Open Access
Subscription Access
Open Access
Subscription Access
Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis
Subscribe/Renew Journal
Cryptography is the art of encoding messages into an unreadable form from a sender and re-transforming back to its readable form at the receiver end. This is an enhanced Caesar cipher against frequency analysis using bidirectional shift. This algorithm encrypts message bit by bit or character by character (stream cipher) and uses one key ideology (symmetric key cipher), the sender encrypts the message before transmitting and the receiver decrypts upon receiving using the same key as the one used for the encryption. It shifts the plain text characters to different direction which eliminates repetition of characters in the cipher text. Previous versions of Caesar cipher hadonly 26 English alphabets to be encrypted, which the attacker knew that there were only 26 choices to choose from, to determine the plain text. And when the alphabet of the same type are encrypted, they will have the same symbol representing each, which gives hint to attacker on how to break it by using frequency cryptanalysis. The enhanced method (Enhanced Caesar cipher) has 95 characters as digital messages as against 26 alphabets. Based on this method, the sender will transposition the bits in the message according to their sequence arrangement (odd and even position) to shift the characters in the odd position to the left and characters in the even position to the right side, based on the key given by the user, as the key to both shifts. Shifting the plain text to different directions mitigates the problem of repetition which the previous version suffers from. To make decryption more difficult, each character will switch position with the next to randomize their arrangement. The cipher was successfully developed and working accurately. It was developed on java platform using java eclipse IDE and NETBEANS IDE 7. 1. 2. It has successfully passed all the tests and proven its accuracy obtaining the result of 100% repetition free. Thus, the proposed method is highly resistant to frequency analysis. This provides more security than the earlier versions and it serves as an option to be integrated with other algorithms to strengthen the security.
Keywords
Caesar Cipher, Cryptography, Repetition Exclusion, Encryption, Decryption, Shift, Switch, Symmetric-Key Cipher, Key Generation.
Subscription
Login to verify subscription
User
Font Size
Information
- Ascii Characters and Table. Retrieved from http://www.asciitable. com/(accessed on August 21, 2013).
- Babu, R., Abraham, G. & Borasia, K. (2012). A review on securing distributed systems using symmetric key cryptography. International Journal of Advances in Science and Technology, April, 4(4), 1-7.
- De, P. S. & Maiti, P. (2013). DEDD symmetric-key cryptosystem. International Journal of Advanced Computer Research, March, 3(8), 171-176.
- Dey, S. (2012a). An Integrated Symmetric Key Cryptographic Method- Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm. India, West Bengal: Department of Computer Science, St. Xavier's College.
- Dey, S. (2012b). SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit Manipulation to Exclude Repetition from a Message to be Encrypted. India, West Bengal: Department of Computer Science St. Xavier's College.
- Goyal, D. & Srivastava, V. (2012). RDA Algortihm: Symmetric Key Algorithm. International Journal of Information and Communication Technology Research, 2(4), 342-347.
- Kumar, A., Varshney, A. K. & Kumar, P. (2012). PA substitution Cipher. International Journal of Engineering Research & Technology, December, 1(10), 1-4.
- Sharma, A., Bhatnagar, A., Tak, N., Sharma, A., Avasthi, J. & Sharma, P. (2012). An approach of substitution method based on ascii codes in encryption technique.
- International Journal of Advanced Studies in Computers, Science & Engineering, 1(3), 1-7.
- Stallings, W. (2006). Cryptography and Network Security 4/E., Pearson Education India. Retrieved from http://www.pearsonhighered.com/educator/product/Cryptography-and-Network-(accessed on September 1, 2013)
Abstract Views: 441
PDF Views: 0