CRYPTOGRAPHIC ENCRYPTION BASED ON RAIL-FENCE PERMUTATION CIPHER
Abstract
Cryptographic systems play a pivotal role in securing sensitive information in various domains. Permutation ciphers, a fundamental component of classical cryptography, involve the rearrangement of characters in a message to achieve confidentiality. This paper explores the principles and applications of permutation ciphers in cryptographic encryption. The study delves into the historical context, the underlying mechanisms of permutation ciphers, and their relevance in contemporary cryptographic practices. Using permutation on n symbols and Rail Fence Cipher, we construct an algorithm for encrypting and decrypting a message for n = 2, 3
Downloads
References
[2] T. M. Apostol, Introduction to analytic number theory, Springer- Verlag, New York, (2011).
[3] S. Arumugam and A. Thangapandi Issac, Modern algebra, Scitech Publications Pvt. Ltd, India, (2018).
[4] D. M. Burton, Elementary Number Theory, McGraw-Hill, New York, (2011).
[5] J. Kannan and Manju Somanath, Congruum Problem, International Journal of Pure and Applied Mathematical Sciences, 9(2)(2016), 123-131.
[6] J. Kannan and Manju Somanath, Fundamental Perceptions in Contemporary Number Theory, Nova Science Publishers, New York, (2023).
[7] J. Kannan, M. Mahalakshmi and A. Deepshika, Cryptographic Algorithm involving the Matrix Qp∗ , Korean J. Math., 30(3)(2022), 533-538.
[8] Manju Somanath, K. Raja, J. Kannan and M. Mahalakshmi, On a class of solutions for a quadratic Diophantine equation, Advances and Applications in Mathematical Sciences, 19(11)(2020), 1097-1103.
[9] Neha Sharma and Sachin Chirgaiyam, A Novel Approach to Hill Cipher, International Journal of Computer Applications, 108(11)(2014), 34-37. Cryptographic Algorithm Based on Permutation Ciphers / A. Deepshika et al. 7
[10] K. H. Rosen, Elementary number theory and its applications, Addison-Wesley Publishing Company, Boston, (1987).
[11] D. R. Stinson and M. B. Paterson, Cryptography theory and practice, CRC Press, Taylor and Francis Group, (2006). [12] S. G. Telang, Number Theory, Tata McGraw - Hill Publishing Company Limited, New York, (1996).
[12] Knight, S., n.d. The Rail Fence Cipher. [Online] Available at: http://www.cs.trincoll.edu/~crypto/historical/railfence.html
Copyright (c) 2023 Michael N. John

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The authors and co-authors warrant that the article is their original work, does not infringe any copyright, and has not been published elsewhere. By submitting the article to GPH - International Journal of Mathematics, the authors agree that the journal has the right to retract or remove the article in case of proven ethical misconduct.