Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher

View through CrossRef
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption performance. Method –Proposedadjustmentsincludeexpandingthegridto14x14,usingtableshuffling instead of random character insertion, and strategically inserting random special characters in odd-length plaintexts. Results –The algorithm demonstrated improved encryption, producing more random ciphertext sequences and successfully recovering original characters during decryption. Conclusion –The developed algorithm outperforms the current Two-Square Cipher, enhancing encryption security and adaptability to different plaintexts. Recommendations –Further enhance the algorithm to address specific issues such as character transformation, while maintaining the grid size at 14x14. Research Implications –Contributes to advancing cryptographic techniques, highlighting the importance of addressing vulnerabilities in existing ciphers to strengthen data security. Keywords –two-square cipher, columnar transposition, text encryption, cryptography, block and stream cipher
Title: An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
Description:
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption performance.
Method –Proposedadjustmentsincludeexpandingthegridto14x14,usingtableshuffling instead of random character insertion, and strategically inserting random special characters in odd-length plaintexts.
Results –The algorithm demonstrated improved encryption, producing more random ciphertext sequences and successfully recovering original characters during decryption.
Conclusion –The developed algorithm outperforms the current Two-Square Cipher, enhancing encryption security and adaptability to different plaintexts.
Recommendations –Further enhance the algorithm to address specific issues such as character transformation, while maintaining the grid size at 14x14.
Research Implications –Contributes to advancing cryptographic techniques, highlighting the importance of addressing vulnerabilities in existing ciphers to strengthen data security.
Keywords –two-square cipher, columnar transposition, text encryption, cryptography, block and stream cipher.

Related Results

Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED] Rhino XL Male Enhancement v1
[RETRACTED]Rhino XL Reviews, NY USA: Studies show that testosterone levels in males decrease constantly with growing age. There are also many other problems that males face due ...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Comparative Analysis of Encryption Algorithms
Comparative Analysis of Encryption Algorithms
Purpose: Encryption algorithm allows users to extend the assurance found in the physical world to the electronic world in the carrying out of our day-to-day activities. This resear...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
E-Press and Oppress
E-Press and Oppress
From elephants to ABBA fans, silicon to hormone, the following discussion uses a new research method to look at printed text, motion pictures and a te...
Location-Based Cryptographic Techniques for Data Protection
Location-Based Cryptographic Techniques for Data Protection
Data protection has become one of the significant issues in cloud computing when end users must rely on their cloud providers for security purposes. Cloud providers never guarantee...

Back to Top