Open Access   Article Go Back

Rail Fence Cipher Based Encryption Technique For Secure Data Transfer

Debolina Dalui1 , Sudipta Sahana2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 910-914, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.910914

Online published on Apr 30, 2019

Copyright © Debolina Dalui, Sudipta Sahana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Debolina Dalui, Sudipta Sahana, “Rail Fence Cipher Based Encryption Technique For Secure Data Transfer,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.910-914, 2019.

MLA Style Citation: Debolina Dalui, Sudipta Sahana "Rail Fence Cipher Based Encryption Technique For Secure Data Transfer." International Journal of Computer Sciences and Engineering 7.4 (2019): 910-914.

APA Style Citation: Debolina Dalui, Sudipta Sahana, (2019). Rail Fence Cipher Based Encryption Technique For Secure Data Transfer. International Journal of Computer Sciences and Engineering, 7(4), 910-914.

BibTex Style Citation:
@article{Dalui_2019,
author = {Debolina Dalui, Sudipta Sahana},
title = {Rail Fence Cipher Based Encryption Technique For Secure Data Transfer},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {910-914},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4140},
doi = {https://doi.org/10.26438/ijcse/v7i4.910914}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.910914}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4140
TI - Rail Fence Cipher Based Encryption Technique For Secure Data Transfer
T2 - International Journal of Computer Sciences and Engineering
AU - Debolina Dalui, Sudipta Sahana
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 910-914
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
448 243 downloads 105 downloads
  
  
           

Abstract

Network security has become one of the major talking points in today’s technological world. Although several research activities were carried out pertaining to security in order to ensure confidentiality, authenticity, integrity, non-repudiation etc., there remained some loopholes which need to be taken care of. There are chances that cyber attackers or hackers may tamper or alter the texts and cause a severe leakage of confidential information of IT organizations, business firms, etc. Hence, it is of utmost importance to protect vital information from such attackers or hackers by using some standard techniques. In our paper, we have discussed the cryptographic techniques with proper encryption and decryption. We have suggested the use of Rail Fencing Cypher along with ASCII codes and mapping tables for end to end encryption of plain text comprising of several characters and then decrypting the encrypted text into plain text.

Key-Words / Index Term

Cryptography, Rail Fence Cipher, Mapping, Encryption, Decryption

References

[1] Sudipta Sahana, Asmita Bhattacharya, Rittik Mondal, Rohan Chattopadhaya, Titas Das, “SECURING AND HIDING TEXTS USING ARCHIMEDEAN SPIRAL TECHNIQUE WITH IMAGE STEGANOGRAPHY”, International Journal of Computer Engineering and Applications, Volume IX, Issue IV, ISSN 2321-3469
[2] Sudipta Sahana, Goutami Dey, Madhurhita Ganguly, Priyankar Paul, Subhayan Paul, “Adaptive Steganography Based Enhanced Cipher HidingTechnique for Secure Data Transfer”, IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V, PP 55-60
[3] Sudipta Sahana, Madhusree Majumdar, Shiladitya Bose, Anay Ghoshal, “Security Enhancement Approach For Data Transfer Using Elliptic Curve Cryptography And Image Steganography”, International Journal of Advanced Research in Computer and Communication EngineeringVol. 4, Issue 4, April 2015
[4] Sarita Kumari, “A research Paper on Cryptography Encryption and Compression Techniques”, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 4 April 2017, Page No. 20915-20919
[5] Prof. Mukund R. Joshi, Renuka Avinash Karkade , “Network Security with Cryptography”, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.1, January- 2015, ISSN 2320–088X
[6] Ujjwal Barman, Suchismita Gupta, Sudipta Sahana, “Substitution Technique Based Noble Approach Towards Base64 Crypting System Incorporating Rail Fence Cipher”, CCET JOURNAL OF SCIENCE AND ENGINEERING EDUCATIONCCET JOURNAL OF SCIENCE AND ENGINEERING EDUCATION, Vol. - 3, Page-60-65, Year-2018, ISSN 2455-5061
[7] Prof. Swapnil Chaudhari, Mangesh Pahade, Sahil Bhat, Chetan Jadhav, Tejaswini Sawant, “A Research Paper on New Hybrid Cryptography Algorithm”, INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY, Volume-9,Issue-5(May-18) ISSN (O) :- 2349-3585
[8] Abhipsa Kundu, Sudipta Sahana, “Dynamic Size Based Cipher Aided Image Steganography Technique for Network Security Enhancement”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 10, October 2014, ISSN: 2277 128X