CFP last date
20 December 2024
Reseach Article

A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques

by S.G.Srikantaswamy, Prof. H. D. Phaneendra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 8
Year of Publication: 2011
Authors: S.G.Srikantaswamy, Prof. H. D. Phaneendra
10.5120/3581-4960

S.G.Srikantaswamy, Prof. H. D. Phaneendra . A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques. International Journal of Computer Applications. 29, 8 ( September 2011), 34-36. DOI=10.5120/3581-4960

@article{ 10.5120/3581-4960,
author = { S.G.Srikantaswamy, Prof. H. D. Phaneendra },
title = { A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 8 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 34-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number8/3581-4960/ },
doi = { 10.5120/3581-4960 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:18.064653+05:30
%A S.G.Srikantaswamy
%A Prof. H. D. Phaneendra
%T A Cipher Design using the Combined Effect of Arithmetic and Logic Operations with Substitutions and Transposition Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 8
%P 34-36
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Communication is a basic process of exchanging information. Information security is a very important aspect now a day. The introduction of internet and distributed system made the information security issue more challenging and complex. Cryptography plays a crucial role in providing security to data transmitted over the internetwork. Encryption is the most widely used technique used to scramble the data that is being transmitted over the network from sender to a receiver. The encryption algorithms are available practically and provide the security for user data and information. This paper presents an advanced encryption technique which combines the features of substitution and transposition. Five different key values being used in this algorithms and each key value is used to substitute the corresponding plaintext characters in association with addition operation. Each key value is twice as that of the previous one. The basic key value is a fixed one defined by the user. The transposition technique is employed by left shifting each bit of the data. The shifted data is complemented to alter the each bit of the cipher text that is being generated. The effort of the algorithm is to make the cryptanalysis difficult and to make the algorithm stronger.

References
  1. Information Security: Text Encryption and Decryption with Poly Substitution method and combining features of cryptography.-R.Venkateswaram, Dr.V.Sundaram , June 2010.
  2. A modified Hill cipher Involving Interweaving and Iteration.- V. Umakanta Sastry, N. Ravi Shankar and S. Durga Bhavani , July 2010.
  3. A block cipher having a key on one side of plaintext Matrix and its Inverse on the other side. Dr. V. U. K. Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani .
  4. Cryptography and Network Security Principles and Practices, Third Edition – William Stallings
  5. Applied Cryptography Protocols, Algorithms and Source Coding BRUE SCHNEIER, Second Edition, John Wiley & Sons, Inc.
  6. Introduction to Modern Cryptography, Jonathan Katz, Yehuda Lindell Chapman & Hall / CRC Taylor R Francis Group.
Index Terms

Computer Science
Information Sciences

Keywords

Information Security Plaintext Ciphertext Key Cipher Substitution Transposition