Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Square transposition: an approach to the transposition process in block cipher

View through CrossRef
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Title: Square transposition: an approach to the transposition process in block cipher
Description:
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology.
The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values.
This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable.
This research designs a transposition algorithm called square transposition.
Each process uses square 8 × 8 as a place to insert and retrieve 64-bits.
The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition.
The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.

Related Results

Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we ...
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Block cipher merupakan salah satu teknik dalam kriptografi modern yang digunakan untuk melakukan enkripsi/dekripsi pada data digital dengan membagi pesan menjadi blok-blok data dan...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
The SPN (Substitution-Permutation Network) block cipher is one of the fundamental and important structures in the field of symmetric encryption, widely used in modern encryption al...
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption...
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Chaotic Encryption Scheme for Double Grayscale Images using Sprott B Hyperchaotic Map
Image encryption become more significant since most of our data are communicated and stored as digital image form. To warrant high confidentiality, cipher image must be the produce...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...

Back to Top