Enhancing Resistance of Hill Cipher using Columnar and Myszkowski Transposition

Authors

  • Bhowmick A Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India
  • Geetha M Professor, Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal, India

Keywords:

Cryptography, Encryption, Modified Hill Cipher, Columnar Transposition, Myszkowski Transposition

Abstract

Researchers are regularly trying to figure out secure encryption algorithms so that the data transmitted over the computer networks are not intercepted by an unwanted entity.. The two methods to encrypt data are- Transposition and Substitution. Transposition refers to changing the position of characters in a given text. On the other hand, substitution is the process of replacing each character of the plaintext with some other character. One main concern area is to the existing encryption system to overcome the flaws in them.

References

Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi

Ayushi, “A Symmetric Key Cryptographic Algorithm”

International Journal of Computer Applications (0975

Volume 1 – No. 15

Atul Kahate, “Cryptography and Network Security”, 2nd Edition

Panduranga H T, Naveen Kumar S K. “Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012

Yuri Borissov and Moon Ho Lee.: Bounds on Key Appearance Equivocation for Substitution Ciphers. IEEE Transactions on Information Theory Vol. 53, No.6, pp. 2294-2296 (2007).

Malay B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition”, International Journal of Computer Applications (0975 – 8887) Second National Conference on Recent Trends in Information Security, GHRCE, Nagpur, India, Jan-2014

An article on Myszkowski Transposition: cryptospecs.googlecode.com/svn/trunk/classical/specs/myszkowski.pdf

Shahrokh Saeednia, “How to Make Hill cipher Secure,” Cryptologia 24:4, pp. 353-360, Oct 2000.

Chefranov, A. G., “Secure Hill Cipher Modification,” Proc. Of the First International Conference on Security of Information and Network (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, Elci, A., Ors, B., and Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-37, 2007.

P. L. Sharma, M. Rehan, “On Security of Hill Cipher using Finite Fields”, International Journal of Computer Applications (0975 – 8887) Volume 71– No.4, May 2013

Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara, “Variable-length Hill Cipher with MDS Key Matrix”, International Journal of Computer Applications (0975 – 8887) Volume 57– No.13, November 2012

Neha Sharma, Sachin Chirgaiya, “A Novel Approach to Hill Cipher”, International Journal of Computer Applications (0975 – 8887) Volume 108 – No. 11, December 2014

Gary C. Kessler, “An Overview of Cryptography 2014” - http://www.garykessler.net/library/crypto.html

Andrew S Tanenbaum, “Computer Networks”, 4th Edition

Downloads

Published

2015-02-28

How to Cite

[1]
A. Bhowmick and M. Geetha, “Enhancing Resistance of Hill Cipher using Columnar and Myszkowski Transposition”, Int. J. Comp. Sci. Eng., vol. 3, no. 2, pp. 20–25, Feb. 2015.

Issue

Section

Research Article