Enhancing Resistance of Hill Cipher using Columnar and Myszkowski Transposition
Keywords:
Cryptography, Encryption, Modified Hill Cipher, Columnar Transposition, Myszkowski TranspositionAbstract
Researchers are regularly trying to figure out secure encryption algorithms so that the data transmitted over the computer networks are not intercepted by an unwanted entity.. The two methods to encrypt data are- Transposition and Substitution. Transposition refers to changing the position of characters in a given text. On the other hand, substitution is the process of replacing each character of the plaintext with some other character. One main concern area is to the existing encryption system to overcome the flaws in them.
References
Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi
Ayushi, “A Symmetric Key Cryptographic Algorithm”
International Journal of Computer Applications (0975
Volume 1 – No. 15
Atul Kahate, “Cryptography and Network Security”, 2nd Edition
Panduranga H T, Naveen Kumar S K. “Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012
Yuri Borissov and Moon Ho Lee.: Bounds on Key Appearance Equivocation for Substitution Ciphers. IEEE Transactions on Information Theory Vol. 53, No.6, pp. 2294-2296 (2007).
Malay B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition”, International Journal of Computer Applications (0975 – 8887) Second National Conference on Recent Trends in Information Security, GHRCE, Nagpur, India, Jan-2014
An article on Myszkowski Transposition: cryptospecs.googlecode.com/svn/trunk/classical/specs/myszkowski.pdf
Shahrokh Saeednia, “How to Make Hill cipher Secure,” Cryptologia 24:4, pp. 353-360, Oct 2000.
Chefranov, A. G., “Secure Hill Cipher Modification,” Proc. Of the First International Conference on Security of Information and Network (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, Elci, A., Ors, B., and Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-37, 2007.
P. L. Sharma, M. Rehan, “On Security of Hill Cipher using Finite Fields”, International Journal of Computer Applications (0975 – 8887) Volume 71– No.4, May 2013
Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara, “Variable-length Hill Cipher with MDS Key Matrix”, International Journal of Computer Applications (0975 – 8887) Volume 57– No.13, November 2012
Neha Sharma, Sachin Chirgaiya, “A Novel Approach to Hill Cipher”, International Journal of Computer Applications (0975 – 8887) Volume 108 – No. 11, December 2014
Gary C. Kessler, “An Overview of Cryptography 2014” - http://www.garykessler.net/library/crypto.html
Andrew S Tanenbaum, “Computer Networks”, 4th Edition
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
