skip to main content
10.1145/3508072.3512287acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

An approach to Improving Columnar Permutation Cipher for Wills in Distributed Systems of Law Firms

Published:13 April 2022Publication History

ABSTRACT

With the evolution of cryptography in the twentieth century, classical ciphers (transposition ciphers) are gradually being pushed out because it now possesses low security ratings, however we can still salvage them, as they have other desirable and admirable qualities which include: easy of design, medium technical know-how and low computational power and it is to achieve this that this study; “A three layer permutation Cryptosystem using a modification of Transposition cipher and two layers content permutation for Wills” was carried out . The aim of this study is to make columnar transposition more secure and relevant so that companies with low technology budget and know-how be secured from known cryptosystem attack. The method used to achieve the above aim is adding to columnar transposition the technique of rail cipher, this affected the sequence of transposition, and lead to a new encryption equation and function. Cryptanalysis was carried out using various tools (Cryptool 2, Dcode and Countwordsfree) and parameters, using a transposition decoder the cipher text gotten using the traditional transposition cryptosystem decrypted with a hundred percent word and character accuracy whilst using the improved system gave a thirty percent accuracy.

References

  1. O. Oluwaseun, “Strategies for Managing Information Flow in Nigeria Healthcare System Strategies for Managing Information Flow in Nigeria Healthcare System,” no. October, 2015, doi: 10.5120/ijais2015451443.Google ScholarGoogle ScholarCross RefCross Ref
  2. O. S. Akanji, O. A. Abisoye, S. A. Bashir, and O. A. Ojerinde, “A Survey on Slow DDoS Attack Detection Techniques,” ITED2020, vol. 3, 2020.Google ScholarGoogle Scholar
  3. S. A. Khan, “Design and Analysis of Playfair Ciphers with Different Matrix Sizes,” Int. J. Comput. Netw. Technol., vol. 3, no. 3, pp. 117–122, 2015, doi: 10.12785/ijcnt/030305.Google ScholarGoogle ScholarCross RefCross Ref
  4. K. K. M, M. A. S, and S. Rasool, “Efficient Digital Encryption Algorithm Based on Matrix Scrambling Technique,” Int. J. Netw. Secur. Its Appl., vol. 2, no. 4, pp. 30–41, 2010, doi: 10.5121/ijnsa.2010.2403.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. T. Sadiq and L. Ali, “Attacking Transposition Cipher Using Improved Cuckoo Search,” no. March 2014, 2015.Google ScholarGoogle Scholar
  6. M. El–Beheiry, “StegoCrypt: Arithmetic and Rudin – Shapiro Sequence – Based Bit – Cycling and 3DES Bachelor Thesis,” 2019.Google ScholarGoogle Scholar
  7. C. Christensen, “Spring 2015 Chris Christensen MAT/CSC 483,” 2015.Google ScholarGoogle Scholar
  8. G. Lasry, M. Hayarden, and N. Kopal, “Cryptanalysis of the Columnar Transposition Cipher with Long Keys,” pp. 1–20, 2015.Google ScholarGoogle Scholar
  9. A. Mishra, “Enhancing Security of Caesar Cipher Using Different Methods,” Int. J. Res. Eng. Technol., vol. 02, no. 09, pp. 327–332, 2013, doi: 10.15623/ijret.2013.0209049.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Bergquist, “Blockchain Technology and Smart Contracts: Privacy-preserving Tools,” no. 17023, p. 62, 2017.Google ScholarGoogle Scholar
  11. I. I. and A. M. S. Ojeniyi, Joseph A, Bolaji O. Adedayo, “Hybridized Technique for Copy-Move Forgery Detection Using Discrete Cosine Transform and Speeded-Up Robust Feature Techniques,” no. April, pp. 22–30, 2018, doi: 10.5815/ijigsp.2018.04.03.Google ScholarGoogle ScholarCross RefCross Ref
  12. F. I. Lubis, H. F. S. Simbolon, T. P. Batubara, and R. W. Sembiring, “Combination of caesar cipher modification with transposition cipher,” Adv. Sci. Technol. Eng. Syst., vol. 2, no. 5, pp. 22–25, 2017, doi: 10.25046/aj020504.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. B. Lee, Z. J. Shi, Y. L. Yin, R. L. Rivest, and M. J. B. Robshaw, “On permutation operations in cipher design,” Int. Conf. Inf. Technol. Coding Comput. ITCC, vol. 2, pp. 569–577, 2004, doi: 10.1109/ITCC.2004.1286714.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Hackworth, “Data encryption,” Itnow, vol. 37, no. 5, pp. 12–13, 1995, doi: 10.1093/combul/37.5.12.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. J. Sobol, “Data encryption,” Inf. Syst. Secur., vol. 3, no. 3, pp. 27–31, 1994, doi: 10.1080/10658989409342465.Google ScholarGoogle ScholarCross RefCross Ref
  16. J. K. Ambulkar, “Poly Substitution Method for Encryption and Decryption,” vol. 02, no. 05, pp. 1810–1812, 2010.Google ScholarGoogle Scholar
  17. A. Jain, R. Dedhia, and A. Patil, “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,” Int. J. Comput. Appl., vol. 129, no. 13, pp. 6–11, 2015, doi: 10.5120/ijca2015907062.Google ScholarGoogle ScholarCross RefCross Ref
  18. R. B. Muralidhar, “Substitution Cipher with NonPrefix Codes,” 2011.Google ScholarGoogle Scholar
  19. I. Idris, O. E. Oche, and J. K. Alhassan, “An Infallible Technique for Hiding Confidential Data in Compressed Video using LSB and RSA Algorithm,” no. Icta, pp. 1–5, 2016.Google ScholarGoogle Scholar
  20. A. O. Isah, J. K. Alhassan, and S. S. Olanrewaju, “Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition,” vol. 6, no. 4, pp. 162–178, 2017.Google ScholarGoogle Scholar
  21. R. Gupta, P. K. Sadh, and P. Gautam, “A Study of Implemented Classical Cipher,” vol. 5, no. July, pp. 1270–1275, 2018, doi: 10.22214/ijraset.2017.8180.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. K. Alhassan, I. Ismaila, V. O. Waziri, and A. Abdulkadir, “A Secure Method to Hide Confidential Data Using Cryptography and Steganography,” no. Icta, pp. 105–110, 2016.Google ScholarGoogle Scholar
  23. O. Osho, Y. O. Zubair, J. A. Ojeniyi, and L. O. Osho, “A SIMPLE ENCRYPTION AND DECRYPTION SYSTEM,” Int. Conf. Sci. Technol. Educ. Arts, Manag. Soc. Sci. iSTEAMS, pp. 77–84, 2014.Google ScholarGoogle Scholar
  24. A. A. Adedipe, “Nigerian Internet Fraud: Policy / Law Changes That Can Improve Effectiveness,” 2016.Google ScholarGoogle Scholar
  25. R. Jamal, Z. Hussein, and S. By, “Transposition Cipher Text,” pp. 1–43, 2012.Google ScholarGoogle Scholar
  26. M. Heydari, G. L. Shabgahi, and M. M. Heydari, “Cryptanalysis of transposition ciphers with long key lengths using an improved genetic algorithm,” World Appl. Sci. J., vol. 21, no. 8, pp. 1194–1199, 2013, doi: 10.5829/idosi.wasj.2013.21.8.22.Google ScholarGoogle ScholarCross RefCross Ref
  27. C. Christensen, “Transposition Ciphers,” pp. 1–31, 2010.Google ScholarGoogle Scholar
  28. R. Frost, “Rail Fence Cipher Keyword Columnar Transposition,” vol. 124, no. Winter, 2009.Google ScholarGoogle Scholar
  29. M. Sokouti, B. Sokouti, and S. Pashazadeh, “An approach in improving transposition cipher system,” Indian J. Sci. Technol., vol. 2, no. 8, pp. 8–15, 2009, doi: 10.17485/ijst/2009/v2i8/29502.Google ScholarGoogle ScholarCross RefCross Ref
  30. A. S. Utama, “Rail Fence Cryptography in Securing Information,” Int. J. Sci. Eng. Res., no. July, 2016.Google ScholarGoogle Scholar
  31. R. Stout, “Where There ’ S a Will,” pp. 1–95, 1938.Google ScholarGoogle Scholar
  32. A. Gadzo, “Types of Wills,” pp. 39–41, 2021.Google ScholarGoogle Scholar
  33. K. B. Gee, “Chapter 1: Electronic Wills and the Future: When Today ’ s Techie Youth Become Tomorrow ’ s Testators,” vol. 105, no. June 2009, 2005.Google ScholarGoogle Scholar
  34. B. J. Lebowitz, “Electronic Wills: No Longer in a Galaxy Far , Far Away,” vol. 64, no. 1, 2017.Google ScholarGoogle Scholar
  35. N. Krueger, “LIFE , DEATH , AND REVIVAL OF ELECTRONIC WILLS LEGISLATION IN 2016 THROUGH 2019,” vol. 1298, no. 2017, 2019.Google ScholarGoogle Scholar
  36. S. Snail and N. Hall, “Electronic wills in South Africa,” Digit. Evid. Electron. Signat. Law Rev., vol. 7, no. 0, pp. 67–70, 2014, doi: 10.14296/deeslr.v7i0.1925.Google ScholarGoogle ScholarCross RefCross Ref
  37. S. Eva, “Are electronic wills on the way?,” 2021.Google ScholarGoogle Scholar
  38. K. Martin, “TECHNOLOGY AND WILLS – THE DAWN OF A NEW ERA COVID-19 special edition,” 2020.Google ScholarGoogle Scholar
  39. A. J. Ronak Dedhia, Abhijit Patil, “Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication,” Int. J. Comput. Appl., vol. 129, no. 13, 2015, doi: 10.5120/ijca2015907062.Google ScholarGoogle ScholarCross RefCross Ref
  40. T. Wu, Y. Chen, and H. Lin, “Design and Construction of Secure Digital Will System,” vol. 13, no. 5, pp. 523–530, 2016.Google ScholarGoogle Scholar
  41. G. Samid, “The Ultimate Transposition Cipher (UTC).,” IACR Cryptol. ePrint Arch., vol. 2015, p. 1033, 2015.Google ScholarGoogle Scholar
  42. H. Lin, “Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based System,” vol. 11, no. 4, pp. 315–321, 2014.Google ScholarGoogle Scholar
  43. H. Ali-Pacha, N. Hadj-Said, A. Ali-Pacha, M. A. Mohamed, and M. Mamat, “The six-dos transposition cipher based on the rubik's cube,” Int. J. Adv. Technol. Eng. Explor., vol. 8, no. 75, pp. 258–273, 2021, doi: 10.19101/IJATEE.2020.762150.Google ScholarGoogle ScholarCross RefCross Ref
  44. B. Thakkar and B. Thankachan, “A Multilevel Approach of Transposition Ciphers for Data Security over Cloud ISSN NO: 1869-9391 A Multilevel Approach of Transposition Ciphers for Data Security over Cloud,” no. May, 2021.Google ScholarGoogle Scholar
  45. M. S. Hossain Biswas , “A systematic study on classical cryptographic cypher in order to design a smallest cipher,” Int. J. Sci. Res. Publ., vol. 9, no. 12, p. p9662, 2019, doi: 10.29322/ijsrp.9.12.2019.p9662.Google ScholarGoogle ScholarCross RefCross Ref
  46. J. Yi and J. Yi, “Cryptanalysis of Homophonic Substitution- Transposition Cipher,” 2014.Google ScholarGoogle ScholarCross RefCross Ref
  47. E. Antal, P. Zajac, and O. Grošek, “Diplomatic Ciphers Used by Slovak Attaché During the WW2,” Proc. 3rd Int. Conf. Hist. Cryptol. HistoCrypt 2020, vol. 171, pp. 21–30, 2020, doi: 10.3384/ecp2020171004.Google ScholarGoogle ScholarCross RefCross Ref
  48. D. Rachmawati, S. Melvani Hardi, and R. Partogi Pasaribu, “Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression,” J. Phys. Conf. Ser., vol. 1339, no. 1, 2019, doi: 10.1088/1742-6596/1339/1/012007.Google ScholarGoogle ScholarCross RefCross Ref
  49. G. Lasry, “A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics,” 2017.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICFNDS '21: Proceedings of the 5th International Conference on Future Networks and Distributed Systems
    December 2021
    847 pages
    ISBN:9781450387347
    DOI:10.1145/3508072

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 April 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format