{"title":"增强型柱转置技术算法","authors":"Amanpreet Kaur,, Leena Jain, Aanchal Madaan","doi":"10.37896/ymer21.08/74","DOIUrl":null,"url":null,"abstract":"Cryptography is a field to solve the problems related to Information Security. There are numerous techniques like substitution and transposition methods to convert the real message into secret code which will be tough for intruder to understand .These techniques change the position or substitute intelligible message characters to produce the ciphertext which is more secure to transfer as compare to plaintext. Columnar Technique is also such technique which changes the position of plaintext message characters and produces the ciphertext. In this research paper, improved columnar technique is presented which will produce more randomness in the ciphertext generated to make it difficult for cryptanalyst to predict the plaintext from it. Keywords: Cryptography, Information Security, Rail Fence Technique, Transposition Techniques, Enhanced Algorithm","PeriodicalId":23848,"journal":{"name":"YMER Digital","volume":"23 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Algorithm for Enhanced Columnar Transposition Technique\",\"authors\":\"Amanpreet Kaur,, Leena Jain, Aanchal Madaan\",\"doi\":\"10.37896/ymer21.08/74\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography is a field to solve the problems related to Information Security. There are numerous techniques like substitution and transposition methods to convert the real message into secret code which will be tough for intruder to understand .These techniques change the position or substitute intelligible message characters to produce the ciphertext which is more secure to transfer as compare to plaintext. Columnar Technique is also such technique which changes the position of plaintext message characters and produces the ciphertext. In this research paper, improved columnar technique is presented which will produce more randomness in the ciphertext generated to make it difficult for cryptanalyst to predict the plaintext from it. Keywords: Cryptography, Information Security, Rail Fence Technique, Transposition Techniques, Enhanced Algorithm\",\"PeriodicalId\":23848,\"journal\":{\"name\":\"YMER Digital\",\"volume\":\"23 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"YMER Digital\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.37896/ymer21.08/74\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"YMER Digital","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37896/ymer21.08/74","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Algorithm for Enhanced Columnar Transposition Technique
Cryptography is a field to solve the problems related to Information Security. There are numerous techniques like substitution and transposition methods to convert the real message into secret code which will be tough for intruder to understand .These techniques change the position or substitute intelligible message characters to produce the ciphertext which is more secure to transfer as compare to plaintext. Columnar Technique is also such technique which changes the position of plaintext message characters and produces the ciphertext. In this research paper, improved columnar technique is presented which will produce more randomness in the ciphertext generated to make it difficult for cryptanalyst to predict the plaintext from it. Keywords: Cryptography, Information Security, Rail Fence Technique, Transposition Techniques, Enhanced Algorithm