ABSTRACT:
In the present paper the author has suggested a symmetric key cryptographic system where two modern ciphers, namely XOR and Transposition Ciphers have been used. The cipher text thus obtained is hard to crack because a teraflop super computer may need upto 3400 Years to find all possible permutations even for a plain text consisting of 10 characters.
Cite this article:
Satish Garg. Cryptography Using Modern Ciphers (Xor and Transposition). Research Journal of Engineering and Technology. 2022; 13(3):86-0. doi: 10.52711/2321-581X.2022.00012
Cite(Electronic):
Satish Garg. Cryptography Using Modern Ciphers (Xor and Transposition). Research Journal of Engineering and Technology. 2022; 13(3):86-0. doi: 10.52711/2321-581X.2022.00012 Available on: https://ijersonline.org/AbstractView.aspx?PID=2022-13-3-4
REFERENCES
1. S. K. Garg, “Review of Secured Routing for Wireless Ad hoc Network”, International Journal of Computing and Business Research, 2 (1), 2011
2. S. K. Garg, “Wireless Network Security Threats”, International Journal of Information Dissemination and Technology, 1(2), 2011
3. W. Stallings, Cryptography and Network Security : Principles and Practices, 5th Edition 2005
4. T. Karygiannis and L. Owens, Wireless Communication, National Institute of Standard and Technology, U.S. Department of Computer (2001)
5. S. K. Garg, “Cryptography Using Controlled NOT Gate : Algorithm SKG 3.00”, International Journal of Electronics Engineering, 6 (1), 20-24, 2014
6. S. K. Garg, “Information Security By Interchanging Characters: Algorithm SKG 1.0”, International Journal of IT &Knowledge Management, 6 (2), 129-131, 2013
7. S. K. Garg, A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”, International Journal Electronics and Communication Engineering & Technology, 7 (1), 107-114, 2016
8. S. K. Garg, A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”, IPASJ International Journal of Electronics and Communication, 4(3), 1-5, 2016