2014
DOI: 10.5120/17591-8290
|View full text |Cite
|
Sign up to set email alerts
|

Improving Security of Vigenère Cipher by Double Columnar Transposition

Abstract: Protecting data from malicious attacks during storage and transmission is the reason for using encryption. Encryption can be achieved by two methods-Transposition and Substitution. Transposition refers to changing the order of characters in a given text. On the other hand, substitution is the process of replacing each character of the plaintext with some other character. Using a combination of transposition and substitution for encryption leads to greater security when compared to using either of them separate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
2

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 2 publications
0
12
0
2
Order By: Relevance
“…Nishith and Kishore (2014) proposed improving security of Vigenè re cipher by double columnar transposition [7]. This involves applying the Vigenè re cipher on a plaintext, before subsequently applying columnar transposition twice to further scramble the text.…”
Section: Cryptanalysismentioning
confidence: 99%
See 1 more Smart Citation
“…Nishith and Kishore (2014) proposed improving security of Vigenè re cipher by double columnar transposition [7]. This involves applying the Vigenè re cipher on a plaintext, before subsequently applying columnar transposition twice to further scramble the text.…”
Section: Cryptanalysismentioning
confidence: 99%
“…It then uses modular arithmetic to transform the integer that each plaintext letter corresponds to into another integer that corresponds to a cipher text letter. The encryption function for a single letter is defined as equation (7). The algebraic computing for encryption process of the Vigenè re-Affine cipher is demonstrated in Fig.…”
Section: B Algebraic Descriptionmentioning
confidence: 99%
“…Suppose the array of components R in Fig. 2 which consists of 15 columns and 15 rows, using 45820 as seeds obtained random sequences from 0 to 14 in order of [1,9,11,3,5,6,8,10,0,7,14,13,4,12,2] for the columns and [8, 6,1,13,3,11,0,2,12,10,7,5,4,9,14] for rows.…”
Section: Methodsmentioning
confidence: 99%
“…So it can be said that the ciphertext of the transposition is a permutation [3] of the plaintext. The widely used transposition techniques for text encryption include rail fence [3], route transposition [4], columnar transposition [4], double transposition [5], [6] and Myszkowsky transposition [7].…”
Section: Fig 1 the Color Components Of An Rgb Imagementioning
confidence: 99%
“…Authors in [5] presented similar work on image the Authors in [1] have mentioned the positive consequences of using a shuffle based technique. The proposed algorithm design also considered the author in [3] mentioning the downside of using linear congruential generator as the PRNG which includes statistical determinism due to the mechanical nature of the algorithm.…”
Section: Related Workmentioning
confidence: 99%