You are on page 1of 9

SUMMARY

In network communication system, security is playing most important role. So,


for security purpose we are using Cryptography techniques in network
communication & Internet. Cryptography is the science by which a readable
message (Plain text) will be converting into non-readable message (Cipher text).
Substitution and Transposition are two classical methods of Cryptography. This
paper discusses about earlier developed few Transposition techniques and a
technique by which encryption & decryption of plaintext which is „NEWSO
Transposition Method‟. This technique is the combination of prime with reverse
& clockwise rotation with directions. This paper basically describes
transposition method because transposition method is the combination of
confusion & diffusion.

In today‟s world, the modern era is dominated by paperless transactions in


business, private or government offices by means of use of e-mail messages, e-
cash transactions etc. Due to this there is a great need of protection or security.
This type of security is known as computer security. To protect sensitive text
information from unauthorized access cryptography techniques are used.

Cryptography or Cryptology, from Greek words kryptos (hidden or secret) and


graphein (writing or study) respectively, is the practice and study of techniques
to protect communication in the presence of third party. Cryptography is often
called “code making”.

Various techniques researched in this era to encrypt and decrypt the secret
codes. In World War II, cryptography and cryptanalysis became with
mathematically expressions.

The military units, government organizations and some corporate houses used
the applications of cryptography. The cryptography used to protect their secret
from others. Now days the cryptography takes most important place in
communication systems in network security and the Kamasutra cipher is one of
the earliest known substitution methods. It is described in the Kamasutra around
400 BC. The purpose was to teach women how to hide secret messages from
prying eyes. The technique involves randomly pairing letters of the alphabet,
and then substituting each letter in the original message with its partner.

“Cryptography is the science of using mathematics to encrypt and decrypt data.”


is the statement of Phil Zimmermann about the cryptography.

“Cryptography is the art and science of keeping message secure.” is the opinion
of Bruce Schneier about cryptography.

The main goal of cryptography is to hide data or information from third party or
unauthorized person. Cryptography was used to secure communication by
military leaders, spies and diplomats. But in this time the cryptography has
become more mathematical and it gives more security day-to-day.

This is the era of modern cryptography to secure communication, data and


storage area. There are mainly two most using of cryptography or practically
used in our daily life i.e. Whats App, ATM and HTTP. The brief descriptions of
both are given below.

Whats App:

Mobile is very important to us. Just like that Whats App is also most popular
mobile messaging software. Whats app is available for different platforms such
as iPhone, Android and windows phone. “End-to-end” encryption is used for
conversations and free calls in the latest version of „Whats app‟. Voice calling,
video calling and group messaging are provides for the users. It is also used in
computer by Whats app web application.
An ATM provides a simple, secure service where authorized cardholders can
withdraw cash and perform other banking transactions without visiting a bank
branch.

ATM‟s originally used a mathematical formula known as the Data Encryption


Standard (DES), to encrypt personal identification number (PIN). DES encrypts
data in 64-bit blocks using a 56-bit encryption key. The DES is insecure for
ATM applications. All new ATM installed since 2002 were required to employ
triple DES encryption. Advance Encryption Standard (AES) intended to replace
DES. The only way for an unauthorized person to decrypt data encrypted with
AES is brute force attack, so AES is significantly more secure than DES or
triple DES.

It is a protocol for communicating on the internet. HTTP is a stateless protocol


since the server forgets the client once the transaction is over. For the server and
client to engage in a secure conversation, an SSL certificate needs to be created
and verified by the Certificate Authority (CA). So, HTTPS implemented by
SSL (Secure Socket Layer). SSL is one practical application of cryptography
that makes use of both symmetric and asymmetric encryption. The browser next
indicates that it would like to start a conversation with a secure server. The
server sends its SSL certificate along with the server‟s asymmetric public key.
If the browser trusts the certificate, it encrypts the just created symmetric
session key with the server‟s asymmetric public key and sends it back to the
server.

The classic cryptography manipulates characters, letters and digits directly. It


requires the entire cryptosystem for communicating confidentially. The
algorithms used for encryption were kept secret and only the sender and
receiver knew about them. The classic cryptography is divided in two, which
are substitution and transposition methods.
In Substitution cryptography the units (single letter, pair of letters and triplet of
letters or mixture of all) of plaintext are replaced with another letter, symbol,
number or units. The receiver decrypts the encrypted message by performing
the inverse substitution technique. There are many type of such techniques i.e.
Caeser Cipher, Mono-alphabetic Cipher, Playfair Cipher, Hill Cipher etc.

Before discussing more about cryptography and transposition method, the


knowledge about attacks on cryptography is necessary to understand and well
known that how the unauthorized person can interrupt the communication
system and network security.

On the basis of action performed by the attacker, there are two attacks which are
passive and active attacks.

The Transposition technique performs some permutation over the plain text
alphabets that mean the rearrangement of letters in plain text according a rule
can make plain text message to cipher text and the receiver decrypt the message
by performing the inverse process in cipher text or in some regular pattern the
plain text characters are shifted to form cipher text. It is called as Transposition
Cipher. It creates more confusion in mind by which the cryptanalysis takes too
much time for decryption of cipher text.

The passive attack means that the unauthorized access of the information
without any interruption in communication channel and information. The sender
and receiver will be continuing with their communication but the attacker
stealing all the data at that time. It will be unbelievable and hard to recognize
also. The working process of passive attack is given below-

For decryption, the size of grid and the route used is necessary. The Route
Cipher is easy to use to jumble up a message very quickly. It has some problems
depending on what route you pick as you can end up with large chunks of
plaintext in the right order within the cipher text which gives away a lot about
the width of the grid and route used. Careful selection of the route is important.
However, for a suitably lengthy message, there are potentially infinitely many
different routes that could be taken through the grid. It is limited only by
imagination and ease of communication of the route.

An historical use of the Route Cipher was the Union Route Cipher used by the
Union forces during the American Civil War. Rather than transposing letters by
the given route, it moved whole words around. Some words, of vital importance
were not protected in this way, so they were first encoded using a codeword.
Sometimes, the cipher would even add whole null words to the cipher text,
often making the message humorous.

The requirement of data security has undergone changes in the last several
decades. The encryption at the sending end and decryption at the receiving end
of the communication system always used a secure communication system, for
which many methods have been developed to provide data security. So,
Cryptography is playing most important role in whole infrastructure of
communication system or network security. The Cryptography is an interesting
scientific topic to researched and discover more methods of it. Cryptography is
used to secure transmission of text message. The original message transferred
from sender to receiver in a secure environment. Transposition method is one of
cryptography which provides the security to data communication.

The Transposition technique performs some permutation over the plain text
alphabets that mean the rearrangement of letters in plain text according a rule
can make plain text message to cipher text and the receiver decrypt the message
by performing the inverse process in cipher text or in some regular pattern the
plain text characters are shifted to form cipher text. It is called as Transposition
Cipher. It creates more confusion in mind by which the cryptanalysis takes too
much time for decryption of cipher text.

For decryption, the size of grid and the route used is necessary. The Route
Cipher is easy to use to jumble up a message very quickly. It has some problems
depending on what route you pick as you can end up with large chunks of
plaintext in the right order within the cipher text which gives away a lot about
the width of the grid and route used. Careful selection of the route is important.
However, for a suitably lengthy message, there are potentially infinitely many
different routes that could be taken through the grid. It is limited only by
imagination and ease of communication of the route.

An historical use of the Route Cipher was the Union Route Cipher used by the
Union forces during the American Civil War. Rather than transposing letters by
the given route, it moved whole words around. Some words, of vital importance
were not protected in this way, so they were first encoded using a codeword.
Sometimes, the cipher would even add whole null words to the cipher text,
often making the message humorous.

This thesis addresses the security problem of providing fundamental


cryptographic mechanisms for the implementation of a secure communication
infrastructure- a communication infrastructure that can provide strong security
to user. To this aim, a cryptographic schemes need to be researched and
developed. This includes the protection of information leakage through third
party.

After reviewing the various literature reviews and the base thesis, it has been
found that the ‘Zigzag Ciphers: A Novel Transposition Method’, in this thesis
the author proposed two methods rail fence and Columnar transposition. It
describes only n*n matrix (square matrix)
i.e. 5*5 and 7*7 matrix. If we want 5*4 or 7*6 matrix then there is no solution
for it. It is implemented using vb.net. The author has proposed symmetric key
transposition algorithm because in this algorithm there will be no any need of
remembering n number of public keys just like asymmetric key cryptographic
algorithm.

During result analysis proposed work has run on number of various size of text
secret information and captured overall performance on predefined parameters
which is algorithm security. There is keyless method on which researchers have
performed their experiments. Here Table I has contents text, on which security
is applied.

Cryptography is a worldwide area of research, where most of the IT and CS


infrastructure is moving to make their service and delivery more efficient.
Cryptography makes it more scalable, more reliable, secure and accessible with
plenty of option to perform its best. With recent technological advancements,
cryptography has begun to permeate all facets of everyday life. Everything from
daily routine to banking relies heavily on cryptography to keep information safe
and secure.

The working method of this attack is given in name. Man in Middle attack
means that the hacker exchanges the key to sender and receiver but they will be
aware of this type of attack. They think that they are communicating with each
other but the hacker will do his work silently at the time of when they send
requests to each other and now he knows all communication. There will be
more confusion between sender and receiver.

The dictionary attack is a simplest method of attack if the attacker has been
successful to find out the dictionary of cipher text, then the attacker find out the
plaintext very easily way. Because in this type of attack, the cipherer creates a
dictionary in which there will be cipher text corresponding their plaintext.

This thesis addresses the security problem of providing fundamental


cryptographic mechanisms for the implementation of a secure communication
infrastructure- a communication infrastructure that can provide strong security
to user. To this aim, a cryptographic schemes need to be researched and
developed. This includes the protection of information leakage through third
party or unauthorized person.

After reviewing the various literature reviews and the base thesis, it has been
found that the ‘Zigzag Ciphers: A Novel Transposition Method’, in this thesis
the author proposed two methods rail fence and Columnar transposition. It
describes only n*n matrix (square matrix)

i.e. 5*5 and 7*7 matrix. If we want 5*4 or 7*6 matrix then there is no solution
for it. It is implemented using vb.net. Therefore to overcome this problem, the
NEWSO transposition method has been discovered.

The previous work related to transposition method of cryptography focuses on


the data security with the help of multiple uses of rail fence cipher and columnar
transposition cipher also. The combination of rail fence and columnar
transposition cipher generate a cipher text which is more secure. The results of
experiment showed that it gives security to data by entering the key which is
generated in some order and the zigzag cipher is done in row wise or column
wise manner. The zigzag cipher describes only n*n matrix i.e. 5*5 and 7*7
matrix. If we want 5*4 or 7*6 matrix then there will be problem created to
generate the key and with rail fence method also, which effects security and
space complexity also.
The transposition method of cryptography generates confusion as well as
diffusion also which is a powerful technique to distract the mind of
cryptanalyst. Thus, in this paper with the use of direction orientation as well as
reverse process gives the data more security and a method of transposition
cryptography. Several methods have been studied in this paper about data
encryption and decryption of cryptography and also to obtain the highest
security. The proposed work provides better security because it takes more time
in encryption and decryption.

“Engineering post graduates are highly competent with their technical skills, but
they lack the practical/research exposure, when they first step in to the industry”
– this is a very common phrase within the industry. The primary objective of
Dissertation is to overcome such problems faced by a post graduates.

You might also like