logo

Principle and Method in Cryptographic Security

   

Added on  2022-09-12

5 Pages1246 Words13 Views
Running head: PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
Principle and Method in Cryptographic Security
Name of the Student
Name of the University
Author Note

PRINCIPLE AND METHOD IN CRYPTOGRAPHIC SECURITY
1
Explanation of the Encryption Technique:
In this case for the encryption of the message, transposition technique has been utilized.
In the field of cryptography, the method of transposition cipher is a specific type of encryption
process in which specific positions held by the plaintext units are shifted specifically to regular
type of system (Krishna et al., 2016). Thus, the encrypted text or the cipher text consists
permutation of the plaintext that has been encrypted. It means, for the encryption process only
the order of the units are changed and for this reason this type of encryption process does not
provides so much of security. For this type of encryption process a bijetive type of function is
utilized on the position of the characters so that encryption can be done and an inverse function
is also implemented for the decryption process.
For particularly in this case two stage transposition or the double transposition has been
utilized. The double transposition is actually a simple column transposition which is executed
twice. This type of text transposition is quite safe when compared with the other type of
encryption process (Budiman & Rachmawati, 2018). The column transposition cipher is a
specific type of form of the transposition cipher. In this case, this type of transposition is
executed by writing the plain texts in the rows and then the cipher text is achieved off the
columns in one by one manner. In the following section this technique is described briefly.
The two stage transposition is consisting two applications of the column transposition.
Both of the applications can use a similar key for each of the applications or different types of
keys can be used. To execute this type of encryption first a key is chosen for the first column
transposition, In this case the message which need to be encrypted, need to be written under the
rows of key word (Priyam, 2015). After that numbering of the letters need to be done which are

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Types of Cipher Methods: Substitution, Vernam, Transposition, Book-Based Ciphers, and Cryptographic Hash Function
|6
|847
|247

Security in Computing and IT in PDF
|13
|2776
|33

Principle and Method in Cryptographic Security | Discussion
|4
|638
|19

Analysis of Router cipher algorithm
|7
|1355
|83

Rail Fence Cipher :.
|3
|454
|342

Security in computing and information technology
|9
|1672
|462