Open Access   Article Go Back

Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition

Anirban Bhowmick1 , Geetha M2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-2 , Page no. 20-27, Feb-2015

Online published on Feb 28, 2015

Copyright © Anirban Bhowmick , Geetha M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anirban Bhowmick , Geetha M, “Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.20-27, 2015.

MLA Style Citation: Anirban Bhowmick , Geetha M "Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition." International Journal of Computer Sciences and Engineering 3.2 (2015): 20-27.

APA Style Citation: Anirban Bhowmick , Geetha M, (2015). Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition. International Journal of Computer Sciences and Engineering, 3(2), 20-27.

BibTex Style Citation:
@article{Bhowmick_2015,
author = {Anirban Bhowmick , Geetha M},
title = {Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2015},
volume = {3},
Issue = {2},
month = {2},
year = {2015},
issn = {2347-2693},
pages = {20-27},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=396},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=396
TI - Enhancing Resistance of Hill Cipher Using Columnar and Myszkowski Transposition
T2 - International Journal of Computer Sciences and Engineering
AU - Anirban Bhowmick , Geetha M
PY - 2015
DA - 2015/02/28
PB - IJCSE, Indore, INDIA
SP - 20-27
IS - 2
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2939 2635 downloads 2556 downloads
  
  
           

Abstract

Researchers are regularly trying to figure out secure encryption algorithms so that the data transmitted over the computer networks are not intercepted by an unwanted entity. The two methods to encrypt data are Transposition and Substitution. Transposition refers to changing the position of characters in a given text. On the other hand, substitution is the process of replacing each character in the plaintext with some other character. One main concern area for researches is to analyze the existing encryption systems and overcome the flaws in them. In this paper, emphasis is paid on the enhancement of hill cipher algorithm. This algorithm uses simple substitution for encryption. The resistance of this algorithm is improved by introducing columnar and Myszkowski transpositions.

Key-Words / Index Term

Cryptography, Encryption, Modified Hill Cipher, Columnar Transposition, Myszkowski Transposition

References

[1] Behrouz A. Forouzan, “Cryptography and Network Security” special Indian Edition 2007, Tata McGraw- Hill Publishing Company Limited, New Delhi
[2] Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications (0975 8887) Volume 1 – No. 15
[3] Atul Kahate, “Cryptography and Network Security”, 2nd Edition
[4] Panduranga H T, Naveen Kumar S K. “Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012
[5] Yuri Borissov and Moon Ho Lee.: Bounds on Key Appearance Equivocation for Substitution Ciphers. IEEE Transactions on Information Theory Vol. 53, No.6, pp. 2294-2296 (2007).
[6] Malay B. Pramanik, “Implementation of Cryptography Technique using Columnar Transposition”, International Journal of Computer Applications (0975 – 8887) Second National Conference on Recent Trends in Information Security, GHRCE, Nagpur, India, Jan-2014
[7] An article on Myszkowski Transposition: cryptospecs.googlecode.com/svn/trunk/classical/specs/myszkowski.pdf
[8] Shahrokh Saeednia, “How to Make Hill cipher Secure,” Cryptologia 24:4, pp. 353-360, Oct 2000.
[9] Chefranov, A. G., “Secure Hill Cipher Modification,” Proc. Of the First International Conference on Security of Information and Network (SIN2007) 7-10 May 2007, Gazimagusa (TRNC) North Cyprus, Elci, A., Ors, B., and Preneel, B (Eds) Trafford Publishing, Canada, 2008: pp 34-37, 2007.
[10] P. L. Sharma, M. Rehan, “On Security of Hill Cipher using Finite Fields”, International Journal of Computer Applications (0975 – 8887) Volume 71– No.4, May 2013
[11] Kondwani Magamba, Solomon Kadaleka, Ansley Kasambara, “Variable-length Hill Cipher with MDS Key Matrix”, International Journal of Computer Applications (0975 – 8887) Volume 57– No.13, November 2012
[12] Neha Sharma, Sachin Chirgaiya, “A Novel Approach to Hill Cipher”, International Journal of Computer Applications (0975 – 8887) Volume 108 – No. 11, December 2014
[13] Gary C. Kessler, “An Overview of Cryptography 2014” - http://www.garykessler.net/library/crypto.html
[14] Andrew S Tanenbaum, “Computer Networks”, 4th Edition