[ij] [ij] [ij] 
Email id

Research Journal of Science and Technology
Year : 2017, Volume : 9, Issue : 1
First page : ( 48) Last page : ( 50)
Print ISSN : 0975-4393. Online ISSN : 2349-2988.
Article DOI : 10.5958/2349-2988.2017.00008.0

Cryptography Using Transposition Cipher

Garg Satish Kumar*

Govt. P G College, Ambala Cantt.-133001

*Corresponding Author E-mail: sat.phy@gmail.com

Online published on 12 January, 2017.


In the present work the author has suggested a unique cryptographic method where bit level manipulation is done using transposition cipher. In this method, first by using Extended ASCII Code, input string of characters is converted into digital form then transposition cipher is applied on this string and finally by reverse of the Extended ASCII Code on this transposed string, bits are converted into characters. The proposed method can be applied to encrypt any data consisting of 10 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.



Encryption, Decryption, Transposition Cipher.


║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
741,568,920 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.