ISSN: 2375-3943
American Journal of Computation, Communication and Control  
Manuscript Information
 
 
Determination of Complexity Level in Okike’s Merged Irregular Transposition Cipher
American Journal of Computation, Communication and Control
Vol.1 , No. 4, Publication Date: Oct. 10, 2014, Page: 61-65
1717 Views Since October 10, 2014, 528 Downloads Since Apr. 14, 2015
 
 
Authors
 
[1]    

Okike Benjamin, Department of Computer Science, University of Ghana, Legon and University of Jos, Nigeria.

[2]    

Garba E. J. D., Department of Computer Science, University of Ghana, Legon and University of Jos, Nigeria.

 
Abstract
 

Today, it has been observed that security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researchers have decided to develop a new encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.


Keywords
 

Transposition Cipher, Merged Irregular Cipher, Encryption, Complexity Level


Reference
 
[01]    

Harry B. (2004), “Single Columnar Transposition”, http://www.cipher.maths.soton.ac.uk

[02]    

Luigi S. (2000), “Geometrical Transposition”, http://www.ridex.co.uk/cryptology/

[03]    

Okike B. (2012), Some New Encryption Techniques Using Firewalls and Random Generators, LAP Lambert Academic Publishing, Berlin – Germany, https://www.lap-publishing.com/

[04]    

Rutter S. (2012), Double Transposition Cipher, http://stuartrutter.com/2012

[05]    

Terry R. (2001), “Dynamic Transposition Revisited”, http://www.ciphersbyritter.com





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership