{"id":66359,"date":"2021-10-26T08:18:19","date_gmt":"2021-10-26T08:18:19","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66359"},"modified":"2022-01-04T14:22:45","modified_gmt":"2022-01-04T14:22:45","slug":"improving-caesar-cipher-for-greater-security","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66359","title":{"rendered":"Improving Caesar Cipher for greater security"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;127277&#8243;]Ant\u00f3nio Santos, Assistant Professor at ISTEC<br \/>\nRenato Vasconcelos J\u00fanior, BSc Multimedia Engineer graduated at ISTEC[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2021%2F10%2FImprovingCaesarCipherGreaterSecurity.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;161595&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243; uncode_shortcode_id=&#8221;636296&#8243;]Ant\u00f3nio Santos, Renato Vasconcelos J\u00fanior, <strong>Improving Caesar Cipher for greater security <\/strong><\/p>\n<p>DOI:\u00a010.31112\/kriativ-tech-2021-10-49[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;160572&#8243;]Before the invention of computers all cryptographic methods were calculated manually, and as such the cryptographic methods developed during that period took into account this limitation. The Caesar Cipher method was one of the first to be used and disseminated in several countries. This method is very simple, which implies that with current means you can break your security quickly and easily. However, it has a characteristic that, given its nature, any change in the method increases its safety, and like other authors in this article, it will be shown that a small change will imply some improvement in the method&#8217;s safety.[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;668595&#8243;]Encryption, replacement, Caesar&#8217;s Cipher, Enhancement.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;108889&#8243;][1] Holden, Joshua (2017). The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press, New Jersey<br \/>\n[2] Kahate, Atul (2003). Cryptography and network security, Tata McGraw-Hill, New Delhi,India.<br \/>\n[3] Kipper, G. (2004). Investigator\u00b4s Guide to Steganography. Auerbach Publications. USA.<br \/>\n[4] Paar, Christof and Pelzl, Jan (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, Berlin, Germany.<br \/>\n[5] Delfs, Hans and Knebl, Helmut (2007). Introduction to Cryptography: Principles and Applications, Second Edition, Springer-Verlag, Berlin, Germany.<br \/>\n[6] Singh, Simon (1999).The Code Book, Anchor Books: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Boks. New York, USA<br \/>\n[7] Aggarwal, Surabhi (2016). A Review on Enhancing Caesar Cipher, International Journal of Research Science &amp; Management, 3(6).<br \/>\n[8] Shrivastava, Manish, Jain, Shubham and Singh, Pushkar (2016). Content Based Symmetric Key Algorithm, International Conference on Computational Modeling and Security, Procedia Computer Science 85<br \/>\n[9] Stallings, William (2011). Cryptography and network security: Principles and Practice, Fifth Edition, Prentice Hall, New York<br \/>\n[10] Cobb, C. (2004). Cryptography for Dummies. Hoboken &#8211; New Jersey &#8211; United States of America: Wiley Publishing.<br \/>\n[11] Kumari, Sarita (2017). A research Paper on Cryptography Encryption and Compression Techniques, International Journal Of Engineering And Computer Science. Volume 6 Issue 4Page No. 20915-20919. DOI: 10.18535\/ijecs\/v6i4.20<br \/>\n[12] Katz, Jonathan and Lindell, Yehuda (2008). Introduction to Modern Cryptography, Chapman &amp; Hall\/CRC, Taylor &amp; Francis Group, Florida, USA.<br \/>\n[13] Trappe, Wade and Washington, Lawrence (2006). Introduction to Cryptography with Coding Theory, Second Edition, Pearson Education Inc., Pearson-Prentice Hall. New Jersey, USA.<br \/>\n[14] Churchhouse. Robert (2004). Codes and ciphers: Julius Caesar, the Enigma and the Internet, Cambridge University Press. Cambridge, UK.<br \/>\n[15] Baldoni, M. W.; Ciliberto, Ciro and Cattaneo, G. M. P. (2009). Elementary Number Theory, Cryptography and Codes. Springer-Verlag, Rome, Italy.<br \/>\n[16] Easttom, William (2021). Modern Cryptography Applied Mathematics for Encryption and Information Security, Springer Nature Switzerland AG, Springer. Cham, Switzerland.<br \/>\n[17] Bauer, Craig (2013). Secret History: The Story of Cryptology, Chapman and Hall\/CRC, Filadelfia, USA.<br \/>\n[18] Sinkov, Abraham (1966), Elementary Cryptanalysis &#8211; A Mathematical Approach, Fifth Printing, The Mathematical Association of America. Washington, USA.<br \/>\n[19] Bowne, Samuel (2018). Hands-On Cryptography with Python, Packt Publishing, Birmingham, UK.<br \/>\n[20] Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley &amp; Sons<br \/>\n[21] Musa, Sarhan M. (2018). Network Security and Cryptography: A Self-teaching Introduction. Mercury Learning &amp; Information. Virg\u00ednia, USA<br \/>\n[22] Jain, Atish; Dedhia, Ronak and Patil, Abhijit (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications. 129(13)<br \/>\n[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ant\u00f3nio Santos, Assistant Professor at ISTEC<br \/>\nRenato Vasconcelos J\u00fanior, BSc Multimedia Engineer graduated at ISTEC<br \/>\nDOI:\u00a010.31112\/kriativ-tech-2021-10-49<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66359"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66359"}],"version-history":[{"count":4,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66359\/revisions"}],"predecessor-version":[{"id":66431,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66359\/revisions\/66431"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}