International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 154

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015


A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++

Jawad Ahmad Dar, Amit Verma


Abstract: This paper is a step toward developing an encryption system which can encrypt any text message securely. An ad-hoc network generally consists of nodes, on which sensors are embedded to provide security measures. the main challenge of these sensors is to provide security of data and also to work effectively within a limitation of power and memory. In every important sector these networks are used to collect information or transfer them with a high level of security. For this reason here we require a strong encryption Technique. Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and transposition are techniques for encoding. When Caesar cipher substitution, Rail fence cipher and Columnar Transposition Cipher techniques are used individually, cipher text obtained is easy to crack. This talk will present a perspective on combination of techniques substitution and transposition. Combining Caesar cipher and rail fence with Columnar Transposition Cipher can eliminate their fundamental weakness and produce a cipher text that is hard to crack. Finally I have implemented this concept with the help of TURBO C++.


Keywords: Cryptography, Cipher text, Substitution, Transposition, Caesar Cipher, Columnar Transposition Cipher, cryptanalysis, key, C


Edition: Volume 4 Issue 4, April 2015,


Pages: 9 - 16


How to Cite this Article?

Jawad Ahmad Dar, Amit Verma, "A Novel Approach for Encryption of Text Messages, Analysis and Implementation of Simple Coloumnar Transposition Cipher with Ceasar Cipher and Rail Fence Cipher in C/C++", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB152822, Volume 4 Issue 4, April 2015, 9 - 16

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cryptography'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Cipher text'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article

Similar Articles with Keyword 'Substitution'

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Similar Articles with Keyword 'Transposition'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Similar Articles with Keyword 'Caesar Cipher'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Similar Articles with Keyword 'Columnar Transposition Cipher'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2415 - 2421

Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security

Jawad Ahmad Dar, Sandeep Sharma

Share this Article

Similar Articles with Keyword 'cryptanalysis'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this Article

Similar Articles with Keyword 'key'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Similar Articles with Keyword 'C'

Downloads: 176 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 145 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article
Top