CFP last date
20 January 2025
Reseach Article

Implementation of Cryptography Technique using Columnar Transposition

Published on February 2014 by Malay B. Pramanik
Recent Trends in Information Security
Foundation of Computer Science USA
RTINFOSEC - Number 1
February 2014
Authors: Malay B. Pramanik
d89d37c4-f724-44c3-8dd9-36440d8b8f5a

Malay B. Pramanik . Implementation of Cryptography Technique using Columnar Transposition. Recent Trends in Information Security. RTINFOSEC, 1 (February 2014), 19-23.

@article{
author = { Malay B. Pramanik },
title = { Implementation of Cryptography Technique using Columnar Transposition },
journal = { Recent Trends in Information Security },
issue_date = { February 2014 },
volume = { RTINFOSEC },
number = { 1 },
month = { February },
year = { 2014 },
issn = 0975-8887,
pages = { 19-23 },
numpages = 5,
url = { /specialissues/rtinfosec/number1/15135-1411/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Recent Trends in Information Security
%A Malay B. Pramanik
%T Implementation of Cryptography Technique using Columnar Transposition
%J Recent Trends in Information Security
%@ 0975-8887
%V RTINFOSEC
%N 1
%P 19-23
%D 2014
%I International Journal of Computer Applications
Abstract

Cryptography is an art and science of converting original message into non-readable form. There are two techniques for converting data into non-readable form: 1) Transposition technique 2) Substitution technique. Transposition ciphers use the letters of the plaintext message, but they permute the order of the letters. Columnar Transposition involves writing the plaintext out in rows, and then reading the ciphertext off in columns. In this Cryptography there is use of three aspects of Columnar Transposition; Single Transposition using ROT-13 applicable to message of the Algorithm, Double Transposition using Caesar Cipher in second round of an Algorithm and Triple Transposition were it combine both the concept and use reverse of the message in second round of the Algorithm.

References
  1. R. I Salawu & S. O Adetona, "The Art and Science of Secured Communication", Institute of Security of Nigeria, Nigeria 2007
  2. James Irvine & David Harie, "Data Communications & Network: An Engineering Approach", John Wiley & Sons ltd. , 2002
  3. Brian J. Winkel, Cipher A. Deavours, David Kahn, and Louis Kruh "The German Enigma Cipher Machine: Beginnings, Success, and Ultimate Failure", Artech House, August 2005.
  4. Tyma Paul, "Software Development Secure", Start Newsletter, Feb 2003.
  5. Madsen Wayne, "An International Survey of Encryption Policy", 1998
  6. S. O Adetona, "Messages Secrecy in Electioneering environment", proceedings of Institute of Security, Nigeria,2009
  7. Stamper, David, "Essential of Data Communication", Saratoga Group
  8. Eric Maiwald, "Network Security a Beginner's Guide", Second Edition, McGraw Hill, Osborne, 2003.
  9. Ed Tittel, "Theory and Problems of Computer Networking", McGraw Hill, Osborne, 2002
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Substitution Transposition Rot-13 Caesar Cipher Columnar Transposition Shift Algorithm Cipher Text Plaintext Encryption Decryption.