{"title":"A Novel Key-Based Transposition Scheme for Text Encryption","authors":"Sidra Malik","doi":"10.1109/FIT.2011.44","DOIUrl":null,"url":null,"abstract":"Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT.2011.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.