CFP last date
20 January 2025
Reseach Article

Comparative Study of Various Substitution and Transposition Encryption Techniques

by Preeti Poonia, Praveen Kantha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 10
Year of Publication: 2016
Authors: Preeti Poonia, Praveen Kantha
10.5120/ijca2016910783

Preeti Poonia, Praveen Kantha . Comparative Study of Various Substitution and Transposition Encryption Techniques. International Journal of Computer Applications. 145, 10 ( Jul 2016), 24-27. DOI=10.5120/ijca2016910783

@article{ 10.5120/ijca2016910783,
author = { Preeti Poonia, Praveen Kantha },
title = { Comparative Study of Various Substitution and Transposition Encryption Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 10 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number10/25315-2016910783/ },
doi = { 10.5120/ijca2016910783 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:26.321772+05:30
%A Preeti Poonia
%A Praveen Kantha
%T Comparative Study of Various Substitution and Transposition Encryption Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 10
%P 24-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid development in the technology, Encryption is one the most power full approach to achieve data security and privacy. Data Encryption techniques is used to hide the original content of a data in such a way that the original information is recovered only through using a key known as decryption process. The objective of the encryption is to secure or protect data from unauthorized access in term of viewing or modifying the data. Encryption can be implemented occurs by using some substitute technique, shifting technique, or mathematical operations. By applying these techniques we can generate a different form of that data which can be difficult to understand by any one. The original data is referred to as the plaintext and the encrypted data as the cipher text. Several symmetric key base algorithms have been developed in the past year. In this paper we proposed a comparative study over symmetric key based algorithm using some parameter like algorithm strength, key size, key type attack type etc.

References
  1. Ayushi, “A Symmetric Key Cryptographic Algorithm”, International Journal of Computer Applications, ISSN: 0975 – 8887, Vol. 1, No. 15, 2010.
  2. Mohit Mittal, “Performance Evaluation of Cryptographic Algorithms”, International Journal of Computer Applications, ISSN 0975-8887.
  3. Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam P. DubeyASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id International Journal of Computer Science and Mobile ComputingIJCSMC, Vol. 4, Issue. 8, August 2015.
  4. Mohammad ShahnawazNasir, Prakash Kuppuswamy “Implementation of Biometric Security using Hybrid Combination of RSA and Simple Symmetric Key Algorithm “International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 1, Issue 8, October 2013.
  5. William Stallings “Cryptography and Network Security: Principles and Practices”, PHI Learning Private Limited, Forth Edition, 2009, pp 64 - 86.
  6. Satish Kumar Garg” Modified Encryption and Decryption Using Symmetric Keys at Two Stages: Algorithm SKG 1.2” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 6, June 2014 ISSN: 2277 128X.
  7. SomdipDey “An Integrated Symmetric Key Cryptographic Method Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm” I.J.Modern Education and Computer Science, 2012, 5, 1-9 Published Online June 2012 in MECS.
  8. Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam P. DubeyASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id International Journal of Computer Science and Mobile ComputingIJCSMC, Vol. 4, Issue. 8, August 2015.
  9. William Stallings “Cryptography and Network Security: Principles and Practices”, PHI Learning Private Limited, Forth Edition, 2009, pp 64 - 86.
  10. Senthil, K., K. Prasanthi, and R. Rajaram . "A modern avatar of Julius Caesar and Vigenere cipher." Computational Intelligence and Computing Research(ICCIC), 2013 IEEE International Conference on. IEEE,2013.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric Encryption Decryption Substitution Transposition Plaintext Chipper text.