There is no wealth like Knowledge
                            No Poverty like Ignorance
ARPN Journals

ARPN Journal of Engineering and Applied Sciences >> Call for Papers

ARPN Journal of Engineering and Applied Sciences

Design of a secure data transmission system between two computers using columnar transposition and AES encryption over the TCP/IP protocol

Full Text Pdf Pdf
Author Vuong Thuy Linh and Le Ngoc Giang
e-ISSN 1819-6608
On Pages 872-878
Volume No. 20
Issue No. 12
Issue Date September 15, 2025
DOI https://doi.org/10.59018/0625103
Keywords columnar transposition cipher, AES, HMAC, secure data transmission, TCP/IP, information security.


Abstract

In the current digital age, ensuring the security and confidentiality of data during network transmission has become critically important. This paper presents the design and implementation of a secure data transmission system between two computers using a combination of the Columnar Transposition cipher and the Advanced Encryption Standard (AES), operating over the TCP/IP protocol. The system consists of two main components: a sender module that performs encryption and transmits the data, and a receiver module that decrypts and reconstructs the original content. Specifically, the message is encrypted in two layers-the first layer employs the Columnar Transposition algorithm to scramble the order of characters in the plaintext, while the second layer uses AES to encrypt the transposed message, thereby enhancing the overall security. In addition, the system integrates a data integrity verification mechanism using Hash-based Message Authentication Code (HMAC), which helps detect any tampering or transmission errors. The encrypted data is transmitted via Wi-Fi using the TCP/IP protocol, ensuring broad compatibility and ease of deployment. At the receiver's side, the system verifies data integrity, performs decryption in reverse order, and restores the original message. The system was implemented and tested on two independent computers, demonstrating stable operation, high reliability, and suitability for applications in teaching, research, or deployment in secure internal communication systems. Experimental results confirm that the proposed solution is both feasible and effective in real-world scenarios.

Back

GoogleCustom Search



Seperator
    arpnjournals.com Publishing Policy Review Process Code of Ethics

Copyrights
© 2025 ARPN Publishers