Enhancing The Security of Caesar Cipher Using Double Substitution Method

Abstract

Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher is an example of substitution technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A single columnar transposition followed by a double substitution is applied on a Caesar cipher in order to make it a stronger and a more secure cipher.

Authors and Affiliations

Shahid Bashir Dar

Keywords

Related Articles

Modern Steganographic technique: A survey

Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...

SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The...

An Approach of Zero Correlation Linear Cryptanalysis

Differential and Linear Cryptanalysis are two most popular techniques that have been widely used to attacks block ciphers to reveal its weakness in substitution and permutation network. Most of the block ciphers which ar...

SECURITY ALGORITHM IN CLOUD COMPUTING: OVERVIEW

Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typicall...

Privacy preservation for Neural Network Training

Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the...

Download PDF file
  • EP ID EP126708
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Shahid Bashir Dar (2014). Enhancing The Security of Caesar Cipher Using Double Substitution Method. International Journal of Computer Science & Engineering Technology, 5(7), 772-774. https://europub.co.uk/articles/-A-126708