






Vol.2 , No. 2, Publication Date: Mar. 11, 2015, Page: 7-11
[1] | Okike Benjamin, Department of Computer, Science, University of Ghana, Legon, Accra. |
[2] | Garba EJD, Department of Mathematical Sciences, University of Jos, Jos, Nigeria. |
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques using computers connected through networks make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Okike’s Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other positions thereby making it very difficult to decrypt by any unauthorized user. The researchers intend to show the pattern of splitting sequence as the message deployed is split from 2 through 10. The result show that as the number of splits, S increase from 2 through 10, the number of swap positions, Z increase by factorial of S ( S = Z!). The swapping of the positions of the encrypted message would further increase the complexity with which an adversary may take the decrypt such a message.
Keywords
Information Security, Message Splitting, Pattern, Sequence
Reference
[01] | R. Terry, “Dynamic Transposition Revisited”, 2001. Retrieved from http://www.ciphersbyritter.com |
[02] | M. Green, “Practical Cryptographic Systems”, 2010, Retrieved from http://spar.isi.jhu.edu/ |
[03] | W. Stallings, “Modern Private Key Ciphers”, 1996, Retrieved from http://williamstallings.com |
[04] | S. John, “Method of Transposition”, 2001, Retrieved from |
[05] | N. Randy, “Classical Cryptography”. 1996, Retrieved from http://www.und.nodak.edu/crypto/ |
[06] | A. Torbjorn, “Double Columnar Transposition”, 1998, Retrieved from http://www.cvni.net/radio/nsnl/> |
[07] | B. Okike, “Some New Encryption Techniques Using Firewalls and Random Number Generators” Being Ph. D. Thesis Defence Presented at ATBU, Bauchi, Nigeria, 2005. |