A Review Paper on Cryptography and Plaintext Based Transposition Method

Authors

  • Priya Soni  Department of IT, SSGMCE, Shegaon, Buldhana, India
  • Ritu Hedau  Department of IT, SSGMCE, Shegaon, Buldhana, India

Keywords:

Cryptography, Encryption, Decryption, Plaintext, Cipher Text, Public Key Cryptography, Symmetric Cryptography Network Security, Transposition Technique.

Abstract

From last few years, the public is becoming dependent on computers and networks , so they are also interested in the security of these same computers and networks. Encryption algorithm provides the necessary protection against the data intruders’ attacks by converting information from its original form into an unreadable form. The majority of current web authentication is built on username/password. And the password replacement offers more security, but it is very much difficult to use and expensive to deploy. Security of data can be done by a technique called cryptography. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium ,which includes just about any network , particularly the Internet. At present, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against unauthorized access and to prevent the practice of spying. Cryptography is a developing technology, which is important for network security and computer security. Study on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. This paper talks about the cryptographic algorithm and Transposition technique.

References

  1. Plaintext Based Transposition Method by Prof. S. D. Padiya* Prof. D. N. Dakhane Sipna COET, Sipna COET, Amravati, India Amravati, India in International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 7, July 2012 ISSN: 2277 128X
  2. “Color Cryptography using Substitution method” by Manali Naik, Pushpanjali Tungare, Pooja Kamble, Shirish Sabnis in International Research Journal of Engineering and Technology (IRJET) Vol. V, No. 3, 2016?.
  3. “Cryptography: The Sciene of Secure Communication” by Jangala. Sasi Kiran M.Anusha, A.Vijaykumar, M.Kavya in IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.4, April 2016
  4. “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms” by Nivedita Bisht, Sapna Singh in International Journal of Innovative Research in Science, Engineering and Technology (An ISO 3297: 2007 Certified Organization) Vol. 4, Issue 3, March 2015
  5. William Stallings (2005), Cryptography and Netwotk security principles and practices, 4th edition.

Downloads

Published

2017-04-30

Issue

Section

Research Articles

How to Cite

[1]
Priya Soni, Ritu Hedau, " A Review Paper on Cryptography and Plaintext Based Transposition Method, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.910-916, March-April-2017.