

Mixing Substitution and Transposition Method for Enhancing Security
Abstract
Cryptography is a way of converting the plaintext into the ciphertext. There are mainly two methods for that one is substitution technique and the other is transposition technique. Caesar cipher is the kind of substitution technique and it can be easily attacked so here we are combining it with the transposition technique to enhance the security. Here we will apply columnar transposition method on the Caesar cipher to enhance the security for a better and secure cipher.
Keywords
References
William Stalling ”Network Security Essentials”, Pearson Education,2004
AtulKahate, Cryptography and Network Security, 2nd edition, McGraw-Hill.
KashishGoyal, SupriyaKinger “Modified Caesar Cipher for Better SecurityEnhancement” http://research.ijcaonline.org/volume73/number3/pxc3889558.pdf
AnupamaMishrahttp://ijret.org/Volumes/V02/I09/IJRET_110209049.pdf “Enhancing security of caesar cipher using different methods”
Cryptography and network security chapter 2 fourth edition by William Stallings. http://web2.aabu.edu.jo/tool/course_file/lec_notes/901480_ch02.ppt
Part One: SymmetricCiphers http://www.scribd.com/doc/22243535/Part-One-Symmetric-Ciphers
Wikipedia http://en.wikipedia.org/wiki/Affine_cipher
SumanMor, Vinod Saroha, AnuragDagar “Enhancing security of caesar cipher by double columnar transposition method.”http://www.ijarcsse.com/docs/papers/10_October2012/Volume_2_issue_10_October2012/V2I10-0068.pdf
http://easyciphers.com/hippo
http://pastebin.com/ztabiqBt
http://www.scribd.com/doc/39601372/Substitution-Techniques
http://www.ti89.com/cryptotut/text/Caesar.doc
http://www.slideserve.com/frederica/cryptography-and-network-security-chapter-2
http://en.wikipedia.org/wiki/ Classical_cipher
http://www.needcodefor.com/php/caesar-cipher/
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.