ISSN: 2375-3943
American Journal of Computation, Communication and Control  
Manuscript Information
 
 
Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
American Journal of Computation, Communication and Control
Vol.2 , No. 2, Publication Date: Mar. 11, 2015, Page: 7-11
1711 Views Since March 11, 2015, 832 Downloads Since Apr. 12, 2015
 
 
Authors
 
[1]    

Okike Benjamin, Department of Computer, Science, University of Ghana, Legon, Accra.

[2]    

Garba EJD, Department of Mathematical Sciences, University of Jos, Jos, Nigeria.

 
Abstract
 

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques using computers connected through networks make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Okike’s Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other positions thereby making it very difficult to decrypt by any unauthorized user. The researchers intend to show the pattern of splitting sequence as the message deployed is split from 2 through 10. The result show that as the number of splits, S increase from 2 through 10, the number of swap positions, Z increase by factorial of S ( S = Z!). The swapping of the positions of the encrypted message would further increase the complexity with which an adversary may take the decrypt such a message.


Keywords
 

Information Security, Message Splitting, Pattern, Sequence


Reference
 
[01]    

R. Terry, “Dynamic Transposition Revisited”, 2001. Retrieved from http://www.ciphersbyritter.com

[02]    

M. Green, “Practical Cryptographic Systems”, 2010, Retrieved from http://spar.isi.jhu.edu/

[03]    

W. Stallings, “Modern Private Key Ciphers”, 1996, Retrieved from http://williamstallings.com

[04]    

S. John, “Method of Transposition”, 2001, Retrieved from

[05]    

N. Randy, “Classical Cryptography”. 1996, Retrieved from http://www.und.nodak.edu/crypto/

[06]    

A. Torbjorn, “Double Columnar Transposition”, 1998, Retrieved from http://www.cvni.net/radio/nsnl/>

[07]    

B. Okike, “Some New Encryption Techniques Using Firewalls and Random Number Generators” Being Ph. D. Thesis Defence Presented at ATBU, Bauchi, Nigeria, 2005.





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership