
In: USENIX Annual Technical Conference, vol.

IEEE (2014)Ĭarroll, A., Heiser, G.: An analysis of power consumption in a smartphone. In: IEEE 28th International Conference on Advanced Information Networking and Applications. IEEE (2012)Ĭhen, H.-C., Epa, A.L.V.: A rotation session key-based transposition cryptosystem scheme applied to mobile text chatting.

In: IEEE 13th International Conference on Mobile Data Management. Krishna, R.K.N.S., et al.: Privacy-preserving data management in mobile environments: a partial encryption approach. In: International Conference on Computing, Networking and Communications (ICNC). Song, S., Choi, B.-Y., Kim, D.: Selective encryption and component-oriented deduplication for mobile cloud data computing. In: Fifth International Conference on Computational and Information Sciences (ICCIS). Wang, H., et al.: Improved lightweight encryption algorithm based on optimized S-box. In: 47th International Carnahan Conference on Security Technology (ICCST). Kofuji, S.T.: Performance analysis of encryption algorithms on mobile devices. In: International Conference on Advances in Computing and Communications (ICACC). Sahoo, O.B., Kole, D.K., Rahaman, H.: An optimized S-box for advanced encryption standard (AES) design. In: Proceedings of CSE 331, Data Structures Fall 2000, p. Heydari, M., Shabgahi, G.L., Heydari, M.M.: Cryptanalysis of transposition ciphers with long key lengths using an improved genetic algorithm. In: International Conference on Computational Collective Intelligence. 2016 (2016)īoryczka, U., Dworak, K.: Cryptanalysis of transposition cipher using evolutionary algorithms. New York University Bookstore, New York (1943)Īlkim, E., et al.: Post-quantum key exchange-a new hope. Millikin, D.D.: Elementary Cryptography & Cryptanalysis. 3(2), 20–25 (2015)ĮVLNA WIRE, CAEEN SOIAE DRLEF WEDRE EVTOC: 19.4 Double transposition. īhowmick, A., Geetha, M.: Enhancing resistance of hill cipher using columnar and Myszkowski transposition. Singh, A., Nandal, A., Malik, S.: Implementation of caesar cipher with rail fence for enhancing data security.


IEEE (2011)īanerjee, A., et al.: CLOAK: a stream cipher based encryption protocol for mobile cloud computing. In: Frontiers of Information Technology (FIT). Malik, S.: A novel key-based transposition scheme for text encryption. We also present attack analysis for the proposed cryptosystem. We implement the proposed algorithm and experimentally analyze the performances of the algorithm on mobile devices. The idea is to remove security vulnerabilities of RFC by increasing the complexity of determining the pattern used for the transposition. We refer the proposed algorithm as “randomized rail fence cipher (RRFC)” as it uses pseudorandom numbers to select the fences for transposing characters of a file. In this paper, we address the same and propose a light-weight, energy-efficient and secure cryptosystem based on rail-fence cipher (RFC). Designing an efficient and secure cryptosystem for these resource-constrained modern smart devices is a challenging task. Particularly for applications that transfer personal information like healthcare records or location information. Transferring files between mobile devices through a wireless medium has security implications.
