Enhancing The Security of Caesar Cipher Using Double Substitution Method

Abstract

Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher is an example of substitution technique. In this paper we have proposed a cipher that uses basic encryption techniques of substitution and transposition. A single columnar transposition followed by a double substitution is applied on a Caesar cipher in order to make it a stronger and a more secure cipher.

Authors and Affiliations

Shahid Bashir Dar

Keywords

Related Articles

Computer Aided Music Generation Using Genetic Algorithm and Its Potential Applications

Music speaks what cannot be expressed, soothes the mind and gives it rest, heals the heart and makes is whole. Not everyone is gifted with a good voice but almost everyone has good ears when it comes to pleasant music. T...

Methodology and Analysis for Various SQL Injection Techniques

Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, secur...

Image fusion by Denoising and Segmentation

With the recent rapid developments in the field of sensing technologies, multisensory systems have become a reality in a growing number of fields such as remote sensing, medical imaging, machine vision and the military a...

A Survey on Lossless and Lossy Data Compression Methods

Compression is built into a broad range of technologies like storage systems, databases operating systems and software applications. It refers to the process of reducing the quantity of data used to represent the content...

A Comparative Study of Various Network Simulation Tools

In the area of network research, establishing a network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. Thus a network simulator tool helps the network developer to che...

Download PDF file
  • EP ID EP126708
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Shahid Bashir Dar (2014). Enhancing The Security of Caesar Cipher Using Double Substitution Method. International Journal of Computer Science & Engineering Technology, 5(7), 772-774. https://europub.co.uk/articles/-A-126708