International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 153 - Number 4 |
Year of Publication: 2016 |
Authors: S. Kiran, G. Madhavi, Syed Farzana |
10.5120/ijca2016911997 |
S. Kiran, G. Madhavi, Syed Farzana . Classical Hybrid Technique – Substitution and Transposition Techniques. International Journal of Computer Applications. 153, 4 ( Nov 2016), 8-13. DOI=10.5120/ijca2016911997
The most important issue for every organization is nothing but security. This paper deals with the confidentiality of electronic data which is transmitted over the internet. To ensure security we are cryptography. “Cryptography” is the process of converting readable format of text to unreadable format of text. This is mainly used for secured communication. Many ciphers have been developed to provide security. Out of these techniques we considered five cipher techniques those are “Caesar Cipher, Mono alphabetic Cipher, Poly alphabetic Cipher, Row Transposition Technique, and Rail fence Techniques”. The main objective of this proposed system is to combine the functionality of these five techniques to overcome the disadvantages of these techniques and to form a new hybrid technique named as “Classical Hybrid Encryption Substitution and Transposition Techniques” which can provide a good security when compared to techniques. This method uses two stages of encryption. In the first stage Substitution techniques – Mono alphabetic, Caesar cipher, poly alphabetic cipher are used to generate partial cipher text. The key for Caesar cipher and poly alphabetic technique is generated randomly by using Multiplicative linear congruential generator (Random number generation technique). In the second stage of Encryption Technique Transposition methods – Row Transposition and Rail fence Techniques are used to generate final cipher text. This algorithm provides 91! Of key space and in addition of that this encryption technique is multistage with each stage uses different key. Through this technique we will achieve good security against Brute-Force Attack and Cryptanalysis.