Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cryptography Using Transposition Cipher


Affiliations
1 Govt. P G College Ambala, Cantt. - 133001, India
     

   Subscribe/Renew Journal


In the present work the author has suggested a unique cryptographic method where bit level manipulation is done using transposition cipher. In this method, first by using Extended ASCII Code, input string of characters is converted into digital form then transposition cipher is applied on this string and finally by reverse of the Extended ASCII Code on this transposed string, bits are converted into characters. The proposed method can be applied to encrypt any data consisting of 10 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.

Keywords

Encryption, Decryption, Transposition Cipher.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 247

PDF Views: 1




  • Cryptography Using Transposition Cipher

Abstract Views: 247  |  PDF Views: 1

Authors

Satish Kumar Garg
Govt. P G College Ambala, Cantt. - 133001, India

Abstract


In the present work the author has suggested a unique cryptographic method where bit level manipulation is done using transposition cipher. In this method, first by using Extended ASCII Code, input string of characters is converted into digital form then transposition cipher is applied on this string and finally by reverse of the Extended ASCII Code on this transposed string, bits are converted into characters. The proposed method can be applied to encrypt any data consisting of 10 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.

Keywords


Encryption, Decryption, Transposition Cipher.