Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.

Authors

António Santos, Assistant Professor at ISTECRenato Vasconcelos Júnior, BSc Multimedia Engineer graduated at ISTEC

Media

PDF

To cite this article

António Santos, Renato Vasconcelos Júnior, Improving Caesar Cipher for greater security DOI: 10.31112/kriativ-tech-2021-10-49

Abstract

Before the invention of computers all cryptographic methods were calculated manually, and as such the cryptographic methods developed during that period took into account this limitation. The Caesar Cipher method was one of the first to be used and disseminated in several countries. This method is very simple, which implies that with current means you can break your security quickly and easily. However, it has a characteristic that, given its nature, any change in the method increases its safety, and like other authors in this article, it will be shown that a small change will imply some improvement in the method's safety.

Keywords

Encryption, replacement, Caesar's Cipher, Enhancement.

References

[1] Holden, Joshua (2017). The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press, New Jersey[2] Kahate, Atul (2003). Cryptography and network security, Tata McGraw-Hill, New Delhi,India.[3] Kipper, G. (2004). Investigator´s Guide to Steganography. Auerbach Publications. USA.[4] Paar, Christof and Pelzl, Jan (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, Berlin, Germany.[5] Delfs, Hans and Knebl, Helmut (2007). Introduction to Cryptography: Principles and Applications, Second Edition, Springer-Verlag, Berlin, Germany.[6] Singh, Simon (1999).The Code Book, Anchor Books: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Boks. New York, USA[7] Aggarwal, Surabhi (2016). A Review on Enhancing Caesar Cipher, International Journal of Research Science & Management, 3(6).[8] Shrivastava, Manish, Jain, Shubham and Singh, Pushkar (2016). Content Based Symmetric Key Algorithm, International Conference on Computational Modeling and Security, Procedia Computer Science 85[9] Stallings, William (2011). Cryptography and network security: Principles and Practice, Fifth Edition, Prentice Hall, New York[10] Cobb, C. (2004). Cryptography for Dummies. Hoboken - New Jersey - United States of America: Wiley Publishing.[11] Kumari, Sarita (2017). A research Paper on Cryptography Encryption and Compression Techniques, International Journal Of Engineering And Computer Science. Volume 6 Issue 4Page No. 20915-20919. DOI: 10.18535/ijecs/v6i4.20[12] Katz, Jonathan and Lindell, Yehuda (2008). Introduction to Modern Cryptography, Chapman & Hall/CRC, Taylor & Francis Group, Florida, USA.[13] Trappe, Wade and Washington, Lawrence (2006). Introduction to Cryptography with Coding Theory, Second Edition, Pearson Education Inc., Pearson-Prentice Hall. New Jersey, USA.[14] Churchhouse. Robert (2004). Codes and ciphers: Julius Caesar, the Enigma and the Internet, Cambridge University Press. Cambridge, UK.[15] Baldoni, M. W.; Ciliberto, Ciro and Cattaneo, G. M. P. (2009). Elementary Number Theory, Cryptography and Codes. Springer-Verlag, Rome, Italy.[16] Easttom, William (2021). Modern Cryptography Applied Mathematics for Encryption and Information Security, Springer Nature Switzerland AG, Springer. Cham, Switzerland.[17] Bauer, Craig (2013). Secret History: The Story of Cryptology, Chapman and Hall/CRC, Filadelfia, USA.[18] Sinkov, Abraham (1966), Elementary Cryptanalysis - A Mathematical Approach, Fifth Printing, The Mathematical Association of America. Washington, USA.[19] Bowne, Samuel (2018). Hands-On Cryptography with Python, Packt Publishing, Birmingham, UK.[20] Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley & Sons[21] Musa, Sarhan M. (2018). Network Security and Cryptography: A Self-teaching Introduction. Mercury Learning & Information. Virgínia, USA[22] Jain, Atish; Dedhia, Ronak and Patil, Abhijit (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications. 129(13)