The International Journal Of Engineering And Science (IJES) ||Volume|| 2 ||Issue|| 1 ||Pages|| 314-338 ||2013|| ISSN: 2319 – 1813 ISBN: 2319 – 1805
Pattern In Splitting Sequence In Okike's Merged Irregular Transposition Cipher Technique In Securing Web Information 1,
Okike Benjamin, 2,Prof. E.G.D. Garba
1,
2,
Department Of Computer Science, University Of Abuja, Nigeria Department Of Mathematics and, Computer Science University Of Jos Nigeria
----------------------------------------------------Abstract-----------------------------------------------------------The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g., the use of the Internet for business transactions, video conferencing, net meeting, etc. These issues have made it possible for information in transit more vulnerable to attack by unauthorized users. Transposition cipher addresses the above issues - it is at the foundation of all information security. Even if the information in transit is intercepted, with transposition cipher, the information would be meaningless to the interceptor. The researcher will in this work review Single Columnar Transposition Ciphers, Double Columnar Transposition Cipher and Irregular Transposition Cipher. Because of the problems associated with these ciphers, the researcher will deploy Merged Irregular Transposition Cipher to ensure that information is more secure than there are in the reviewed transposition ciphers presently in use. However, Merged Irregular Transposition Cipher will ensure that the original message is split into two or more parts, each of the part encrypted and finally combined to form the ciphertext message that would be sent. The number of parts that the original message would be split depends on the length of the message. Keywords: Merged Irregular transposition, Cipher, Web Information, Splitting Sequence --------------------------------------------------------------------------------------------------------------------------------------Date of Submission: 07,January, 2013 Date of Publication: 30, January 2013 -----------------------------------------------------------------------------------------------------------------------------------------
I. Introduction Specifically, a "transposition" is the simple exchange in position of two symbols within a message or ordered array or vector. A sequence of such exchanges can form any possible mathematical "permutation" of the message. In other words, it is the simple re-arrangement of the existing data symbols (Terry, 2001). The techniques employed to this end have become increasingly mathematical in nature. Although Transposition Cipher may take many forms, this research concentrates on three main areas. First, the Single Columnar Transposition and the Double Columnar Transposition Ciphers are discussed. These systems have extremely fast implementations, but may or may not involve the use of keywords. Second, the researcher presents an Irregular Transposition Cipher cryptosystems, which makes it possible to protect information in a more reliable form than both the Single Columnar and the Double Columnar Transposition Ciphers. Its security is based on the arrangement of the information in an irregular table rather than a block. In this research work, the researcher intends to deploy a Merged Irregular Transposition Cipher to encrypt information. This cipher will certainly offer a more secured information than the other forms of transposition ciphers that already exist since multiple irregular tables and multiple keywords are employed to secure the information. The researcher intends to develop a transposition model to be known as Merged Irregular Transposition Cipher. This cipher will differ considerably not only in terms of the simplicity of its algorithm, but also powerful in its application when compared to existing transposition ciphers. The intended transposition cipher will overcome the weaknesses of the previous transposition ciphers. This would be achieved by the application of multiple irregular tables and keywords to encrypt a message.
II. Literature Review This section will review some existing literatures in relation to information security. The researcher has chosen to review the works on transposition ciphers during the course of the work. 2.1
Transposition Cipher After looking at ciphers like the Substitution Cipher, which can replace the letters of one's message by completely different letters, a cipher that cannot change any letters at all seems weak. However, this is not the case with transposition cipher. There is no doubt that the letters in the message are not replaced by some other
www.theijes.com
The IJES
Page 314