International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques

Jawad Ahmad Dar [5]


Abstract: Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. Achieving strong encryption, the hiding of datas meaning, also requires perceptive leaps that allow creative application of known or new methods. So cryptography is also an art. We can say now that Cryptography is the art of achieving security by encoding messages to make them non-readable. Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in its aspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. Cryptography is used to maintain the secrecy and integrity of information, Whenever it is exposed to potential attacks. Cryptography comes from the Greek words for secret writing. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two Techniques used for converting data into non-readable form. Rail Fence Cipher is an example of Transposition technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A double columnar transposition followed by a double substitution is applied on a Rail Fence cipher in order to make it a stronger and a more secure cipher


Keywords: Cryptography, Cryptanalysis, Substitution Technique, Transposition Technique, Hill Cipher, Key


Edition: Volume 3 Issue 9, September 2014,


Pages: 1787 - 1791


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Jawad Ahmad Dar, "Humanizing the Security of Rail Fence Cipher Using Double Transposition and Substitution Techniques", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 1787-1791, https://www.ijsr.net/get_abstract.php?paper_id=SEP14114

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top