International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 09 Issue: 11 | Nov 2022
p-ISSN: 2395-0072
www.irjet.net
Text Encryption and Decryption Technique using Columnar Transposition and Substitution Shruti Gawas Student, Dept. of Electronics and Telecommunication Engineering, MKSSS’s Cummins College of Engineering for Women, Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - We live in an age of information technology and
protects transactions and communications, protects personally identifiable information (PII) and other sensitive data, authenticates identities, prevents document tampering, and protects servers from tampering, used to establish trust in Encryption is one of the primary tools organizations use to protect systems, including their most important assets (data), whether they are at rest or in motion. Encryption helps provide accountability, impartiality, accuracy, and confidentiality. Prevent e-commerce fraud and ensure the legitimacy of financial transactions. Protect your anonymity or prove your identity. In the future, as commerce and communications continue to move to computer networks, cryptography will become more and more vital.
high connectivity. Viruses, hackers, electronic wiretapping and fraud are inevitable. To be protected, information must be confidential, available, and maintain its integrity. The areas of computer security, data security, and information security design utilize software, hardware, and human resources to address this problem. Recognition of the importance of data security has led to the development of cryptography for practical, ready-to-use applications for enforcing network security. In this paper, I proposed a cipher that encrypts text using substitution, columnar transposition, and rail-fence transposition techniques of the basic encryption. Generation of random numbers and random words make the algorithm more difficult to crack. This eliminates the need for the user to define fixed keys, making the algorithm secure. It also facilitates sending the key to the receiver while appending it to the cipher texts at random locations.
2. SHORTCOMINGS OF THE PREVIOUS ALGORITHM
— Cipher, Cipher Text, Information Technology, Security, Encryption, Decryption, Plain Text, Random Number, Substitution, Columnar Transposition, Key.
Previous algorithm uses fixed key for encryption which is defined by the user itself. This can be easily decoded by the attacker.
The sequence of different encryption techniques is fixed which makes the decryption very easy for attacker once the key is known.
The algorithm uses user defined fixed letter range (e.g. A=1, B=2… Z=26).
The previous algorithm can only encrypt and decrypt capital letters which can be easily intruded.
The time complexity of previous algorithm depends on the user defined letter range.
Key Words:
1. INTRODUCTION The rise of hackers in our tech-dependent world is not just affecting individual consumers, but businesses and governments as well. With the need to properly organize information about every aspect of our lives, there is absolutely no time when safety can be considered secondary. Information security is a critical issue in today's world. Over the past three decades, computer networks have revolutionized the use of information. Information is currently distributed. Authorized individuals can send and retrieve information remotely over computer networks. While his three aforementioned requirements confidentiality, integrity, and availability - have not changed, there are now some new aspects. Not only do we need to keep information confidential, but we also need a way to maintain confidentiality when transferring information from one computer to another. The privacy challenge is using data while protecting individual privacy settings and personally identifiable information. From email to cellular communications, from secure web access to digital cash, encryption is an integral part of today's information systems. As the foundation of modern security systems, encryption
© 2022, IRJET
|
Impact Factor value: 7.529
3. MY CONTRIBUTION The algorithm proposed by me uses the key for encryption which is derived from the message itself. In contrary to this, the previous algorithm required the key to be defined by the user which could have been an overhead for the user. Once the text is encrypted using the key, it needs to be passed on to the receiver’s end to be used for decryption. This algorithm uses the concept of random number generation and random text generation in order to improvise the security. The random number generated decides the order of the encryption techniques that needs to be applied on the text. The algorithm uses simple substitution, rail fence
|
ISO 9001:2008 Certified Journal
|
Page 691