An Improved Caesar Cipher Algorithm For Better Security

Johni S Pasaribu

Abstract


Cryptography is an art and science of converting original message into non-readable form. In this paper, we have introduced some novel improvements to the traditional Caesar cipher algorithm, which completely eliminates its fundamental weaknesses. Encryption is the process of scrambling a message so that only the intended recipient can read it. With the fast progression of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. In this project, encryption will be implemented information that makes it hard to be readable and secure. Caesar cipher is a mono alphabetic cipher. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter. In this paper, author improved the traditional Caesar cipher and fixed the key size as one. Another thing alphabet index is checked if the alphabet index is even then increase the value by one else alphabet index is odd decrease the key value by one. This fact was proven by some specific demonstrations.

Full Text:

PDF

References


O. Fajarianto, M. Iqbal, and J. T. Cahya, “Sistem Penunjang Keputusan Seleksi Penerimaan Karyawan Dengan Metode Weighted Product,” J. SISFOTEK Glob., vol. 7, no. 1, 2017.

M. I. Setiawan, H. Budiyanto, F. Kurniawan, S. W. Mudjanarko, and R. D. Nasihien, “2015 POROS MARITIM DUNIA DAN BENCANA TSUNAMI, PENGEMBANGAN AIR INFLATED STRUCTURE SEBAGAI FASILITAS TANGGAP BENCANA,” 2017.

A. Mursidi and S. Soeharto, “AN INTRODUCTION: EVALUATION OF QUALITY ASSURANCE FOR HIGHER EDUCATIONAL INSTITUTIONS USING RASCH MODEL,” JETL (Journal Educ. Teach. Learn., vol. 1, no. 1, pp. 1–6, 2017.

M. B. N. Wajdi, “Spiritual Counseling As An Alternative Problem Solving,” Educ. J. Educ., vol. 1, no. 2, pp. 11–28, 2016.

Hamdan.O.Alanazi, B.B.Zaidan and A.A.Zaidan, New Comparative Study between DES, 3DES and AES within Nine Factors, Journal Of Computing. Vol. 2 , Issue 3. Pp.152-157, 2010.

William Stallings, Cryptography and Network, New York: Prentice Hall, 2006.

B.A.Forouzan, Cryptography & Network Security, New York: McGraw Hill Book Company, 2008.

Somdip Dey, Joyshree Nath and Ashoke Nath, “An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm”, International Journal of Computer Applications (IJCA). Vol. 46, No. 20. Pp. 46-53, May 2012.

S G Srikantaswamy, Dr. H D Phaneendra, “Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption”, International Journal on Cryptography and Information Security (IJCIS). Vol. 2, No.4. pp. 39-49, December 2012.

Kashish Goyal, Supriya, “Security Concerns In the World of Cloud Computing”, IJARCS International Journal of Advanced Research in Computer Science, Vol. 4, No. 4, pp. 230-234, March 2013.

”CRYPTOGRAPHY”.https://en//.wikipedia.org/wiki/cryptography

Ochoche Abraham, Ganiyu O. Shefiu, “AN IMPROVED CAESAR CIPHER (ICC) ALGORITHM”, International Journal Of Engineering Science & Advanced Technology (IJESAT). Vol. 2, Issue -5. pp .1198 – 1202, October 2012.

Jason Crampton, “Time-Storage Trade-Offs for Cryptographically-Enforced Access Control”, Lecture Notes in Computer Science, Springer, 2011, Vol. 6879/2011, pp. 245-261.

[Online]Available:http://www.cs.trincoll.edu/~crypto/historical/caesar.html. Last visited on 15-09-2016

Jiannong Cao, Lin Liao, Guojun Wang, “Scalable key management for Secure Multicast Communication in the Mobile Environment”, Pervasive and Mobile Computing, Vol. 2, pp.187–203, 2006.

Ayushi,“A Symmetric Key Cryptographic Algorithm”, International Journal of Computer Applications (0975 - 8887), Vol. 1, No. 15, 2010.

Gaurav Sharma, Ajay Kakkar, "Cryptography Algorithms and approaches used for data security”, International Journal of Scientific & Engineering Research, Vol. 3, Issue 6, 2012.

Shyam Nandan Kumar,“Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, Vol. 3, No. 1, pp. 1-11, 2015.

Jason Crampton, Time-Storage Trade-Offs for Cryptographically-Enforced Access Control, Lecture Notes in Computer Science, Springer, 2011, Vol. 6879/2011, pp. 245-261.

Jiannong Cao, Lin Liao, Guojun Wang, “Scalable key management for Secure Multicast Communication in the Mobile Environment” Pervasive and Mobile Computing Vol. 2, pp.187–203, 2006.

Jawahar Thakur, Nagesh Kumar, ”DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering,Vol. 1, Issue 2, pp. 6-12, 2011.

“ENCRYPTION”http://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/index.htm

Vinod Saroha, Suman Mor and Anurag Dagar, “Enhancing Security of Caesar Cipher by Double Columnar Transposition Method”, International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 10. pp .86-88, October 2012.

Hamdan.O.Alanazi, B.B.Zaidan and A.A.Zaidan, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, Journal of Computing, Vol.2 , Issue 3. Pp.152-157, March 2010.

Maulik Kothari, Manthan Shah, and Meet Malde, “Comcrypt: An Encryption Algorithm based on Vernam cipher”, International Journal on Computer Science and Technology (IJCST). Vol. 3, Issue 4.pp .364-367, Oct – Dec 2012.

Akanksha Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms”, International Journal on Computer Science and Engineering (IJCSE). Vol. 4 No. 09. pp .1650-1657, September 2012.

Ajit Singh, Aarti Nandal and swati Malik, “Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security”, International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 12. Pp. 78-82, December 2012.

Nurmawati, N. (2014) ‘ANALISIS FAKTOR FAKTOR YANG MEMPENGARUHI KONSUMEN DALAM PENGAMBILAN KEPUTUSAN PEMBELIAN PRODUK MIE INSTAN MEREK INDOMIE’, Jurnal Teknik Industri, 10(18).

Nurmawati, N. (2014) ‘FAKTOR-FAKTOR YANG BERPENGARUH DALAM PERBAIKAN KUALITAS LAYANAN BERDASARKAN HARAPAN PELANGGAN PT X’, Jurnal Teknik Industri, 13(21).


Refbacks

  • There are currently no refbacks.