Authors :
Umar, M; Hassan, A; Abdullahi, I; Muhammad Shehu, Z
Volume/Issue :
Volume 9 - 2024, Issue 5 - May
Google Scholar :
https://tinyurl.com/y7j5k2wd
Scribd :
https://tinyurl.com/pbphs24r
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24MAY1654
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
BVN stands for Bank Verification Number,
which is a biometric identification used in Nigeria to
verify identity of bank customers, a transposition cipher
is an encryption method that recognizes data sent via a
communication channel in such a way, no one but the
intended receiver can understand the original message.
As we increasingly rely on digital channels to share and
store information, it becomes crucial to prioritize
information security to safeguard against unauthorized
access, data breaches and cyber threats. This paper
explores the principles, goals and intended outcomes of
utilizing transposition ciphers as a data security measure,
shedding light on its applications and benefits in
protecting digital information. The data will be encrypted
in two phases, in phase I, the stack method will be used
and in phase II, the transposition will be applied on the
data in phase I, the transposition is by using a newly
constructed algebraic structure (Gp) which makes
encryption and decryption possible using mathematical
functions before sending the data over the communication
channels, the resulted ciphertext after applying the
transposition is more complex for the intruders but very
simple for the intended receiver to decrypt, and the
method that will be adopted is the construction of a
function that can allow encryption and decryption of the
data.
Keywords :
Encryption, Decryption, Transposition, Cipher, BVN, Non Deranged Permutation.
References :
- Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using “Divide and Conquer Approach”. International Journal of Advance Research in Science and Engineering. 06(02):144-150.
- Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal .2(5): 22-25.
- Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt text message using double encryption. International Journal of Computer Applications 86(6):24-28.
- Shahid B. D. (2014), Enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
- Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
- Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology. 2(09):327-332.
- Garba A. I and Ibrahim A. A. (2010), A new method of constructing a Variety of Finite Group Based on some succession scheme. Internal Journal of Physical Science. 2(3):23-26.
- Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.
- Clement, Adewole & Muna, Cynthia & Odumu, Victor. (2022). bvn regulatory framework and banking system stability in nigeria. International Journal of Innovative Research in Social Sciences and Strategic Management Techniques. 9. 62-79. 10.48028/iiprds/ijirsssmt.v9.i1.07
- Olumayokun, Akindutire & Adewumi, Ayodeji & Oluseyi, Oniwura. (2023). Bank Verification Number and Fraud Prevention and Detection in Nigerian Banks. International Journal of Research and Innovation in Social Science. VIII. 1727-1745. 10.47772/IJRISS.2023.7934.
- Ayodeji, Adewumi & Oluwamayokun, Akindutire & Oluseyi, Oniwura. (2023). Bank Verification Number and Fraud Prevention and Detection in Nigeria Banks.. 7. 10.47772/IJRISS.20.
- Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
- Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
- Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y. (2021). A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
- Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
- Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
- Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26.
- Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure Gp. Bayero Journal of Pure and applied sciences, 12(1):146-150.
- A. Hassan, A. Garko, S. Sani, U. Abdullahi and S. Sahalu (2023) Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters, 2023, 1, 822 www.scipublications.org/journal/index.php/jml DOI: 10.31586/jml.2023.822
- Rejewski, Marian (1980). "An application of the theory of permutations in breaking the Enigma cipher". Applicationes Mathematicae. 16 (4): 543–559. doi:10.4064/am-16-4-543-559. ISSN 1233-7234.
- https://www.cbn.gov.ng/out/2017/ccd/circular% 20and%20exposure% 20draft% 20on% 20the% 20framework% 20for%20bvn% 20operations%20and%20watchlist.pdf
- Bacher, A.; Bodini, O.; Hwang, H.K.; Tsai, T.H. (2017). "Generating Random Permutations by Coin Tossing: Classical Algorithms, New Analysis, and Modern Implementation" (ACM Trans. Algorithms 13(2): 24:1–24:43 ed.). pp. 24–43.
- Zaks, S. (1984). "A new algorithm for generation of permutations". BIT Numerical Mathematics. 24 (2): 196–204. doi:10.1007/BF01937486. S2CID 30234652.
- Akyuz, M. Tony, L. W & Opusunju M. I (2019) Impact of bank verification number (BVN) on corrupt business practices in united bank for Africa in Abuja, international Journal of Management Studies and Social Science Research, 1(6), https://wwwresearchgate net / publication/338078769
BVN stands for Bank Verification Number,
which is a biometric identification used in Nigeria to
verify identity of bank customers, a transposition cipher
is an encryption method that recognizes data sent via a
communication channel in such a way, no one but the
intended receiver can understand the original message.
As we increasingly rely on digital channels to share and
store information, it becomes crucial to prioritize
information security to safeguard against unauthorized
access, data breaches and cyber threats. This paper
explores the principles, goals and intended outcomes of
utilizing transposition ciphers as a data security measure,
shedding light on its applications and benefits in
protecting digital information. The data will be encrypted
in two phases, in phase I, the stack method will be used
and in phase II, the transposition will be applied on the
data in phase I, the transposition is by using a newly
constructed algebraic structure (Gp) which makes
encryption and decryption possible using mathematical
functions before sending the data over the communication
channels, the resulted ciphertext after applying the
transposition is more complex for the intruders but very
simple for the intended receiver to decrypt, and the
method that will be adopted is the construction of a
function that can allow encryption and decryption of the
data.
Keywords :
Encryption, Decryption, Transposition, Cipher, BVN, Non Deranged Permutation.