CFP last date
20 January 2025
Reseach Article

Classical Hybrid Technique – Substitution and Transposition Techniques

by S. Kiran, G. Madhavi, Syed Farzana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 153 - Number 4
Year of Publication: 2016
Authors: S. Kiran, G. Madhavi, Syed Farzana
10.5120/ijca2016911997

S. Kiran, G. Madhavi, Syed Farzana . Classical Hybrid Technique – Substitution and Transposition Techniques. International Journal of Computer Applications. 153, 4 ( Nov 2016), 8-13. DOI=10.5120/ijca2016911997

@article{ 10.5120/ijca2016911997,
author = { S. Kiran, G. Madhavi, Syed Farzana },
title = { Classical Hybrid Technique – Substitution and Transposition Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2016 },
volume = { 153 },
number = { 4 },
month = { Nov },
year = { 2016 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume153/number4/26389-2016911997/ },
doi = { 10.5120/ijca2016911997 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:58:13.059056+05:30
%A S. Kiran
%A G. Madhavi
%A Syed Farzana
%T Classical Hybrid Technique – Substitution and Transposition Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 153
%N 4
%P 8-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The most important issue for every organization is nothing but security. This paper deals with the confidentiality of electronic data which is transmitted over the internet. To ensure security we are cryptography. “Cryptography” is the process of converting readable format of text to unreadable format of text. This is mainly used for secured communication. Many ciphers have been developed to provide security. Out of these techniques we considered five cipher techniques those are “Caesar Cipher, Mono alphabetic Cipher, Poly alphabetic Cipher, Row Transposition Technique, and Rail fence Techniques”. The main objective of this proposed system is to combine the functionality of these five techniques to overcome the disadvantages of these techniques and to form a new hybrid technique named as “Classical Hybrid Encryption Substitution and Transposition Techniques” which can provide a good security when compared to techniques. This method uses two stages of encryption. In the first stage Substitution techniques – Mono alphabetic, Caesar cipher, poly alphabetic cipher are used to generate partial cipher text. The key for Caesar cipher and poly alphabetic technique is generated randomly by using Multiplicative linear congruential generator (Random number generation technique). In the second stage of Encryption Technique Transposition methods – Row Transposition and Rail fence Techniques are used to generate final cipher text. This algorithm provides 91! Of key space and in addition of that this encryption technique is multistage with each stage uses different key. Through this technique we will achieve good security against Brute-Force Attack and Cryptanalysis.

References
  1. S.G. Srikantaswamy, H.D.Phaneendra-NIT-“Improved Caesar cipher with Random number generation technique and multistage encryption”- International Journal on Cryptography and information Security IJCIS, vol.2, No.4, December 2012.
  2. A.F.A.Abidin, O.Y. Chuan and M.R.K. Ariffin- “A Novel enhancement Technique of the Hill Cipher for effective Cryptographic Purposes ‘- Journal of Computer science, 7(5):785-789, 2011
  3. Dharmendra Kumar Gupta, Submit Kumar Srivastava, Vedpal Singh- “New concept of encryption algorithm. A hybrid approach of Caesar Cipher and Columnar transposition in multi stages “-Journal of Global Research in Computer Science, Volume 3, No.1 , January 2012, P.No.60-66.
  4. Fauzan Saeed, Mustafa Rashid- “Integrating Classical Encryption with Modern Tehnique”- IJCSNS, Volume10, No. 5, May 2010
  5. Prof.K.Govinda, Dr.E. sathiyamoorth – “Multileve l Cryptography Technique using Graceful codes” –JGRCS, Volume 2, No.7, July 2011
  6. Monodeep Banerjee, Saptarshi Naskar,krishnendu Basuli, Samar Sen Sarma –“A novel scheme for text data encryption “-JGRCS, volume 3, no.1, January 2012
  7. Phillip I Wilson and Mario Garcia –“A Modified Version of the vigenere Algorithm “- IJCSNS, Vol.6, No.3B, march 2006
  8. Packirisamy Murali and Gandhi doss Senthil Kumar-“Modified Version of Playfair cipher using Linear feedback Shift Register “-IJCSNS, vol.8, No.12, December 2008
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography C Decryption Ciphers Multiplicative linear Congruential Generator Key space Brute-Force Attack Cryptanalysis