Rail Fence Cryptography in Securing Information
Rail Fence Cryptography in Securing Information
Rail Fence Cryptography in Securing Information
INTRODUCTION
and A. Then the last retrieval is from the first row, such as
letter A and S. The letters will be concatenated soon after
completed.
7
H
B
A
C
B
A
Table 2 shows the next characters is put in cell B2, B4, and
B6. The first character has been occupied in C3. The first
character in row B must be in B2. So, the formation will be B2
C3/A3 B4 and B4 C5/A5 B6. The letters N, Y and
A are put in cells B2, B4, and B6.
Table 3. The decryption process (part 3).
1
C
B
A
B
A
N
A
7
H
A
S
REFERENCES
[1] J. Omolehin, O. A. C. and A. O. Bajeh, "The Complexity
of 4-Row Rail Fence Cipher Encryption Algorithm,"
International Journal of Mathematical Science, vol. 1, no.
1, pp. 8-14, 2009.
[2] J. O. Omolehin, O. C. Abikoye and R. G. Jimoh,
"Development of Data Encryption and Decryption
Algorithm Using 4-Row Rail Fence Cipher," Jounal of
Nigerian Association of Mathematical Physics, vol. 13, pp.
411-416, 2008.
[3] T. S. Kondo and L. J. Mselle, "An Extended Version of the
Polybius Cipher," International Journal of Computer
Applications, vol. 79, no. 13, pp. 30-33, 2013.
[4] J. A. Dar and S. Sharma, "Implementation of One Time
Pad Cipher with Rail Fence and Simple Columnar
Transposition Cipher, for Achieving Data security,"
International Journal of Science and Research, vol. 3, no.
11, pp. 2415-2421, 2012.
[5] J. A. Dar, "Humanizing the Security of Rail Fence Cipher
Using Double Transposition and Substitution Techniques,"
International Journal of Science and Research, vol. 3, no.
9, pp. 1787-1791, 2012.