Modified Caesar Cipher Using Rectangular Method for Enhanced Security

Priya Verma, Gurjot Singh Gaba, Himanshu Monga

Abstract


The most challenging area in today’s era is security over the network because now days all the industrialists, corporate sectors shares their precious information through internet. Researchers have designed various encryption techniques like Caesar cipher, play fair cipher, hill cipher, one time pad cipher, alpine cipher etc. to secure the information. Caesar cipher gets easily affected from any brute force attacker. By considering the cons of the existing Caesar cipher, a new technique is proposed in this paper which enhances its strength and puts stronger impact on the cipher text result which makes difficulty for a brute force attacker to determine the original plaintext back.


Keywords


Cryptography, Encryption, Caesar cipher, Brute force attack, Plaintext, Cipher text

Full Text:

PDF

References


R. Mane “A Review on Cryptography Algorithms, Attacks and Encryption Tools,â€International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 9, pp.8509-8514, 2015.

G. Gupta, R. Chawla, “Review on Encryption Ciphers of Cryptography in Network Security,â€International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 7, pp.1-26, 2012.

S.Chandra, “Acomparative survey of Symmetric and Asymmetric Key Cryptography,†International conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, pp. 83–93, 2014.

S. Shakti, “Encryption using different techniques,†International Journal in Multidisciplinary and Academic Research (SSIJMAR), vol. 2, no. 1, pp. 1-9, 2013.

O. Abraham, Ganiyu O. Shefiu, “An improved Caesar cipher algorithm,†International Journal of engineering science and advanced technology, vol. 2, pp.1199-1202, 2012.

Lim Chong Han, N.M. Mahyuddin, “An Implementation of Caesar Cipher and XOR Encryption Technique in a Secure Wireless Communication,†2nd International conference on Electronic Design (ICED), Penang, pp.111-116, 2014.

Rajan, D. Balakumaran, “Advancement in Caesar cipher by randomization and delta formation,†International conference on Information communication and Embedded systems (ICICES), Chennai, pp.1-4, 2014.

K. Goyal, S. Kinger, “Modified Caesar Cipher for Better Security Enhancement,†International Journal of Computer Applications, vol. 73, no. 3, pp. 27-31, 2013.

S.B. Dar, “Enhancing the Security of Caesar Cipher Using Double Substitution Method,†International Journal of Computer Science & Engineering Technology, vol. 5, no. 7, pp.772-774, 2014.

William Stallings, “Cryptography and Network Security: Principles & Practicesâ€, New York, NY: Pearson Education, 2006.

Y. S. Rajput, “An Improved Cryptographic Technique to Encrypt Text using Double Encryption,†International journal of Computer Applications, vol.86, no. 6, pp.24-28, 2014.




DOI: http://dx.doi.org/10.22385/jctecs.v8i0.116