Journal of Computer Sciences and Applications
ISSN (Print): 2328-7268 ISSN (Online): 2328-725X Website: http://www.sciepub.com/journal/jcsa Editor-in-chief: Minhua Ma, Patricia Goncalves
Open Access
Journal Browser
Go
Journal of Computer Sciences and Applications. 2020, 8(2), 56-61
DOI: 10.12691/jcsa-8-2-3
Open AccessArticle

Dynamic Directional NxN Chart Based Text Based Substitution Cipher

Michael M Kangethe1, and Elisha Odira Abade1

1School of Computing and Informatics, University of Nairobi, Nairobi, Kenya

Pub. Date: September 23, 2020

Cite this paper:
Michael M Kangethe and Elisha Odira Abade. Dynamic Directional NxN Chart Based Text Based Substitution Cipher. Journal of Computer Sciences and Applications. 2020; 8(2):56-61. doi: 10.12691/jcsa-8-2-3

Abstract

The need for simple secure substitution encryption algorithms has risen due to complexities derived from current encryption algorithms, which over-complicate the process through many sub-processes and consume more space than necessary. This also creates the need for a secure string encryption approach that can also be applied using a simple pen and paper to encrypt and decrypt messages between each other. In this paper we present a technique based on a Non-Deterministic directional NxN chart-based encryption cipher as a solution to this problem. This will be achieved by using a 2-dimensional N by N chart as the key while using a dynamically selected directional approach to generate both the cipher and plain-text.

Keywords:
encryption decryption ascii strings plain text cipher text multi dimension hex non-deterministic random selection text cipher key chart IV (Initialization Vector) XY (Horizontal/Row Vertical/Column)

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  M. A. Murillo-Escobar, F. Abundiz-PÈrez, C. Cruz-Hern·ndez, R. M. LÛpez-GutiÈrrez. 2014. A novel symmetric text encryption algorithm based on logistic map.
 
[2]  Mante, Pratik Gajanan, Oswal, Harsh Rajendra, Swain, Debabrata, Deshpande, Deepali. 2009. A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation.
 
[3]  Jamshed Memon, Mohd Zaidi Abd Rozan, Mueen Uddin, Adamu Abubakar, Haruna Chiroma, Dzurllkanian Daud. 2014. Randomized Text Encryption: a New Dimension in Cryptography. International Review on Computers and Software (I.RE.CO.S.), Vol. 9, N. 2
 
[4]  Hamid Mirvaziri, Kasmiran Jumari Mahamod Ismail and Zurina Mohd Hanapi. 2009. Message Based Random Variable Length Key Encryption Algorithm. Journal of Computer Science 5 (8): 573-578, 2009
 
[5]  Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, † Kostas Kalpakis. 2014. DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
 
[6]  Orhio Mark Creado, Yiling Wang, Xianping Wu, and Phu Dung Le. 2009. Probabilistic Encryption – A Practical Implementation, Fourth International Conference on Computer Sciences and Convergence Information Technology.