{"id":66482,"date":"2022-06-20T10:10:39","date_gmt":"2022-06-20T10:10:39","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66482"},"modified":"2022-06-20T10:10:39","modified_gmt":"2022-06-20T10:10:39","slug":"security-from-caesar-to-vigenere","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66482","title":{"rendered":"Security from Caesar to Vigen\u00e8re"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;200235&#8243;]<\/p>\n<p style=\"font-weight: 400;\">Ant\u00f3nio Santos,\u00a0<span lang=\"EN-US\">Assistant Professor at ISTEC <\/span><\/p>\n<p>[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2022%2F06%2FAntonioSantosSecurityCaesarVigenere.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;378365&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243; uncode_shortcode_id=&#8221;100000&#8243;]Ant\u00f3nio Santos,\u00a0<b>Security from Caesar to Vigen\u00e8re<\/b><br \/>\nDOI: 10.31112\/kriativ-tech-2022-06-74[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;265030&#8243;]Cryptography has accompanied the human being for centuries, starting with being used only by kings and emperors to communicate with their governors and military until now when its use is in all information transfers carried out digitally. The Caesar cipher was one of the first to appear and served for Roman emperors to communicate with their generals and provincial governors. It is a simple substitution number, and as such it has some limitations which, at the time it was used, were not relevant because of the illiteracy of the populations. While the Vigen\u00e8re cipher brought much more security, filling the vulnerabilities of the Caeser cipher, transforming the Caeser cipher into a polyalphabetic substitution cipher. In this study we will compare the figures: Caeser, Shift and Vigen\u00e8re; regarding your safety. It is also intended to make some modifications in order to improve and optimize the code without changing the original cipher.<br \/>\n[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;124258&#8243;]Encryption, substitution method, Caesar cipher, Shift cipher, Vigen\u00e8re cipher.[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;318050&#8243;][1] Jain, A., Dedhia, R. and Patil, A. (2015) \u201cEnhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication\u201d, International Journal of Computer Applications, Vol. 129 No.13, pp: 144-150,<br \/>\n[2] Saraswat, A., Khatria, C., Sudhakara, Thakrala, P., Biswasa, P.. ( 2016 ) An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication, 2nd International Conference on Intelligent Computing, Communication &amp; Convergence (ICCC-2016), Procedia Computer Science 92 pp 355 \u2013 360.<br \/>\n[3] Balogun, A.O. , Sadiku, P. O., Mojeed, H. A., Raifu, H. A. (2017) Multiple Caesar Cypher Encryption Algorithm. ABACUS, (Mathematics Science Series) Vol. 44, No 2. pp 250-258.<br \/>\n[4] Kahate, Atul (2003). Cryptography and network security, Tata McGraw-Hill, New Delhi.<br \/>\n[5] Paar, Christof\\ and Pelzl, Jan (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, Berlin.<br \/>\n[6] Stinson, D.R. and Paterson, M. B. (2018) Cryptography: Theory and Practice, Fourth Edition. Textbooks in Mathem\u00e1tics, CRC Press.<br \/>\n[7] Katz, Jonathan and Lindell, Yehuda (2015). Introduction to Modern Cryptography. Second Edition, Taylor &amp; Francis Group, LLC, CRC Press.<br \/>\n[8] Aggarwal, Surabhi (2016). A Review on Enhancing Caesar Cipher, International Journal of Research Science &amp; Management, 3(6).<br \/>\n[9] Stallings, William (2017). Cryptography and network security: Principles and Practice, Fifth Edition, Prentice Hall, New York.<br \/>\n[10] Shrivastava, M., Jain, M, and Singh, P. (2016) Content Based Symmetric Key Algorithm, International Conference on Computational Modeling and Security, Procedia Computer Science 85, pp. 222 \u2013 227.<br \/>\n[11] Singh, Simon (1999).The Code Book, Anchor Books: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Boks. New York.<br \/>\n[12] Stamp, Mark and Low, Richard M.(2007). Applied Cryptanalysis &#8211; Breaking Ciphers in the Real World. Wiley-Interscience, John Wiley &amp; Sons, Inc..<br \/>\n[13] Holden, Joshua (2017), The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Princeton University Press, New Jersey.<br \/>\n[14] Kumari, Sarita (2017) A research Paper on Cryptography Encryption and Compression Techniques, International Journal Of Engineering And Computer Science. Volume 6 Issue 4Page No. 20915-20919. DOI: 10.18535\/ijecs\/v6i4.20.<br \/>\n[15] Luciano, D. and Priche,, G. Cryptology: From Caesar Ciphers to Public-Key Cryptosystems, The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17<br \/>\n[16] Omolara O.E., Oludare A.I. and Abdulahi S.E..( 2014) Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication, Computer Engineering and Intelligent Systems Vol.5, No.5, pp 34- 47<br \/>\n[17] Singh, Pooja and Sen, Pintu (2017). Enhancing Security of Caesar Cipher Using Divide and Conquer Approach, International Journal of Advance Research in Science and Enginheering, Volume 6, special issue (02).<br \/>\n[18] Sinkov, Abraham (1966), Elementary Cryptanalysis &#8211; A Mathematical Approach, Fifth Printing, The Mathematical Association of America. Washington, USA.<br \/>\n[19] Mollin, Richard A. (2007) An Introduction to Cryptography, Second Edition. Discrete Mathematics and its Applications, Chapman &amp; Hall\/CRC, California.<br \/>\n[20] Santos, Antonio and Vasconcelos Junior, Renato (2021). Improving Caesar Cipher for greater security. kriativ-tech (9) ,DOI: 10.31112\/kriativ-tech-2021-10-54.<br \/>\n[21] Stinson, Douglas and Paterson, Maura. (2018) Cryptography: Theory and Practice fourth edition. CRC Press, CRC Press LLC. Florida.<br \/>\n[22] Musa, Sarhan M. (2018). Network Security and Cryptography: A Self-teaching Introduction. Mercury Learning &amp; Information. Virg\u00ednia.<br \/>\n[23] Stallings, William (2017). Cryptography and network security: Principles and Practice, Seventh Edition. Pearson. Essex.<br \/>\n[24] Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley &amp; Sons.<br \/>\n[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ant\u00f3nio Santos,\u00a0Assistant Professor at ISTEC<br \/>\nDOI: 10.31112\/kriativ-tech-2022-06-74<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66482"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66482"}],"version-history":[{"count":1,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66482\/revisions"}],"predecessor-version":[{"id":66485,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66482\/revisions\/66485"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}