CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Modified Caesar Cipher for Better Security Enhancement

by Kashish Goyal, Supriya Kinger
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 3
Year of Publication: 2013
Authors: Kashish Goyal, Supriya Kinger
10.5120/12722-9558

Kashish Goyal, Supriya Kinger . Modified Caesar Cipher for Better Security Enhancement. International Journal of Computer Applications. 73, 3 ( July 2013), 26-31. DOI=10.5120/12722-9558

@article{ 10.5120/12722-9558,
author = { Kashish Goyal, Supriya Kinger },
title = { Modified Caesar Cipher for Better Security Enhancement },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 3 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number3/12722-9558/ },
doi = { 10.5120/12722-9558 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:04.968109+05:30
%A Kashish Goyal
%A Supriya Kinger
%T Modified Caesar Cipher for Better Security Enhancement
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 3
%P 26-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is the process of scrambling a message so that only the intended recipient can read it. With the fast progression of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. Caesar cipher is a mono alphabetic cipher. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter. In this paper, author modified the traditional Caesar cipher and fixed the key size as one. Another thing alphabet index is checked if the alphabet index is even then increase the value by one else alphabet index is odd decrease the key value by one. Encryption and scrambling of the letters in the Cipher Text.

References
  1. Hamdan. O. Alanazi, B. B. Zaidan and A. A. Zaidan, New Comparative Study between DES, 3DES and AES within Nine Factors, Journal Of Computing. Vol. 2 , Issue 3. Pp. 152-157, 2010.
  2. Somdip Dey, Joyshree Nath and Ashoke Nath, "An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm", International Journal of Computer Applications (IJCA). Vol. 46, No. 20. Pp. 46-53, May 2012.
  3. S G Srikantaswamy, Dr. H D Phaneendra, "Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption", International Journal on Cryptography and Information Security (IJCIS). Vol. 2, No. 4. pp. 39-49, December 2012.
  4. Kashish Goyal, Supriya, "Security Concerns In the World of Cloud Computing", IJARCS International Journal of Advanced Research in Computer Science, Vol. 4, No. 4, pp. 230-234, March 2013.
  5. "CRYPTOGRAPHY". https://en//. wikipedia. org/wiki/cryptography
  6. Ochoche Abraham, Ganiyu O. Shefiu, "AN IMPROVED CAESAR CIPHER (ICC) ALGORITHM", International Journal Of Engineering Science & Advanced Technology (IJESAT). Vol. 2, Issue -5. pp . 1198 – 1202, October 2012.
  7. Jason Crampton, "Time-Storage Trade-Offs for Cryptographically-Enforced Access Control", Lecture Notes in Computer Science, Springer, 2011, Vol. 6879/2011, pp. 245-261.
  8. Jiannong Cao, Lin Liao, Guojun Wang, "Scalable key management for Secure Multicast Communication in the Mobile Environment" Pervasive and Mobile Computing Vol. 2, pp. 187–203, 2006.
  9. Gaurav Sharma, Ajay Kakkar, "Cryptography Algorithms and approaches used for data security", International Journal of Scientific & Engineering Research Vol. 3, Issue 6, 2012.
  10. Jawahar Thakur, Nagesh Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", International Journal of Emerging Technology and Advanced Engineering,Vol. 1, Issue 2, pp. 6-12, 2011.
  11. "ENCRYPTION"http://www. cse. wustl. edu/~jain/cse567-06/ftp/encryption_perf/index. htm
  12. Vinod Saroha, Suman Mor and Anurag Dagar, "Enhancing Security of Caesar Cipher by Double Columnar Transposition Method", International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 10. pp . 86-88, October 2012.
  13. Maulik Kothari, Manthan Shah, and Meet Malde, "Comcrypt: An Encryption Algorithm based on Vernam cipher", International Journal on Computer Science and Technology (IJCST). Vol. 3, Issue 4. pp . 364-367, Oct – Dec 2012.
  14. Akanksha Mathur, "A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms", International Journal on Computer Science and Engineering (IJCSE). Vol. 4 No. 09. pp . 1650-1657, September 2012.
  15. Ajit Singh, Aarti Nandal and swati Malik, "Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security", International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 12. Pp. 78-82, December 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Decryption Symmetric Encryption Plaintext Cipher Text