Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of Information Security System with Proposed Substitution Cipher Model using Cryptography Tools and Methods

R. Venkateswaran, Dr.V. Sundaram

Abstract


This paper shows the possibility of exploiting the features of substitutions cipher with ASCII values of the given text and then applying conversion, transposition and shows some unreadable form. In substitution ciphers the plaintext letters are enciphered differently depending upon their placement in the text. As the name polyalphabetic suggests this is achieved by using several two, three keys and random keys combinations instead of just one, as is the case in most of the simpler crypto systems. Using two keys, we take 2 keys e1, e2 and let the ASCII values of e1 be 1 and e2 be 2 and take the text, add ASCII values of e1 to first character and ASCII values of e2 to second character. Alternatively add the value of e1 and e2 to consecutive characters. Here we introduced security layer that is user can select their security level based on their communication over Internet.

Keywords


Encryption, Decryption, Genetic Keys, Mono Substitution, Poly Substitution, Ciphers.

Full Text:

PDF

References


Sujith Ravi, Kevin Knight,’ Attacking Letter Substitution Ciphers with Integer Programming', Oct 2009, 33, 4; Proquest Science Journals Pg.321

A K Verma, Mauyank Dave and R.C Joshi,'Genetic Algorithm and Tabu Search Attack on the Mono Alphabetic Substitution Cipher in Adhoc Networks; Journal of Computer Science 3(3): 134-137, 2007

Diaa Salama Abd Elminaam).” Evaluating The Performance of Symmetric Encryption Algorithms”, International Journal of Network Security, Vol.10, No.3, PP.216–222, May 2010, Pg. 216

Aleksey Gorodilov, Vladimir Morozenko,” genetic algorithm for finding the key’s length and cryptanalysis of the permutation cipher”, International Journal "Information Theories & applications" Vol.15 / 2008.

William stallings, “Cryptograph and network security principles and practices”, Published by Prentice hall, 2010 (Fourth Edition)

Nalani N, G. Raghavendra Rao, “Cryptoanalysis of Simplified data encryption standard via optimization heuristics” , International Journal of Computer Science and Network security, Vol 6, IB, Jan 2006

Udaya kumar S, “A Block cipher based upon permutation, substitution, Iteration”, Journal of Information privacy & security;2007;3,1;Pg : 47

Sean Simmons,”Algebraic Cryptanalysis of simplified AES*”, ProQuest Science Journal, Cryptologia, October 2009; 33, 4, Pg. 305.

Darrell Whitley,'A Genetic Algorthm Tutorial', Computer Science Department, Colorado State University, Fort Collins, CO 80523.

Rafeel Pass, Abhi Shelat “A course in Crytography – Lecturer Notes”, 2007.

B. Raja Rao, “A novel information security scheme using cryptic_ steganography, Indian journal of computer science and engineering, Vol 1,No. 4 pg: 327-332


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.