Cryptography Using Transposition Cipher

In the present work the author has suggested a unique cryptographic method where bit level manipulation is done using transposition cipher. In this method, first by using Extended ASCII Code, input string of characters is converted into digital form then transposition cipher is applied on this strin...

Full description

Saved in:
Bibliographic Details
Published inResearch Journal of Science and Technology Vol. 9; no. 1; p. 48
Main Author Garg, Satish Kumar
Format Journal Article
LanguageEnglish
Published Raipur A&V Publications 2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In the present work the author has suggested a unique cryptographic method where bit level manipulation is done using transposition cipher. In this method, first by using Extended ASCII Code, input string of characters is converted into digital form then transposition cipher is applied on this string and finally by reverse of the Extended ASCII Code on this transposed string, bits are converted into characters. The proposed method can be applied to encrypt any data consisting of 10 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.
ISSN:0975-4393
2349-2988
DOI:10.5958/2349-2988.2017.00008.0