A Novel Key-Based Transposition Scheme for Text Encryption

Sidra Malik
{"title":"A Novel Key-Based Transposition Scheme for Text Encryption","authors":"Sidra Malik","doi":"10.1109/FIT.2011.44","DOIUrl":null,"url":null,"abstract":"Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT.2011.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种新的基于密钥的文本加密换位方案
本文设计了一种分组密码,它采用了经典的替换方案和一种新的转置方案。所提出的置换方案完全依赖于密钥,并通过替换和置换都依赖于密钥来实现安全性。设计是迭代的,可以扩展到许多回合。它的优点包括不受频率分析的影响,并且在许多方面依赖于原始密钥。弱点包括由于弱密钥调度导致的相关密钥攻击的可能性。本文完成了一个基于文本的实现,并通过实例说明了工作原理。在MATLAB中实现。本文还提出了进一步使这一想法更加实用的方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Quantifying Non-functional Requirements in Service Oriented Development Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises Development of an Optical Sensor for the Detection of Volatile Organic Compounds Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNET Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1