Indian Journal of Science and Technology
DOI: 10.17485/ijst/2009/v2i8.7
Year: 2009, Volume: 2, Issue: 8, Pages: 9-15
Original Article
Massoud Sokouti1, Babak Sokouti2 and Saeid Pashazadeh1
1Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran
2Faculty of Engineering, Islamic Azad University -Tabriz Branch,Tabriz, Iran
*Author for the correspondence:
Massoud Sokouti
Faculty of Electrical and Computer Engineering,
University of Tabriz, Tabriz, Iran
E-mail: [email protected]
Transposition ciphers are stronger than simple substitution ciphers. However, if the key is short and the message is long, then various cryptanalysis techniques can be applied to break such ciphers. By adding 8 bits (one byte) for each byte using a function and another mathematical function to position the bits in a binary tree and using its in-order tour, this cipher can be made protected. Using an in-order tour of binary tree can diffuse the eight bits (includes 7 bits produced by the function and 1 random bit) and eight bits of the plaintext. This can highly protect the cipher. However, if the key management processes are not secured the strongest ciphers can easily be broken.
Keywords: Cryptography, binary tree, cipher protection, transposition cipher.
Subscribe now for latest articles and news.