An Approach of Hybrid Transposition Method based on ASCII value in Cryptography

Vishal Thakor, Papri Ghosh, Pravin Bhathawala

Research output: Contribution to journalArticlepeer-review

Abstract

Everyday millions ofpeople interact electronically through different computer applications such as e-mail, e-commerce websites, ATM machines, or different mobile device applications and uses Internet either directly or indirectly to transfer the data over the networks. With perpetual growth of Internet usage, the demand for data security while transferring and storing the data has increased. This has further led to increase the importance of cryptography and its various technics for security reasons.In this paper, a hybrid cryptography method is proposed which uses both substitution and transposition technics to secure the plain text. The proposed method first applies substitution with the help of three different keys followed by transposition using forth key consist of matrix size on equivalent ASCII values of plaintext. The forte of the method is its all four keys. Within the same manner decryption will be done at receiver's facet but in reverse way of encryption.
Original languageEnglish
Pages (from-to)104-107
Number of pages4
JournalInternational Journal of Advance Computational Engineering and Networking (IJACEN)
Volume5
Issue number7
Publication statusPublished - 31 Jul 2017

Fingerprint

Dive into the research topics of 'An Approach of Hybrid Transposition Method based on ASCII value in Cryptography'. Together they form a unique fingerprint.

Cite this