Open Access Open Access  Restricted Access Subscription or Fee Access

Mixing Substitution and Transposition Method for Enhancing Security

Tanvi Tanvi


Cryptography is a way of converting the plaintext into the ciphertext. There are mainly two methods for that one is substitution technique and the other is transposition technique. Caesar cipher is the kind of substitution technique and it can be easily attacked so here we are combining it with the transposition technique to enhance the security. Here we will apply columnar transposition method on the Caesar cipher to enhance the security for a better and secure cipher.


Cryptography, Caesar Cipher, Substitution, Transposition.

Full Text:



William Stalling ”Network Security Essentials”, Pearson Education,2004

AtulKahate, Cryptography and Network Security, 2nd edition, McGraw-Hill.

KashishGoyal, SupriyaKinger “Modified Caesar Cipher for Better SecurityEnhancement”

AnupamaMishra “Enhancing security of caesar cipher using different methods”

Cryptography and network security chapter 2 fourth edition by William Stallings.

Part One: SymmetricCiphers


SumanMor, Vinod Saroha, AnuragDagar “Enhancing security of caesar cipher by double columnar transposition method.” Classical_cipher


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.