We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

An Improved Cryptographic Technique to Encrypt Text using Double Encryption

by Yashpalsingh Rajput, Dnyaneshwar Naik, Charudatt Mane
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 86 - Number 6
Year of Publication: 2014
Authors: Yashpalsingh Rajput, Dnyaneshwar Naik, Charudatt Mane
10.5120/14990-2582

Yashpalsingh Rajput, Dnyaneshwar Naik, Charudatt Mane . An Improved Cryptographic Technique to Encrypt Text using Double Encryption. International Journal of Computer Applications. 86, 6 ( January 2014), 24-28. DOI=10.5120/14990-2582

@article{ 10.5120/14990-2582,
author = { Yashpalsingh Rajput, Dnyaneshwar Naik, Charudatt Mane },
title = { An Improved Cryptographic Technique to Encrypt Text using Double Encryption },
journal = { International Journal of Computer Applications },
issue_date = { January 2014 },
volume = { 86 },
number = { 6 },
month = { January },
year = { 2014 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume86/number6/14990-2582/ },
doi = { 10.5120/14990-2582 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:03:30.964053+05:30
%A Yashpalsingh Rajput
%A Dnyaneshwar Naik
%A Charudatt Mane
%T An Improved Cryptographic Technique to Encrypt Text using Double Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 86
%N 6
%P 24-28
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This work proposes an improved scheme to encrypt the plain text message for its security. All the conventional encryption techniques are very weak and brute force attack and traditional cryptanalysis can be used to easily determine the plain text from encrypted text. In this work of encryption technique, a new concept of conventional ceaser cipher algorithm with hill cipher algorithm is used to make encryption technique more secure and stronger than the earlier concept. The plain text is encrypted in such a way that it becomes difficult to decrypt it. The proposed system is divided into two phases. In first phase, the plain text message is converted to first encrypted text using a new substitution approach which uses poly-alphabetic cipher technique. The encryption is done using variable length key which depends on the string length. In the second phase, the hill cipher technique is applied on the first encrypted text to produce new encrypted text or cipher text. At the receiver end, if the receiver has appropriate decryption key, he can generate the text message similar to the original message. This paper is organized into following sections. Section 1 contains a general introduction to the cryptography, types of cryptography and hill cipher. Section 2 contains literature review on some classical and modern text encryption techniques. Section 3 contains description of the proposed system. Finally paper is concluded in the Section 4.

References
  1. Gary C. Kessler, "An Overview of Cryptography", 2013.
  2. Ramandeep Sharma, Richa Sharma, Harmanjit Singh, "Classical Encryption Techniques", International Journal of Computer & Technology, Vol. 3, No. 1, August 2012, pp. 84 – 90.
  3. "CRYPTOGRAPHY", https://en//. wikipedia. org/wiki/cryptography
  4. Henk C. A. van Tilborg, "FUNDAMENTALS OF CRYPTOLOGY", pp. 9 - 21.
  5. M. Nordin A. Rahman, A. F. A. Abidin, Mohd Kamir Yusof, N. S. M. Usop, "Cryptography: A New Approach of Classical Hill Cipher", IJSA, Vol. 7, No. 2, March 2013.
  6. Kashish Goyal, Supriya Kinger "Modified Caesar Cipher for Better Security Enhancement", International Journal of Computer Applications, Vol. 73, No. 3, July 2013.
  7. Brian Worthingotn, "An Introduction to Hill Ciphers Using Linear Algebra" 2010.
  8. Jawahar Thakur, Nagesh Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", International Journal of Emerging Technology and Advanced Engineering, Vol. 1, Issue 2, 2011.
  9. Ajit Singh, Aarti Nandal and Swati Malik, "Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security", International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 12, December 2012.
  10. Amogh Mahapatra, Rajballav Dash "Data Encryption and Decryption by Using Hill Cipher Technique and Self Repetitive Matrix", in 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Plaintext Ciphertext Hill Cipher