International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 120

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar


Abstract: Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. Achieving strong encryption, the hiding of datas meaning, also requires perceptive leaps that allow creative application of known or new methods. So cryptography is also an art. We can say now that Cryptography is the art of achieving security by encoding messages to make them non-readable. Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. Cryptography is used to maintain the secrecy and integrity of information, Whenever it is exposed to potential attacks. Cryptography comes from the Greek words for secret writing. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two Techniques used for converting data into non-readable form. Rail Fence Cipher is an example of Transposition technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A double columnar transposition followed by a double substitution is applied on a Rail Fence cipher in order to make it a stronger and a more secure cipher


Keywords: Cryptography, Cryptanalysis, Substitution Technique, Transposition Technique, Hill Cipher, Key


Edition: Volume 3 Issue 9, September 2014,


Pages: 1787 - 1791


How to Cite this Article?

Jawad Ahmad Dar, "Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SEP14114, Volume 3 Issue 9, September 2014, 1787 - 1791

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cryptography'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Cryptanalysis'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Similar Articles with Keyword 'Substitution Technique'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Similar Articles with Keyword 'Transposition Technique'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Similar Articles with Keyword 'Hill Cipher'

Downloads: 114

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 7, July 2016

Pages: 1149 - 1152

Three-Pass Protocol Concept in Hill Cipher Encryption Technique

Andysah Putera Utama Siahaan

Share this Article

Downloads: 137

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 35 - 39

Android Application for Encrypted Memo

S. Jaya Kumar, Ahitagnee Paul

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 119 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top