IDEAS home Printed from https://ideas.repec.org/a/icf/icfjcs/v6y2012i2p45-51.html
   My bibliography  Save this article

Analysis and Implementation of Transposition Techniques

Author

Listed:
  • Satish Bansal
  • Rajesh Srivastava

Abstract

This paper presents some of the transposition and symmetric-based techniques, where the key is not used separately because it is hidden in the message. Early classical ciphers—substitution and transposition operations—have formed the building blocks for today’s powerful ciphers such as the Data Encryption Standard (DES). But with the advent of the Internet, data privacy is facing more risks. Therefore, the need for information security increases, which leads to new developments in cryptography. One of the most important things is that all symmetric and asymmetric techniques are key-based, and this key is in any sequence or in any order to encrypt the plaintext. The major problem in symmetric key is the key exchange between the communication parties. Transposition is a simpler and more powerful technique than substitution because it not only substitutes the text, but also permutates the text. The new approach first develops three new transposition algorithms which are very simple than the other transposition ciphers. These transposition ciphers are then modified based on the symmetric key which reduces the overheads of the key exchange as the key is hidden in the message (Satish and Rajesh 2011a). The new transposition algorithms are helpful in generating symmetric key that can help in encryption and decryption processes. It can also be used in the field of education, banking, networking and other secret communication-related applications.

Suggested Citation

  • Satish Bansal & Rajesh Srivastava, 2012. "Analysis and Implementation of Transposition Techniques," The IUP Journal of Computer Sciences, IUP Publications, vol. 0(2), pages 45-51, April.
  • Handle: RePEc:icf:icfjcs:v:6:y:2012:i:2:p:45-51
    as

    Download full text from publisher

    To our knowledge, this item is not available for download. To find whether it is available, there are three options:
    1. Check below whether another version of this item is available online.
    2. Check on the provider's web page whether it is in fact available.
    3. Perform a search for a similarly titled item that would be available.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:icf:icfjcs:v:6:y:2012:i:2:p:45-51. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: G R K Murty (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.