• DocumentCode
    261028
  • Title

    Transposition cryptography algorithm using tree data structure

  • Author

    Agrawal, Nikhil ; Kumar, Manoj ; Rizvi, M.A.

  • Author_Institution
    Dept. of CEA, NITTTR Bhopal, Bhopal, India
  • fYear
    2014
  • fDate
    27-28 Feb. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    In the way of increasing use of internet exponentially when the message is transferred from sender to receiver over the network, the attempt can be made by the hacker or cracker to break and expose the actual message. So security of message is important issue. Encryption process plays a vital role in maintaining the confidentiality of the message being transmitted over the network. In this paper existing transposition techniques of encryption is discussed. An attempt is made to present a new encryption, decryption algorithm on transposition cryptography algorithm for block cipher using tree and other data structure approaches.
  • Keywords
    Internet; computer crime; computer network security; cryptography; message authentication; tree data structures; Internet; block cipher; cracker; encryption-decryption algorithm; hacker; message confidentiality; message security; transposition cryptography algorithm; tree data structure; Binary trees; Ciphers; Educational institutions; Encryption; Rails; Receivers; Security; algorithm; block cipher; cryptanalysis; decryption; encryption; mirroring; preorder; reverse transformation; strict complete binary tree; transposition;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Communication and Embedded Systems (ICICES), 2014 International Conference on
  • Conference_Location
    Chennai
  • Print_ISBN
    978-1-4799-3835-3
  • Type

    conf

  • DOI
    10.1109/ICICES.2014.7033939
  • Filename
    7033939