DocumentCode
261028
Title
Transposition cryptography algorithm using tree data structure
Author
Agrawal, Nikhil ; Kumar, Manoj ; Rizvi, M.A.
Author_Institution
Dept. of CEA, NITTTR Bhopal, Bhopal, India
fYear
2014
fDate
27-28 Feb. 2014
Firstpage
1
Lastpage
6
Abstract
In the way of increasing use of internet exponentially when the message is transferred from sender to receiver over the network, the attempt can be made by the hacker or cracker to break and expose the actual message. So security of message is important issue. Encryption process plays a vital role in maintaining the confidentiality of the message being transmitted over the network. In this paper existing transposition techniques of encryption is discussed. An attempt is made to present a new encryption, decryption algorithm on transposition cryptography algorithm for block cipher using tree and other data structure approaches.
Keywords
Internet; computer crime; computer network security; cryptography; message authentication; tree data structures; Internet; block cipher; cracker; encryption-decryption algorithm; hacker; message confidentiality; message security; transposition cryptography algorithm; tree data structure; Binary trees; Ciphers; Educational institutions; Encryption; Rails; Receivers; Security; algorithm; block cipher; cryptanalysis; decryption; encryption; mirroring; preorder; reverse transformation; strict complete binary tree; transposition;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location
Chennai
Print_ISBN
978-1-4799-3835-3
Type
conf
DOI
10.1109/ICICES.2014.7033939
Filename
7033939
Link To Document