International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. Achieving strong encryption, the hiding of datas meaning, also requires perceptive leaps that allow creative application of known or new methods. So cryptography is also an art. We can say now that Cryptography is the art of achieving security by encoding messages to make them non-readable. Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. Cryptography is used to maintain the secrecy and integrity of information, Whenever it is exposed to potential attacks. Cryptography comes from the Greek words for secret writing. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two Techniques used for converting data into non-readable form. Rail Fence Cipher is an example of Transposition technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A double columnar transposition followed by a double substitution is applied on a Rail Fence cipher in order to make it a stronger and a more secure cipher

Keywords: Cryptography, Cryptanalysis, Substitution Technique, Transposition Technique, Hill Cipher, Key

Edition: Volume 3 Issue 9, September 2014

Pages: 1787 - 1791


How to Cite this Article?

Jawad Ahmad Dar, "Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14114, Volume 3 Issue 9, September 2014, 1787 - 1791

27 PDF Views | 31 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article



Similar Articles with Keyword 'Cryptanalysis'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 402 - 406

Improving Speed Up of Computing Using New AES Algorithm

Shweta Kumari, Abhishek Kumar

Share this article



Similar Articles with Keyword 'Substitution Technique'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this article



Similar Articles with Keyword 'Transposition Technique'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1083 - 1088

A Novel Approach for Encryption of Text Messages, Enhancing the Security of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher, Under 15 Parameters

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1787 - 1791

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Share this article



Similar Articles with Keyword 'Hill Cipher'

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 7, July 2016

Pages: 1149 - 1152

Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1787 - 1791

Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 11, November 2015

Pages: 607 - 612

Classical Image Encryption and Decryption

Noor Dhia Kadhm Al-Shakarchy, Hiba Jabbar Al- Eqabie, Huda Fawzi Al- Shahad

Share this article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this article



Similar Articles with Keyword 'Key'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 1151 - 1153

Search Engine Optimization (SEO) Techniques

Kanika Arora

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 3086 - 3089

Deriving Concept Based User Profiles for Search Engine Personalization

Supriya Vinod Koratkar, Sheetal A. Takale

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this article
Top