logo

Analysis of Router cipher algorithm

   

Added on  2023-01-18

7 Pages1355 Words83 Views
Running head: FUNDAMENTALS OF CYBER SECURITY
Fundamentals of Cyber Security
Name of the Student
Name of the University
Author Name
Analysis of Router cipher algorithm_1
1FUNDAMENTALS OF CYBER SECURITY
Table of Contents
Analysis of Router cipher algorithm................................................................................................2
Major application of route cipher....................................................................................................2
Strength and weakness of using Route cipher algorithm.................................................................4
Conclusion.......................................................................................................................................4
References........................................................................................................................................5
Analysis of Router cipher algorithm_2
2FUNDAMENTALS OF CYBER SECURITY
Analysis of Router cipher algorithm
The report aims at describing the route cipher algorithm. Route cipher method is known
as transposition cipher method that is used mainly for the purpose of encrypting the message.
The first step that is included in this is creating a grid of one dimension with the help of a secret
key and second comes encrypting the data by determining data size (Samid 2015). This report
will analyze the route cipher algorithm in details. In addition to this the strengths, weakness and
the application of this algorithm will also be described in the report. The data are being
transmitted from one place to another without being tampered by any unauthorized person. Route
cipher algorithm comes under transposition cipher. In transposition cipher method the texts are
encrypted by determining the position of plain texts. The plain text position gets shifted from
regular system and ensures a better functioning of the cipher.
Major application of route cipher
1. Route cipher has great use in historical period and was used by Union forces during
American civil war. The algorithm helped in moving whole words around instead of
transposing letters. However it is observed that there were some words that were not
protected in this way and they were further encoded with the use of codeword (Pachghare
2015).
2. Another major application of route cipher is that it ensures better way of encrypting data.
In order to perform the encryption with the use of router cipher algorithm there is no need
of additional requirement. The encryption of text using route cipher is done using laces.
Encryption is a method that is used for conversion of data into a different form that is
Analysis of Router cipher algorithm_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Principle and Method in Cryptographic Security
|5
|1246
|13

Types of Cipher Methods: Substitution, Vernam, Transposition, Book-Based Ciphers, and Cryptographic Hash Function
|6
|847
|247

Analysis of Ciphers Techniques
|14
|2343
|240

Encryption Techniques Assignment 2022
|9
|2287
|7

Rail Fence Cipher :.
|3
|454
|342

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19