Encryption and Decryption Technique for Message Communication (original) (raw)
Related papers
Text Encryption and Decryption Technique using Columnar Transposition and Substitution
IRJET, 2022
We live in an age of information technology and high connectivity. Viruses, hackers, electronic wiretapping and fraud are inevitable. To be protected, information must be confidential, available, and maintain its integrity. The areas of computer security, data security, and information security design utilize software, hardware, and human resources to address this problem. Recognition of the importance of data security has led to the development of cryptography for practical, ready-to-use applications for enforcing network security. In this paper, I proposed a cipher that encrypts text using substitution, columnar transposition, and rail-fence transposition techniques of the basic encryption. Generation of random numbers and random words make the algorithm more difficult to crack. This eliminates the need for the user to define fixed keys, making the algorithm secure. It also facilitates sending the key to the receiver while appending it to the cipher texts at random locations.
Evaluative Study on Substitution and Transposition Ciphers
2018
With fast development over generations, encryption is one of the most trusted approaches for data protection and privacy. Data encryption strategies are meticulously applied in such a way that the original information is recovered easily using a key, referred to as decryption. Encryption can be implemented using techniques like substitution, permutation or by some mathematical operations. By applying any one of these, a cipher text thus generated goes beyond human comprehension and readability. This paper, provides a basic overview of five different substitution and transposition encryption techniques and an analysis of these algorithms based on the effectiveness of each algorithm with regard to the efficiency parameters like encryption time, decryption time, memory utilization and the avalanche effect. All the algorithms are tested using Java 2 Platform Standard Edition Development Kit 5.0. Index Terms – Cryptography, Symmetric Key Encryption, Substitution Ciphers, Transposition Ci...
A Review Paper on Cryptography and Plaintext Based Transposition Method
From last few years, the public is becoming dependent on computers and networks , so they are also interested in the security of these same computers and networks. Encryption algorithm provides the necessary protection against the data intruders’ attacks by converting information from its original form into an unreadable form. The majority of current web authentication is built on username/password. And the password replacement offers more security, but it is very much difficult to use and expensive to deploy. Security of data can be done by a technique called cryptography. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium ,which includes just about any network , particularly the Internet. At present, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against unauthorized access and to prevent the practice of spying. Cryptography is a developing technology, which is important for network security and computer security. Study on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. This paper talks about the cryptographic algorithm and Transposition technique.
An Encryption Algorithm for Secure Data Transmission
International Journal of Computer Applications, 2012
Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.
Modern computing is observed to be highly dependent on communication and data transport. The security of data during communication has become a mandatory need since the introduction of e-commerce, mails, etc. Moreover a lot of data may be required to be kept secure on local devices also. The encryption of data is the basic requirement today and thus helps to maintain confidentiality of data. A number of algorithms are available for encrypting data while it is transferred from sender to receiver. In this paper we have proposed a cipher which uses basic encryption techniques of substitution and transposition along with application of logic gates, in order to encrypt the data. The algorithm makes cryptanalysis even more difficult because of the use of "Random Number Generator" function which further decides order of encryption rounds and keys to be used to encrypt the plain text. This eliminates the overhead of defining a fixed key by the user and makes algorithm secure also. It also facilitates to transfer the key to the receiver while being added with the plain text at random locations (like added at end or beginning).
Analysis and Review of Encryption and Decryption for Secure Communication
2014
The Process of Encryption and Decryption is performed by using Symmetric key cryptography and public key cryptography for Secure Communication. In this paper, we studied that how the process of Encryption and Decryption is perform in case of Symmetric key and public key cryptography using AES and DES algorithms and modified RSA algorithm.
Encryption and Decryption Technique using Multiple Symmetric Algorithm
2016
This paper proposes the new algorithm for encrypting the plain text into the cipher text. In this algorithm we combine different symmetric algorithm into one algorithm with little change in those algorithm. All the traditional algorithm are very week and cryptanalysis easily cracked the cipher text and convert that cipher text into the plain text. In this encryption algorithm, a new concept of substitution technique i.e. Caesar Cipher & Hill Cipher are combine along with the transposition technique i.e. Rail fence technique are used to make more secure and stronger algorithm. The plain texts are encrypted in such a way, so that it will difficult for cryptanalyst to crack it. The proposed algorithm is divided into three Phases. In the first phase the plain text is Encrypted using Substitution technique called Caesar Cipher, In the Second phase the first encrypted text are applied for Second Substitution technique i.e. Hill cipher. In the Third phase the Transposition Technique i.e. R...
Encryption techniques-Study & Comparison
International Journal of Science Technology & Engineering
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is which technique should be used to provide secure transmission. This paper provides an analysis of various encryption algorithms i.e. AES, DES, 3DES, Blowfish, RC4, RC6. The Comparison is also provided.
Analysis of Modified Substitution Encryption Techniques
In this paper we present some new approach for security enhancement of well known classical substitution cipher (Playfair and Hill cipher). Some drawback inherent the 5x5 Playfair cipher which adversely affect the security of this cipher and also Hill Cipher that succumbs to the known-plaintext attack .It is clear from above line due to some serious security reasons we cannot use these well known encryption techniques in practical life . This paper aim is to focus on modification that can enhance the security level of these classical encryption techniques so these can resist for different cryptanalysis attacks.
A Study of Encryption Algorithms
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.