to the absence of a suitable solution evaluation mechanism. Finally, a new approach for finding highly
APA, Harvard, Vancouver, ISO, and other styles
3

Fojtová, Lucie. "Softwarová podpora výuky klasické kryptoanalýzy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218739.

Full text
Abstract:
Number of today's modern cipher systems are based on the classical symmetric cipher systems, such as the transposition principle in the DES cipher. Successful analysis and deciphering of these ciphers is therefore underlined by solid knowledge of the elementary cryptanalysis methods. This implies the importance of classical cryptanalysis education -- for better a understanding of the field, using visual means is of utmost importance. The aim of the thesis is to summarize selected cipher methods of the classical cryptanalysis, namely the mono-- and polyalphabetical substitution and transpositio
APA, Harvard, Vancouver, ISO, and other styles
4

Bayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.

Full text
Abstract:
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and practical implementation are analysed. In the first chapter basic cryptographic terms, symmetric and asymetric cryptographic algorithms and are mentioned. Also usage and reliability are analysed. Following chapters mention substitution, transposition, block and stream ciphers, which are elementary for most cryptographic algorithms. There are also mentioned the modes, which the ciphers work in. In the fourth chapter are described the principles of some chosen cryptographic algorithms. The objective
APA, Harvard, Vancouver, ISO, and other styles
5

Vozák, Petr. "Knihovna algoritmů pro šifrování textu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237044.

Full text
Abstract:
p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text ciphering. The presented paper describes at first basic theoretical background of cryptology and basic distribution of cryptographic algorithms. Then it describes a brief history of encryption from beginning to present. Theoretical description of ciphering methods and its implementation details are discussed here. All basic types of conventional encryption algorithms and also some modern ciphering methods are included; these are substitution, transposition, steganographic or combinations encryption sy
APA, Harvard, Vancouver, ISO, and other styles
6

MILICHOVSKÁ, Eva. "Historie šifrovacích metod a jejich aplikace." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-385158.

Full text
Abstract:
I deal with historical encryption procedures and with their application in teaching in my diploma thesis. I present a brief list of some encryption methods in following chapters which were used from antiquity to the mid-20th century. There are prepared specific worksheets for encryption and decryption in this thesis. For several ciphers, the required tools are included in this work, too.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Transposition cipher"

1

Courville, Joseph B. Manual for cryptanalysis of the columnar double transposition cipher: A study of cryptanalysis. J.B. Courville, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

General Solution for the Double Transposition Cipher (Cryptographic Series C-84). Aegean Park Pr, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barker, Wayne G. Cryptanalysis of the Double Transposition Cipher: Includes Problems and Computer Programs (Cryptographic Series , No 69). Aegean Park Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

F, Friedman William. Military Cryptanalysis: Transposition and Fractionating Systems (Cryptographic Series , No 61, Part 4). Aegean Park Pr, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Diepenbroek, Martine. The Spartan Scytale and Developments in Ancient and Modern Cryptography. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781350281301.

Full text
Abstract:
This book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical ‘stick’, Diepenbroek argues for the scytale’s deserved status as a vehicle for secret communication in the ancient world. By way of comparison, Diepenbroek demonstrates that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th-century transpositio
APA, Harvard, Vancouver, ISO, and other styles
8

F, Friedman William. Military Cryptanalysis, Part IV: Transposition and Fractionating Systems (Cryptographic Series, No 61). Aegean Park Pr, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Transposition cipher"

1

Weik, Martin H. "transposition cipher." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boryczka, Urszula, and Kamil Dworak. "Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms." In Computational Collective Intelligence. Technologies and Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11289-3_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shukla, Apratim, Mayank K. Tolani, Dipan Polley, Abhishek Thazhethe Kalathil, and N. Subhashini. "Enyo: A Multistage Partition and Transposition Based Cipher." In Communication and Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Song, Jun, Fan Yang, Maocai Wang, and Huanguo Zhang. "Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm." In Advances in Computation and Intelligence. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92137-0_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ritu, Niram, Ekta Narwal, and Sumeet Gill. "A Novel Cipher Technique Using Substitution and Transposition Methods." In Rising Threats in Expert Applications and Solutions. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1122-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mishra, Girish, and Sarvjeet Kaur. "Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing." In Advances in Intelligent Systems and Computing. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2220-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bhowmik, Sandeep, and Sriyankar Acharyya. "Application of GA in Key Generation for Image Transposition Cipher Algorithm." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jain, Ashish, Prakash C. Sharma, Santosh K. Vishwakarma, Nirmal K. Gupta, and Vaibhav C. Gandhi. "Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jain, Ashish, Nirmal K. Gupta, Santosh K. Vishwakarma, and Prakash C. Sharma. "Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Salomon, David. "Transposition Ciphers." In Data Privacy and Security. Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Transposition cipher"

1

Fauziah, Sunny Arief Sudiro, Bayu Kumoro Yakti, Ragiel Hadi Prayitno, and Sarifuddin Madenda. "Parallelizing Cipher Processes with Finite State Machine in MATLAB for Substitution and Transposition." In 2024 IEEE Asia-Pacific Conference on Geoscience, Electronics and Remote Sensing Technology (AGERS). IEEE, 2024. https://doi.org/10.1109/agers65212.2024.10932960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Djamalilleil, As'ad, Muslim Muslim, Yulita Salim, Erick Irawadi Alwi, Huzain Azis, and Herman. "Modified Transposition Cipher Algorithm for Images Encryption." In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pal, Jayanta Kumar, J. K. Mandal, and Somsubhra Gupta. "Composite Transposition Substitution Chaining Based Cipher Technique." In 2008 16th International Conference on Advanced Computing and Communications. IEEE, 2008. http://dx.doi.org/10.1109/adcom.2008.4760485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borodzhieva, Adriana. "MATLAB-BASED SOFTWARE TOOL FOR IMPLEMENTATION OF TRIFID CIPHERS USING 64-SYMBOL ALPHABET." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-050.

Full text
Abstract:
The development of information and communication technologies is the dominant factor for the sustainable development of society. Problems of information security are of fundamental importance for the society. To achieve the required levels of security of the information a highly qualified personnel is needed. In this regard increased attention is paid to the training of specialists in this field, based on the continuous improvement of the educational process. The paper presents one of the classical ciphers in cryptography, the trifid cipher, a type of cipher that was used historically but now
APA, Harvard, Vancouver, ISO, and other styles
5

Fernando, Maricel Grace Z., Ariel M. Sison, and Ruji P. Medina. "Securing Private Key using New Transposition Cipher Technique." In 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2019. http://dx.doi.org/10.1109/ecice47484.2019.8942798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wulandari, Gia S., Wahyu Rismawan, and Siti Saadah. "Differential evolution for the cryptanalysis of transposition cipher." In 2015 3rd International Conference on Information and Communication Technology (ICoICT ). IEEE, 2015. http://dx.doi.org/10.1109/icoict.2015.7231394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tiozon, Mark Julius P., Jessie R. Paragas, and Neil M. Pascual. "Implementation of Traditional Transposition Cipher with Salting Principle." In 2021 3rd International Conference on Research and Academic Community Services (ICRACOS). IEEE, 2021. http://dx.doi.org/10.1109/icracos53680.2021.9702062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Krishna, B. Hari, I. Raja Sekhar Reddy, S. Kiran, and R. Pradeep Kumar Reddy. "Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers." In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016. http://dx.doi.org/10.1109/wispnet.2016.7566299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hamood, Dalal N. "Key Transposition Cipher and Decipher based on Genetic Algorithm." In 2022 International Conference on Artificial Intelligence of Things (ICAIoT). IEEE, 2022. http://dx.doi.org/10.1109/icaiot57170.2022.10121893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Putrie, Vike Maylana, Christy Atika Sari, De Rosal Ignatius Moses Setiadi, and Eko Hari Rachmawanto. "Super Encryption using Transposition-Hill Cipher for Digital Color Image." In 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2018. http://dx.doi.org/10.1109/isriti.2018.8864361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!