Transposition Cipher as a Solution for a Better Bank Verification Number (BVN) Security in Communication Channel


Authors : Umar, M; Hassan, A; Abdullahi, I; Muhammad Shehu, Z

Volume/Issue : Volume 9 - 2024, Issue 5 - May

Google Scholar : https://tinyurl.com/y7j5k2wd

Scribd : https://tinyurl.com/pbphs24r

DOI : https://doi.org/10.38124/ijisrt/IJISRT24MAY1654

Abstract : BVN stands for Bank Verification Number, which is a biometric identification used in Nigeria to verify identity of bank customers, a transposition cipher is an encryption method that recognizes data sent via a communication channel in such a way, no one but the intended receiver can understand the original message. As we increasingly rely on digital channels to share and store information, it becomes crucial to prioritize information security to safeguard against unauthorized access, data breaches and cyber threats. This paper explores the principles, goals and intended outcomes of utilizing transposition ciphers as a data security measure, shedding light on its applications and benefits in protecting digital information. The data will be encrypted in two phases, in phase I, the stack method will be used and in phase II, the transposition will be applied on the data in phase I, the transposition is by using a newly constructed algebraic structure (Gp) which makes encryption and decryption possible using mathematical functions before sending the data over the communication channels, the resulted ciphertext after applying the transposition is more complex for the intruders but very simple for the intended receiver to decrypt, and the method that will be adopted is the construction of a function that can allow encryption and decryption of the data.

Keywords : Encryption, Decryption, Transposition, Cipher, BVN, Non Deranged Permutation.

References :

  1. Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using “Divide and Conquer Approach”. International Journal of Advance Research in Science and Engineering. 06(02):144-150.
  2. Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal .2(5): 22-25.
  3. Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt text message using double encryption. International Journal of Computer Applications 86(6):24-28.
  4. Shahid B. D. (2014), Enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
  5. Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
  6. Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology. 2(09):327-332.
  7. Garba A. I and Ibrahim A. A. (2010), A new method of constructing a Variety of Finite Group Based on some succession scheme. Internal Journal of Physical Science. 2(3):23-26.
  8. Massoud S., Sokouti B. and Saeid P. (2009), An Approach in Improving Transposition cipher System. Indian Journal of Science and Technology.2(8):9-15.
  9. Clement, Adewole & Muna, Cynthia & Odumu, Victor. (2022). bvn regulatory framework and banking system stability in nigeria.  International Journal of Innovative Research in Social Sciences and Strategic Management Techniques. 9. 62-79. 10.48028/iiprds/ijirsssmt.v9.i1.07
  10. Olumayokun, Akindutire & Adewumi, Ayodeji & Oluseyi, Oniwura. (2023). Bank Verification Number and Fraud Prevention and Detection in Nigerian Banks. International Journal of Research and Innovation in Social Science. VIII. 1727-1745. 10.47772/IJRISS.2023.7934.
  11. Ayodeji, Adewumi & Oluwamayokun, Akindutire & Oluseyi, Oniwura. (2023). Bank Verification Number and Fraud Prevention and Detection in Nigeria Banks.. 7. 10.47772/IJRISS.20.
  12. Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
  13. Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
  14. Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y. (2021). A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
  15. Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
  16. Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
  17. Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26.
  18. Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure Gp. Bayero Journal of Pure and applied sciences, 12(1):146-150.
  19. A. Hassan, A. Garko, S. Sani, U. Abdullahi and S. Sahalu (2023)  Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters, 2023, 1, 822 www.scipublications.org/journal/index.php/jml DOI: 10.31586/jml.2023.822
  20. Rejewski, Marian (1980). "An application of the theory of permutations in breaking the Enigma cipher". Applicationes Mathematicae. 16 (4): 543–559. doi:10.4064/am-16-4-543-559. ISSN 1233-7234.
  21. https://www.cbn.gov.ng/out/2017/ccd/circular% 20and%20exposure% 20draft% 20on% 20the% 20framework% 20for%20bvn% 20operations%20and%20watchlist.pdf
  22. Bacher, A.; Bodini, O.; Hwang, H.K.; Tsai, T.H. (2017). "Generating Random Permutations by Coin Tossing: Classical Algorithms, New Analysis, and Modern Implementation" (ACM Trans. Algorithms 13(2): 24:1–24:43 ed.). pp. 24–43.
  23. Zaks, S. (1984). "A new algorithm for generation of permutations". BIT Numerical Mathematics. 24 (2): 196–204. doi:10.1007/BF01937486. S2CID 30234652.
  24. Akyuz, M. Tony, L. W & Opusunju M. I (2019) Impact of bank verification number (BVN) on corrupt business practices in united bank for Africa in Abuja, international Journal of Management Studies and Social Science Research, 1(6), https://wwwresearchgate net / publication/338078769

BVN stands for Bank Verification Number, which is a biometric identification used in Nigeria to verify identity of bank customers, a transposition cipher is an encryption method that recognizes data sent via a communication channel in such a way, no one but the intended receiver can understand the original message. As we increasingly rely on digital channels to share and store information, it becomes crucial to prioritize information security to safeguard against unauthorized access, data breaches and cyber threats. This paper explores the principles, goals and intended outcomes of utilizing transposition ciphers as a data security measure, shedding light on its applications and benefits in protecting digital information. The data will be encrypted in two phases, in phase I, the stack method will be used and in phase II, the transposition will be applied on the data in phase I, the transposition is by using a newly constructed algebraic structure (Gp) which makes encryption and decryption possible using mathematical functions before sending the data over the communication channels, the resulted ciphertext after applying the transposition is more complex for the intruders but very simple for the intended receiver to decrypt, and the method that will be adopted is the construction of a function that can allow encryption and decryption of the data.

Keywords : Encryption, Decryption, Transposition, Cipher, BVN, Non Deranged Permutation.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe