To see the other types of publications on this topic, follow the link: Transposition cipher.

Journal articles on the topic 'Transposition cipher'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Transposition cipher.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Garg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (June 2017): 22–25. http://dx.doi.org/10.25046/aj020504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (July 20, 2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.

Full text
Abstract:
Abstrack - The existence of data theft and misuse of data by unrelated groups causes the data to be no longer safe. Therefore, a security is needed that can make data safe from groups that are not concerned. Caesar Cipher Algorithm, which is the position of the original letter location changed through the alphabet. Transposition algorithm, which uses character permutations. Caesar Cipher and Transposition can secure data and restore data without changing the original form (plaintext).Keywords - Data Theft, Security, Caesar Chiper, Cipher Transposition Abstrack - Adanya pencurian data dan penyalahgunaan data oleh kelompok yang tidak bersangkutan menyebabkan data tidak terjaga lagi. Oleh karena itu, dibutuhkan suatu keamanan yang bisa membuat data aman dari kelompok yang tidak bersangkutan. Algoritma Caesar Cipher, yaitu posisi letak huruf asal diubah melalui alfabet. Algoritma Transposisi, yaitu menggunakan permutasi karakter. Caesar Cipher dan Transposisi dapat mengamankan data dan mengembalikan data tanpa merubah bentuk dari aslinya (plainteks).Kata Kunci - Pencurian Data, Keamanan, Caesar Chiper, Trasposisi Chiper
APA, Harvard, Vancouver, ISO, and other styles
4

Alkathiry, Omar, and Ahmad Al-Mogren. "A Powerful Genetic Algorithm to Crack a Transposition Cipher." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 395–99. http://dx.doi.org/10.7763/ijfcc.2014.v3.335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (December 27, 2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.

Full text
Abstract:
Pada penelitian ini, digunakan algoritma columnar transposition sebagai metode transposisi dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang sebagai metode substitusi. Penyandian pesan menggunakan metode super enkripsi dengan algoritma columnar transposition dan modifikasi algoritma hill cipher dengan invers kiri matriks persegi panjang menghasilkan pesan akhir yang tidak mengubah, menambah maupun mengurangi pesan awal, sehingga dapat di implementasikan pada pesan dengan baik. Penyandian ini melipat gandakan keamanan suatu pesan, dimana keamanan pertama terletak pada enkripsi pesan dengan columnar transposition dan keamanan yang kedua terletak pada algoritma hill cipher yang telah dimodifikasi, sehingga membuat pesan akan semakin sulit untuk dipecahkan. Hasil dari penelitian ini dapat dijadikan sebagai tambahan pustaka mengenai kriptografi serta solusi bagi pihak yang menggunakan teknologi informasi dan komunikasi untuk dapat melakukan pengiriman pesan dengan aman.
APA, Harvard, Vancouver, ISO, and other styles
6

Ritter, Terry. "TRANSPOSITION CIPHER WITH PSEUDO-RANDOM SHUFFLING: THE DYNAMIC TRANSPOSITION COMBINER." Cryptologia 15, no. 1 (January 1991): 1–17. http://dx.doi.org/10.1080/0161-119191865731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lokman, Syiham Mohd, Chuah Chai Wen, Nurul Hidayah Binti Ab Rahman, and Isredza Rahmi Binti A. Hamid. "A Study of Caesar Cipher and Transposition Cipher in Jawi Messages." Advanced Science Letters 24, no. 3 (March 1, 2018): 1651–55. http://dx.doi.org/10.1166/asl.2018.11130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ineke Pekereng, Magdalena A., and Alz Danny Wowor. "Square transposition: an approach to the transposition process in block cipher." Bulletin of Electrical Engineering and Informatics 10, no. 6 (December 1, 2021): 3385–92. http://dx.doi.org/10.11591/eei.v10i6.3129.

Full text
Abstract:
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
APA, Harvard, Vancouver, ISO, and other styles
9

Syarif, Akhmad. "Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA." Jurnal Teknologi Informasi 4, no. 2 (December 10, 2020): 234–40. http://dx.doi.org/10.36294/jurti.v4i2.1350.

Full text
Abstract:
Abstract - Cryptography is the art of securing and keeping text or message from other people except those who receive it. Caesar Cipher algorithm is a classic algorithm that is vulnerable to hacker attacks by the brute force method. Caesar Cipher with 7 methods, the first is a transposition, the second is a permutation, the third is binary converting, the fourth is logistic gate calculation, the sixth is converting ASCII and the seventh is converting Hexa. With seven combinations of these methods, it can improve Caesar’s algorithm Cipher from hacker attacks and add variations to the modification of Caesar Cipher in classical encryption. Making ciphertext very complex and to overcome so many possibilities that must be tried.Keywords - Caesar Cipher, Modification, Convert, Transposition. Abstrak - Kriptografi adalah seni dalam mengamankan dan merahasiakan suatu teks atau pesan dari orang lain kecuali yang menerima. Algoritma Caesar Cipher adalah algoritma klasik yang rentan akan serangan hacker dengan metode brute force. Pada penelitian ini dilakukan memodifikasi algoritma Caesar Cipher dengan 7 metode yaitu pertama adalah tranposisi, ke-dua permutasi, ke-tiga convert biner, ke-empat perhitungan gerbang logika, ke-enam convert ASCII dan ke-tujuh convert hexa. Dengan tujuh kombinasi metode ini harapan bisa memperkuat algoritma Caesar Cipher dari serangan hacker dan menambah variasi modifikasi dari Caesar Cipher dalam enkripsi klasik. Menjadikan ciphertext sangat komplek dan untuk mengatasinya begitu banyak kemungkinan yang harus dicoba. Kata Kunci - Caesar Cipher, Modifikasi, Mengubah, Transposisi.
APA, Harvard, Vancouver, ISO, and other styles
10

Sokouti, Massoud. "An approach in improving transposition cipher system." Indian Journal of Science and Technology 2, no. 8 (August 20, 2009): 9–15. http://dx.doi.org/10.17485/ijst/2009/v2i8.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

H. ASNAEEL, YASEEN, and NAJLA B. IBRAHEAM. "ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION." Journal of University of Anbar for Pure Science 7, no. 1 (April 1, 2013): 233–39. http://dx.doi.org/10.37652/juaps.2013.83081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

JASSIM, M. KH. "Improved PSO Algorithm to Attack Transposition Cipher." Engineering and Technology Journal 35, no. 2B (February 1, 2017): 144–49. http://dx.doi.org/10.30684/etj.2017.138650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Muhammad Fadlan, Haryansyah, and Rosmini. "Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (December 30, 2021): 1113–19. http://dx.doi.org/10.29207/resti.v5i6.3566.

Full text
Abstract:
One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.
APA, Harvard, Vancouver, ISO, and other styles
14

Grace Z, Maricel. "Secured Private Key Handling using Transposition Cipher Technique." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 1.1 S I (February 15, 2020): 85–89. http://dx.doi.org/10.30534/ijatcse/2020/1691.12020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lasry, George, Nils Kopal, and Arno Wacker. "Cryptanalysis of columnar transposition cipher with long keys." Cryptologia 40, no. 4 (February 2016): 374–98. http://dx.doi.org/10.1080/01611194.2015.1087074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

anand, V. B. Kirub, and R. Siva kumar. "Queuing Network using Job Scheduling using Transposition Cipher." International Journal of P2P Network Trends and Technology 8, no. 4 (August 25, 2018): 6–10. http://dx.doi.org/10.14445/22492615/ijptt-v8i4p402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Dina, Bela, Dadang Iskandar Mulyana, and Julinar Sari Hutagalung. "Algoritma ADFGVX Product Transposition Cipher Pada Pengenkripsian Pesan Text." Jurnal Pendidikan Sains dan Komputer 2, no. 01 (March 13, 2022): 172–83. http://dx.doi.org/10.47709/jpsk.v2i01.1378.

Full text
Abstract:
Keamanan informasi data digital menjadi hal yang penting dan sangat diperlukan untuk menjaga data yang penting dan rahasia. Salah satu solusi yang ditawarkan untuk mengamankan data dengan sebuah cara menyandikan data atau disebut juga dengan ciphering. Dalam kriptografi terdapat beberapa metode yang sangat penting dalam menjaga kerahasiaan suatu data yakni enkripsi dan dekripsi. Algoritma ADFGVX Product Cipher dibuat karena merupakan salah satu algoritma yang memiliki sandi morse yang jelas. Algoritma ini akan menciptakan fungsi enkripsi kompleks seperti cara menggabungkan beberapa operasi enkripsi dasar sederhana yang saling melengkapi sehingga melibatkan operasi bolak-balik yang berulang yaitu subtitusi dan permutasi. Algoritma Row Transposition dipilih karena cipher transposisi dimana plainteks dituliskan per kolom sesuai panjang kunci dan dibaca berdasarkan urutan indeks huruf tersebut per kolom.
APA, Harvard, Vancouver, ISO, and other styles
18

Lubis, Ali Akbar, Ng Poi Wong, Irfan Arfiandi, V. Immanuel Damanik, and Adithya Maulana. "Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher." Jurnal SIFO Mikroskil 16, no. 2 (November 26, 2015): 125–34. http://dx.doi.org/10.55601/jsm.v16i2.244.

Full text
Abstract:
Least Significant Bit (LSB) merupakan salah satu metode steganografi. Dari segi kapasitas, metode ini hanya mampu menampung sedikit pesan, ini karena LSB hanya menggunakan 3 bit disetiap pikselnya. Dari segi keamanan juga sangat mudah untuk diekstrak oleh steganalis, karena pesan yang disisip terdapat disetiap bit terakhir RGB di setiap piksel dari stego image tanpa adanya enkripsi terhadap pesan terlebih dahulu. Sebuah metode berprinsip sama dengan LSB dengan peningkatan keamanan dan kapasitas menggunakan metode Modified Least Significant Bit (MLSB) yang dikombinasi dengan teknik enkripsi triple transposition vigenere cipher. MLSB merupakan metode LSB yang telah dimodifikasi dengan mengubah data dari bilangan 8 bit menjadi 5 bit, kemudian disisipkan ke dalam cover image. Teknik triple transposition vigenere cipher juga merupakan modifikasi dari teknik vigenere cipher dengan melakukan proses substitusi dan transposisi sebanyak 3 kali dengan kunci yang berbeda satu sama lain. Hasil pengujian menunjukkan bahwa kecepatan dan kualitas citra hasil steganografi bergantung pada berapa banyak karakter dan keacakan dari karakter yang akan diinput. Kualitas citra steganografi dengan metode ini menunjukkan kualitas yang baik, karena nilai PSNR di atas 40dB. file citra sebelum dan sesudah disisipi pesan, tidak menunjukkan perbedaan yang signifikan dan pesan yang diekstrak tidak mengalami perubahan.
APA, Harvard, Vancouver, ISO, and other styles
19

Sinha, Nishith, and Kishore Bhamidipati. "Improving Security of Vigenère Cipher by Double Columnar Transposition." International Journal of Computer Applications 100, no. 14 (August 20, 2014): 6–10. http://dx.doi.org/10.5120/17591-8290.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hameed, Sarab M., and Dalal N. Hmood. "PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER." Journal of Al-Nahrain University Science 13, no. 4 (December 1, 2010): 211–15. http://dx.doi.org/10.22401/jnus.13.4.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mahalakshmi, B., and Ch Sravan. "An Overview on Disrupted Transposition Cipher for Security Enhancement." International Journal of Computer Applications 143, no. 13 (June 17, 2016): 9–12. http://dx.doi.org/10.5120/ijca2016910308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Barrieta, Raymond G., Aleksis S. Canlas, Dan Michael A. Cortez, and Khatalyn E. Mata. "Modified Hill Cipher Algorithm using Myszkowski Transposition to address Known-Plaintext attack." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 3242–49. http://dx.doi.org/10.22214/ijraset.2022.41970.

Full text
Abstract:
Abstract: Hill Cipher algorithm is a Polygraphic cipher known to be vulnerable to the Known-Plaintext attack. It is a type of attack wherein the attacker has access to a pair of Plaintext and Ciphertext. Possible leaked information can be used to reveal critical data which can include the private key that is used in the encryption of the plaintext. In this study, the researchers propose an improved scheme by incorporating Myszkowski transposition in the algorithm to address the specified problem. Runtime Test and Statistical test such as the Avalanche effect were used to evaluate the performance of the algorithm. The test yielded a 25.70% faster runtime based on previous modifications and a 52.78% Avalanche Effect. Randomness test such as the Monobit test, Runs Test and Longest Run of Ones in a Block test were applied to evaluate the ciphertext produced. The criterion for the Randomness Test requires its p-value to be greater than 0.01, the evaluation showed a 0.249, 0.167 and 0.368 p-value, respectively. The proposed scheme proved that the algorithm is cryptographically secure and efficient as all tests yielded favorable results. Keywords: Cryptography, Hill Cipher, Encryption, Decryption, Key Generation
APA, Harvard, Vancouver, ISO, and other styles
23

Simanullang, Sanco. "PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (September 10, 2019): 12–17. http://dx.doi.org/10.46880/mtk.v5i2.421.

Full text
Abstract:
Data security is important in the implementation of information technology, especially in the field of computers, which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace or the internet. This can create new challenges and demands for the availability of a data security system that is as sophisticated as the advances in computer technology itself. In cryptography, data sent over the network will be disguised in such a way that even if the data can be read by third parties, it should not be understood by unauthorized parties. Data to be sent and has not been encrypted which produces ChipperTtext. The implementation of the transposition algorithm for securing data flowing in the Local Area Network (LAN), the transposition process changes the arrangement of letters from the source text (plaintext), with a column transposition cipher, to obtain the words in a barred manner. In the transposition cipher, the plaintext is the same, but the sequence is changed. . This algorithm transposes a series of characters in the text. Another name for this method is permutation because transpose each character in the text is the same as permutating the characters so that this application generates encrypted data on the network stream and returns it to plaintext at the final destination. So that it can be ensured that the information and data sent to other parties are safe from unauthorized parties.
APA, Harvard, Vancouver, ISO, and other styles
24

Rachmawati, Dian, Sri Melvani Hardi, and Raju Partogi Pasaribu. "Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression." Journal of Physics: Conference Series 1339 (December 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1339/1/012007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Madushani, A. P., and P. G. R. S. Ranasinghe. "A symmetric and a transposition cipher using the Euler’s totient function." Ceylon Journal of Science 48, no. 4 (December 10, 2019): 327. http://dx.doi.org/10.4038/cjs.v48i4.7672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Twum, Frimpong, J. B., and Morgan-Darko William. "A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations." International Journal of Computer Applications 182, no. 35 (January 17, 2019): 18–26. http://dx.doi.org/10.5120/ijca2019918323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ali-Pacha, Hana, Naima Hadj- Said, Adda Ali Pacha, Mohamad Afendee Mohamed, and Mustafa Mamat. "The six-dos transposition cipher based on the rubik s cube." International Journal of Advanced Technology and Engineering Exploration 8, no. 75 (February 28, 2021): 258–73. http://dx.doi.org/10.19101/ijatee.2020.762150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Shibeeb, Ahmed Kareem, and Mohammed Hussein Ahmed. "Use of a new approach to automated break transposition cipher system." IOP Conference Series: Materials Science and Engineering 518 (June 5, 2019): 052020. http://dx.doi.org/10.1088/1757-899x/518/5/052020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Benjamin, Okike, and E. Garba. "Development of Okike’s Merged Irregular Transposition Cipher and Its Level Error." British Journal of Mathematics & Computer Science 7, no. 3 (January 10, 2015): 229–40. http://dx.doi.org/10.9734/bjmcs/2015/14869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jain, Shipra, and Vishal Bhatnagar. "A Novel Ammonic Conversion Algorithm for Securing Data in DNA using Parabolic Encryption." Information Resources Management Journal 28, no. 2 (April 2015): 20–31. http://dx.doi.org/10.4018/irmj.2015040102.

Full text
Abstract:
In today's era, the traditional cryptographic methods are not sufficient to provide security to the data. Everyone wants to secure their data whether the data is bank transaction, email transaction, personal data or the data related to work. To provide security to the data, DNA cryptography emerges as a new field. DNA cryptography is a new branch of cryptography. It provides security to the data by converting the data in the form of DNA sequence. A lot of research has been done in the area of this cryptography. It consists of various stages like converting data in the form of DNA, reverse conversion, various methods of encryption etc. Various methods of encryption are present until now in the DNA cryptography. But the problem with them is that they all have more emphasis on biological encryption methods. There is a need of methods which make use of simple biological methods and complex binary or other number system encryption. In this paper, the authors are proposing a new algorithm for providing security to the data at two levels. The authors propose a parabolic transposition in a circular arrangement of data. In the proposed algorithm, data is arranged in a circular way. The number of rows and columns acts as a key for binary encryption. For encrypting the DNA sequence, the authors convert the DNA sequence into amino acid. This amino acid sequence will act as a cipher text and send to the receiver through the open environment. The proposed algorithm is a type of block cipher. It is a transposition cipher. It changes the position of data for binary encryption.
APA, Harvard, Vancouver, ISO, and other styles
31

Handrizal, Jos Timanta Tarigan, and Doni Irwansyah Putra. "Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion." Journal of Physics: Conference Series 1898, no. 1 (June 1, 2021): 012003. http://dx.doi.org/10.1088/1742-6596/1898/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nurdiyanto, Heri, Robbi Rahim, and Nur Wulan. "Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement." Journal of Physics: Conference Series 930 (December 2017): 012005. http://dx.doi.org/10.1088/1742-6596/930/1/012005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Xu, Liyao Li, Ching-Chun Chang, and Yongfeng Huang. "Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher." Journal of Information Security and Applications 64 (February 2022): 103067. http://dx.doi.org/10.1016/j.jisa.2021.103067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Gaffar, Achmad Fanany Onnilita, Rheo Malani, and Arief Bramanto Wicaksono Putra. "Magic cube puzzle approach for image encryption." International Journal of Advances in Intelligent Informatics 6, no. 3 (November 6, 2020): 290. http://dx.doi.org/10.26555/ijain.v6i3.422.

Full text
Abstract:
In principle, the image encryption algorithm produces an encrypted image. The encrypted image is composed of arbitrary patterns that do not provide any clues about the plain image and its cipher key. Ideally, the encrypted image is entirely independent of its plain image. Many functions can be used to achieve this goal. Based on the functions used, image encryption techniques are categorized into: (1) Block-based; (2) Chaotic-based; (3) Transformation-based; (4) Conventional-based; and (5) Miscellaneous based. This study proposes a magic cube puzzle approach to encrypt an 8-bit grayscale image. This approach transforms a plain image into a particular size magic cube puzzle, which is consists of a set of blocks. The magic cube puzzle algorithm will diffuse the pixels of the plain image as in a Rubik’s Cube game, by rotating each block in a particular direction called the transposition orientation. The block’s transposition orientation is used as the key seed, while the generation of the cipher key uses a random permutation of the key seed with a certain key length. Several performance metrics have been used to assess the goals, and the results have been compared to several standard encryption methods. This study showed that the proposed method was better than the other methods, except for entropy metrics. For further studies, modification of the method will be carried out in such a way as to be able to increase its entropy value to very close to 8 and its application to true color images. In essence, the magic cube puzzle approach has a large space for pixel diffusion that is possibly supposed to get bigger as a series of data has transformed into several magic cubes. Then, each magic cube has transposed with a different technique. This proposed approach is expected to add to a wealth of knowledge in the field of data encryption.
APA, Harvard, Vancouver, ISO, and other styles
35

Arya, Govind Prasad, Aayushi Nautiyal, Ashish Pant, Shiv Singh, and Tishi Handa. "A Cipher Design with Automatic Key Generation using the Combination of Substitution and Transposition Techniques and Basic Arithmetic and Logic Operations." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 01, no. 01 (April 16, 2013): 25–28. http://dx.doi.org/10.9756/sijcsea/v1i1/01010255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kaur, Kulwinder. "Performance Evaluation of Ciphers Using CRYPTOOL 2.0." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 39–43. http://dx.doi.org/10.24297/ijct.v3i1a.2727.

Full text
Abstract:
Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and considerable research effort is required. This paper includes the complete step by step implementation of advance encryption technique, i.e. encrypting and decrypting 128 bit data using the AES and its modification for enhanced reliability and security. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding technique. The encryption and decryption module include the key expansion module which generates the key for all iterations. The modification includes the addition of an arithmetic operation and a route transposition cipher in the attacks iterative rounds. The key expansion module is extended to double the number of iterative rounds in order to increase its immunity against unauthorized attacks.
APA, Harvard, Vancouver, ISO, and other styles
37

Dubrov-, Evgeniy, Aleksandr Ryazanov-, Aleksandr Sergeev-, and Yuriy Chernishyov-. "Research on applicability of bionic techniques of artificial bee colonies for implementation of classical transposition cipher cryptanalysis." Вестник Донского государственного технического университета 14, no. 1 (April 7, 2014): 62–75. http://dx.doi.org/10.12737/3505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

S.G.Srikantaswamy, Author, and Prof H. D. Phaneendra. "A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques." International Journal of Computer Applications 29, no. 8 (September 29, 2011): 34–36. http://dx.doi.org/10.5120/3581-4960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Bandjur, Milos. "Novel method of discrete message ciphering with equal length of message and cryptogram." Facta universitatis - series: Electronics and Energetics 16, no. 2 (2003): 251–58. http://dx.doi.org/10.2298/fuee0302251b.

Full text
Abstract:
Systems for ciphering contain substitution or transpositions or combination of both. The goal of the present work is to suggest the new cipher that belongs to substitutional ciphers with constant cryptogram length, where cryptogram length is equal with message length. Cipher system suggested here is new and belongs to perfect cipher class regarding the aspect of reliability, as will be shown.
APA, Harvard, Vancouver, ISO, and other styles
40

Tarik Z.Ismaeel. "DESIGN & EVOLUTION OF A STEGANOGRAPHY SYSTEM FOR SPEECH SIGNAL BY SLANTLET TRANSFOR." Diyala Journal of Engineering Sciences 5, no. 2 (December 1, 2012): 99–113. http://dx.doi.org/10.24237/djes.2012.05208.

Full text
Abstract:
In this paper a Stegan graphic system was proposed to hide up a secret speech signal in a cover speech signal, using Slant let transform. The combination of a Stegan graphy and cryptography is used to increase the level of security and to make the system more rigid and complex to be defeated by attackers. In cryptography the secret speech signal is converted from 1-D to 2-D signal, divided into blocks each of size (8*8) sampled and then the samples are converted to the binary form, after that, columns transposition is applied to get the ciphered signal. This cipher signal will be the next stage, we are driving the key which is used in cyphering process from the slantlet coefficients. The proposed system increases the imperceptibility property because it is based on replacing each secret bit with one of the host coefficient bit (the host coefficient may be the same as secret bit). So that changing of host signal due to embedding process was decrease d but the dimension of the cover signal will be a tradeoff between the imperceptibility and the capacity of the system. Imperceptibility and security test s are implemented to check the system. Peak signal to Noise Ratio(PSNR) & Correlation(Corr.) between cover signal & the stego - signal are carried out to evaluate the perform ance of the proposed algorithm
APA, Harvard, Vancouver, ISO, and other styles
41

Budiman, M. A., D. Rachmawati, and Jessica. "Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform." Journal of Physics: Conference Series 978 (March 2018): 012088. http://dx.doi.org/10.1088/1742-6596/978/1/012088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Jara-Vera, Vicente, and Carmen Sánchez-Ávila. "Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy." Mathematics 8, no. 9 (September 8, 2020): 1536. http://dx.doi.org/10.3390/math8091536.

Full text
Abstract:
Security objectives are the triad of confidentiality, integrity, and authentication, which may be extended with availability, utility, and control. In order to achieve these goals, cryptobiometrics is essential. It is desirable that a number of characteristics are further met, such as cancellation, irrevocability, unlinkability, irreversibility, variability, reliability, and biometric bit-length. To this end, we designed a cryptobiometrics system featuring the above-mentioned characteristics, in order to generate cryptographic keys and the rest of the elements of cryptographic schemes—both symmetric and asymmetric—from a biometric pattern or template, no matter the origin (i.e., face, fingerprint, voice, gait, behaviour, and so on). This system uses perfect substitution and transposition encryption, showing that there exist two systems with these features, not just one (i.e., the Vernam substitution cipher). We offer a practical application using voice biometrics by means of the Welch periodogram, in which we achieved the remarkable result of an equal error rate of (0.0631, 0.9361). Furthermore, by means of a constructed template, we were able to generate the prime value which specifies the elliptic curve describing all other data of the cryptographic scheme, including the private and public key, as well as the symmetric AES key shared between the templates of two users.
APA, Harvard, Vancouver, ISO, and other styles
43

Roy, Satyaki, Navajit Maitra, Shalabh Agarwal, Joyshree Nath, and Asoke Nath. "Ultra Encryption Standard Modified (UES) Version-I: Symmetric Key Cryptosystem With Multiple Encryption and Randomized Vernam Key Using Generalized Modified Vernam Cipher Method, Permutation Method, and Columnar Transposition Method." International Journal of Modern Education and Computer Science 4, no. 7 (July 9, 2012): 31–41. http://dx.doi.org/10.5815/ijmecs.2012.07.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sgarro, Andrea. "Equivocations for transposition ciphers." Rivista di Matematica per le Scienze Economiche e Sociali 8, no. 2 (September 1985): 107–14. http://dx.doi.org/10.1007/bf02088768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Giddy, J. P. "Automated Cryptanalysis of Transposition Ciphers." Computer Journal 37, no. 5 (May 1, 1994): 429–36. http://dx.doi.org/10.1093/comjnl/37.5.429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Simkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (December 1, 2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.

Full text
Abstract:
There are a variety of reasons why understanding encryption technology is likely to become increasingly important in the future, and therefore why accounting courses are likely to include encryption materials in future curricula. This paper discusses five encryption techniques: transposition ciphers, cyclic substitution ciphers, Vigenere ciphers, exclusive OR ciphers, and permutation ciphers. Accompanying these discussions are explanations of how instructors can demonstrate these techniques with spreadsheet models. The author's experiences with such models in classroom use have been uniformly positive.
APA, Harvard, Vancouver, ISO, and other styles
47

Al-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation." Engineering, Technology & Applied Science Research 9, no. 3 (June 8, 2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.

Full text
Abstract:
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this algorithm, ciphering and deciphering are mainly based on simple XoR operations followed by substitutions and transpositions in order to add more confusion and diffusion to the algorithm. Experimental results show faster encryption/decryption time when compared to known encryption standards.
APA, Harvard, Vancouver, ISO, and other styles
48

Antal, Eugen, Peter Javorka, and Tomáš Hliboký. "Cryptanalysis of the Columnar Transposition Using Meta-Heuristics." Tatra Mountains Mathematical Publications 73, no. 1 (August 1, 2019): 39–60. http://dx.doi.org/10.2478/tmmp-2019-0005.

Full text
Abstract:
Abstract The most commonly used methods for solving classical (historical) ciphers are based on global optimization (meta-heuristic methods). Despite the fact that global optimization is a well-studied problem, in the case of classical ciphers, there are still many open questions such as the construction of fitness functions or efficient transformation of the cryptanalysis (breaking attempt) to an optimization problem. Therefore the transformation of a cryptanalytical task to an optimization problem and the choice of a suitable fitness function form an important part of the topic. In this paper, we focus on the simple columnar transposition in depth. Our main contribution is a detailed analysis and comparison of different fitness functions, fitness landscape analysis and solving experiments.
APA, Harvard, Vancouver, ISO, and other styles
49

Kh Shakr Sabonchi, AuthorArkan, and Bahriye Akay. "A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers." Computer Systems Science and Engineering 39, no. 1 (2021): 87–106. http://dx.doi.org/10.32604/csse.2021.05365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sun, Wen Jie. "Research on General Permutation Encryption Module Based on Chaos Theory." Applied Mechanics and Materials 686 (October 2014): 381–87. http://dx.doi.org/10.4028/www.scientific.net/amm.686.381.

Full text
Abstract:
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography