期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2013
卷号:3
期号:11
出版社:S.S. Mishra
摘要:There are many security aspects in data communication, while transferring data in a distributed network. Encryp tion is also a way to provide security in data communication using a key. Several techniques are already introduced for encryption as well as decryption. Some of them do not provide so much security as required, but many techniques are very useful and can be implement to be made more secure our data. Brute force attack is the most common attack, which makes a threat in data communication and cryptanalysis also make easy to break the code. In this paper, we have discussed several substitution and transposition encryption techniques as well as decryption of them also discussed. Substitution techniques are Caesar cipher, monoalphabetic, polyalphabetic, playfair and Transposition techniques are Rail fence with depth 2 and depth 3, columnar, odd-even, plaintext based. We have analyzed these encryption techniques on the basis of cryptanalysis and possibility of attack. This analysis gives some better results about comparison among these encryption techniques to provide more security
关键词:Encryption; Decryption; Brute Force Attack; Cryp tanalysis; Security; Cipher tex ; Plain text ; Key