{"title":"一种新的基于密钥的文本加密换位方案","authors":"Sidra Malik","doi":"10.1109/FIT.2011.44","DOIUrl":null,"url":null,"abstract":"Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.","PeriodicalId":101923,"journal":{"name":"2011 Frontiers of Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Novel Key-Based Transposition Scheme for Text Encryption\",\"authors\":\"Sidra Malik\",\"doi\":\"10.1109/FIT.2011.44\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.\",\"PeriodicalId\":101923,\"journal\":{\"name\":\"2011 Frontiers of Information Technology\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Frontiers of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FIT.2011.44\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT.2011.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Key-Based Transposition Scheme for Text Encryption
Crypt21 is designed in this paper, a block cipher which uses classical substitution whereas a new transposition scheme. The transposition scheme proposed is entirely dependent on key and induces security by having substitution and transposition both dependant on key. The design is iterative and can be extended to many rounds. Strengths include that it is safe from frequency analysis and dependant on original key in many ways. Weaknesses include possibilities of related key attacks due to weak key schedule. A text based implementation is done and working is explained via example in this paper. Implementation is done in MATLAB. Further directions to make this idea more practical are also proposed in this paper.