Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Mixing Substitution and Transposition Method for Enhancing Security


Affiliations
1 BPSMV (Sonepat), India
     

   Subscribe/Renew Journal


Cryptography is a way of converting the plaintext into the ciphertext. There are mainly two methods for that one is substitution technique and the other is transposition technique. Caesar cipher is the kind of substitution technique and it can be easily attacked so here we are combining it with the transposition technique to enhance the security. Here we will apply columnar transposition method on the Caesar cipher to enhance the security for a better and secure cipher.

Keywords

Cryptography, Caesar Cipher, Substitution, Transposition.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 254

PDF Views: 2




  • Mixing Substitution and Transposition Method for Enhancing Security

Abstract Views: 254  |  PDF Views: 2

Authors

Tanvi
BPSMV (Sonepat), India

Abstract


Cryptography is a way of converting the plaintext into the ciphertext. There are mainly two methods for that one is substitution technique and the other is transposition technique. Caesar cipher is the kind of substitution technique and it can be easily attacked so here we are combining it with the transposition technique to enhance the security. Here we will apply columnar transposition method on the Caesar cipher to enhance the security for a better and secure cipher.

Keywords


Cryptography, Caesar Cipher, Substitution, Transposition.