Bansal, Satish; Srivastava, Rajesh - In: The IUP Journal of Computer Sciences VI (2012) 2, pp. 45-51
This paper presents some of the transposition and symmetric-based techniques, where the key is not used separately because it is hidden in the message. Early classical ciphers—substitution and transposition operations—have formed the building blocks for today’s powerful ciphers such as the...