Secured Communication involves Encryption process at the sending end and Decryption process at the receiving end of the communication system. Many Ciphers have been developed to provide data security . The efficiency of the Ciphers that are being used depends mainly on their throughput and memory requirement. Using of large key spaces with huge number of rounds with multiple complex operations may provide security but at the same time affects speed of operation. Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation operations. The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original Caesar cipher was restricted only for alphabets. The key used for Caesar Substitution has been derived using a key Matrix Trace value restricted to Modulo 94. The Matrix elements are generated using recursive random number generation equation, the output of which solely depends on the value of seed selected . In this paper, we made an effort to incorporate modern cipher properties to classical cipher. The second stage of encryption has been performed using columnar transposition with arbitrary random order column selection. Thus the proposed Scheme is a hybrid version of classical and modern cipher properties. The proposed method provides appreciable Security with high throughput and occupies minimum memory space. The Method is resistant against brute-force attack with 93! Combinations of keys, for Caesar encryption.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Cryptography has several important aspects in supporting the security of the data, which
guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the
public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be
increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time
required in the decryption process is very long. Theorem used in this research is the Chinese
Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size
of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its
implementation in Java programming. This implementation is intended as a means of proof of
tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text
Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of
approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096
bits, the conclusion that the decryption process is also effective undertaken more rapidly.
However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the
time needed is longer to generate the keys.
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
Data security is an important issue in modern era. In this paper, we use both symmetric and asymmetric key for encryption and decryption for data security. In our technique, two phases are used. In the 1st phase symmetric key encryption is used and in 2nd phase asymmetric key encryption like RSA is used.
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule.
This presentation introduces the Basics of Cryptography and Network Security concepts. Heavily derived from content from William Stalling's book with the same title.
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir– Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...IJNSA Journal
In this paper we propose a scheme of encryption for Block ciphers in N-alphabet, where every member of any m-block of plain text is enciphered by different permutations which are generated by the help of a secret key word. Further we extend this method to multicode encryption using the fact that encrypting each member differently is the basis of multicode encryption.
This paper proposes a new compressive
sensing based method for simultaneous data
compression and convergent encryption for secure
deduplication to efficiently use for the cloud storage. It
performs signal acquisition, its compression and
encryption at the same time. The measurement matrix
is generated using a hash key and is exploited for
encryption. It seems that it is very suitable for the cloud
model considering both the data security and the
storage efficiently.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
More Related Content
Similar to Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Cryptography has several important aspects in supporting the security of the data, which
guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the
public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be
increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time
required in the decryption process is very long. Theorem used in this research is the Chinese
Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size
of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its
implementation in Java programming. This implementation is intended as a means of proof of
tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text
Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of
approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096
bits, the conclusion that the decryption process is also effective undertaken more rapidly.
However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the
time needed is longer to generate the keys.
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
Data security is an important issue in modern era. In this paper, we use both symmetric and asymmetric key for encryption and decryption for data security. In our technique, two phases are used. In the 1st phase symmetric key encryption is used and in 2nd phase asymmetric key encryption like RSA is used.
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule.
This presentation introduces the Basics of Cryptography and Network Security concepts. Heavily derived from content from William Stalling's book with the same title.
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
In this paper, we have combined the Robust
Cryptosystem for Non-invertible matrices based on Hill Cipher
technique with steganography method in order to securely
transmit text message. The steganography method used is LSB
insertion technique. The encryption and steganography
methods are used subsequently along with two randomization
technique: one of XOR the encrypted text and another of
randomized LSB insertion in any cover image. These two layers
of shuffling of text at different stages of encryption and
steganography provide two extra layers of security and make
the system robust against cryptanalytic attacks.
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir– Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...IJNSA Journal
In this paper we propose a scheme of encryption for Block ciphers in N-alphabet, where every member of any m-block of plain text is enciphered by different permutations which are generated by the help of a secret key word. Further we extend this method to multicode encryption using the fact that encrypting each member differently is the basis of multicode encryption.
This paper proposes a new compressive
sensing based method for simultaneous data
compression and convergent encryption for secure
deduplication to efficiently use for the cloud storage. It
performs signal acquisition, its compression and
encryption at the same time. The measurement matrix
is generated using a hash key and is exploited for
encryption. It seems that it is very suitable for the cloud
model considering both the data security and the
storage efficiently.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
In this age of universal electronic connectivity of viruses and hackers of electronic eavesdropping and electronic fraud, there is indeed needed to store the information securely. This, in turn, led to a heightened awareness to protect data and resources from disclosure, to guarantee the authenticity of data and messages and to protect systems from network-based attacks. Information security via encryption decryption techniques is a very popular research area for many people’s over the years. This paper elaborates the basic concept of the cryptography, specially public and private cryptography. It also contains a review of some popular encryption decryption algorithms. A modified method is also proposed. This method is fast in comparison to the existing methods.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption
1. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
DOI:10.5121/ijcis.2012.2405 39
IMPROVED CAESAR CIPHER WITH RANDOM
NUMBER GENERATION TECHNIQUE AND
MULTISTAGE ENCRYPTION
S G Srikantaswamy1
and Dr. H D Phaneendra2
1
Research scholar, National Institute of Engineering, Mysore
sg_srikantaswamy@yahoo.com
2
Professor and Research Guide, National Institute of Engineering, Mysore
hdphanee@yahoo.com
ABSTRACT :
Secured Communication involves Encryption process at the sending end and Decryption process at the
receiving end of the communication system. Many Ciphers have been developed to provide data security .
The efficiency of the Ciphers that are being used depends mainly on their throughput and memory
requirement. Using of large key spaces with huge number of rounds with multiple complex operations may
provide security but at the same time affects speed of operation. Hence in this paper we have proposed a
method to improve Caesar cipher with random number generation technique for key generation operations.
The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original
Caesar cipher was restricted only for alphabets. The key used for Caesar Substitution has been derived
using a key Matrix Trace value restricted to Modulo 94. The Matrix elements are generated using recursive
random number generation equation, the output of which solely depends on the value of seed selected . In
this paper, we made an effort to incorporate modern cipher properties to classical cipher. The second stage
of encryption has been performed using columnar transposition with arbitrary random order column
selection. Thus the proposed Scheme is a hybrid version of classical and modern cipher properties. The
proposed method provides appreciable Security with high throughput and occupies minimum memory
space. The Method is resistant against brute-force attack with 93! Combinations of keys, for Caesar
encryption.
KEYWORDS:
Encryption, Decryption, Substitution, Cipher, Random Number, Recursive, Primitive root, Plaintext,
Ciphertext
1. INTRODUCTION :
In Cryptography, the Caesar cipher is one of the most widely known encryption technique. Caesar
cipher is a type of substitution cipher in which each letter in the plaintext is replaced by a letter
some fixed number of positions down the alphabet. The encryption is represented using modular
arithmetic
c by first transforming the letters into numbers, according to the scheme A=0,B=1…..Z=25.
Encryption of a letter x by a shift n can be described mathematically as En(x)=(x+n) mod 26.
Decryption is performed as Dn(x)=(x-n) mod 26 (Wikipedia, Caesar_cipher).
2. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
40
If it is known that a given ciphertext is Caesar cipher, then brute-force cryptanalysis is easily
performed (William stallings, 2004, Cryptography and Network security, 3rd
edition, Pearson
Education)
Hybrid approach of Caesar cipher and Columnar transposition , the combination of the two have
been discussed . (Dharmendra Kumar Gupta et al, 2012). This approach is intended to propose
Cipher with good features , But the key generation technique should be strengthened to thwart
the efforts of cryptanalysis and also key space adapted is not sufficient.
Classical techniques and modern techniques can be combined to produce better results.
Avalanche effect has been compared by changing the key value for DES, Playfair and Vigenere
(Fauzan saeed and Mustafa Rashid, 2010). The Comparative study of both classical and modern
techniques have been discussed by considering playfair, Vigenere cipher, Caesar cipher , DES
and Blowfish.(Sriram Ramanujam and Mrimuthu Karuppiah, 2011).But the desirable requirement
is to use wider key-space with high degree of security. This can be achieved by using a key-
length of 128-bit or more. The data encryption technique using compression technique has been
proposed in (Monodeep Banerjee et al, 2012). Thus the combination of encryption and
compression provides appreciable security but the key length and efficient compression
techniques are required for appreciable security.
Design of robust cipher for non-invertible matrices based on hill cipher has been discussed in
(Rushdi A.Hamamreh and Mousa Farajallah, 2009). The proposed method suggests the idea of
converting a given plaintext characters into two ciphertext characters. The method also suggested
the use of RSA algorithm for encrypting the key used for encryption and decryption.
Cryptographic techniques using graceful codes has been proposed ( Prof.K.Govinda and
Dr.E.Sathiyamoorth”, Multilevel Cryptography Technique using Graceful Codes “- JGRCS,
Volume 2, N0.7, July 2011). This method is useful for small amount of data.
The hill cipher can be improved with the combination of Affine cipher. Affine hill cipher mixes
the hill cipher with a nonlinear affine transformation. The extended system proposed a method in
which matrix inverse computation has been eliminated ( A.F.A.Abidin et al, 2011). Vigenere
cipher is able to be cracked, because of the lack of diffusion property. The Vigenere cipher can be
made Secure by using padding bits and one can diffuse the statistical properties of the messages
(Phillip I Wilson and Mario Garcia, 2006). Effective key length should be adopted . The
algorithm works for alphabets . Play fair cipher can be made more effective with the use of linear
feedback shift register (Packirisamy Murali and Gandhi doss Senthil kumar, 2008). The desired
properties of a random number generator functions are: It should be efficiently computable, the
period should be large and successive values should be independent and uniformly distributed (
Raj Jain , “ the Computer Systems Performance analysis “, John Wiley & sons Inc.) .
2.ENCRYPTION ALGORITHM :
1) Read the Plaintext Message
2) Replace the Plaintext characters by their numerical value
3) Generate a Secret key using random number generation technique
Xn=K Xn-1 + 1 mod n, where K is the Seed value and n is an integer representing modulus.
4) Arrange the Secret key generated in step 3 , in the matrix form of the order I X J
5) Obtain the Trace of the Matrix
Secret Key Value=(Trace of the Key matrix ) mod 94
6) Perform the Caesar substitution encryption using the secret key value generated in step 5
7) Arrange the Ciphertext sequence in the order I X J
3. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
41
8) Obtain the transpose of the matrix I X J
9) Exclusive-or the results of step 7 and step 8
10) Perform Columnar transposition
11) Perform Permutation transposition
12) Transmit the Ciphertext .
3.DECRYPTION ALGORITHM :
1) Read the Ciphertext Message
2) Arrange them in the matrix form of order I X J
3) Obtain the transpose of the Matrix I X J
4) Exclusive-or the results of step 2 and step 3
5) Perform reverse Caesar Substitution
6) Process the Plaintext
4.ALGORITHM DESCRIPTION AND ILLUSTRATION :
The Proposed method can be applied to encrypt Plaintext messages composed of alphabets ,
numbers and symbols. The above characters have been assigned the numerical values as shown
below.
Character Value Table :
4. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
42
5. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
43
6. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
44
Encryption operation is expressed as :
C=E(P)=(P+K) mod 94
“K” can take any Value in the range 0 to 93.
Decryption operation is expressed as :
P=D( C ) =( C-K) mod 94
“K” can take any Value in the range 0 to 93.
Algorithm Illustration
Consider a plaintext Message which is to be encrypted using the proposed algorithm.
“This Message is very Secret OK”.
Now replace each character of the Plaintext message by its numerical value and arranging them in
5 X 5 Matrix form, we get the following set of values.
T=51 h=71 i=72 s=82 M=44 e=68 s=82 s=82 a=64 g=70 e=68 i=72
s=82
V=85 e=68 r=85 y=88 S=50 e=68 c=66 r=85 e=68 t=83 O=46 K=42
7. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
45
42
46
83
68
85
66
68
50
88
85
68
85
82
72
68
70
64
82
82
68
44
82
72
71
51
Now to encrypt the Plaintext ,generate the key using random number generation technique using
recursive equation.
Consider Multiplicative Linear Congruential Generators ( LCGs) for random generation.
Xn= a Xn-1 mod m.
Multiplicative LCG will be a full-period generator if and only if the multiplier “a” is a primitive
root of the modulus m.
Let m= 31, a prime number
a= 3 ( a primitive root of m)
∴ Xn = 3 Xn-1 mod 31
This is the equation for key generation using random number generation technique.
Let the Seed Value be X0 = 1
Then X1= 3 X0 mod 31
X1=3 .1 mod 31=3,
X2=3.3 mod 31=9, X3=3.9 mod 31=27 and Similarly X4=19, X5=26, X6=16, X7=17,
X8=20, X9=29, X10=25, X11=13, X12=8, X13=24, X14=10, X15=30, X16=28, X17=22,
X18=4, X19=12
X20=5, X21=15, X22=14, X23=11, X24=2
Considering the 25 random Numbers and arranging them in 5 X 5 matrix form, We get
01 03 09 27 19
26 16 17 20 29
25 13 08 24 10
30 28 22 04 12
05 15 14 11 02
The Key required to Perform Caesar Encryption is derived from the Random Number Matrix as :
Key= [Trace of random number Matrix 5X5] Mod 94
Trace of the Above Matrix = [ 01+16+08+04+02]=31
Key=[TRACE Mod 94]=41 Mod 94=41
So the Key required to Perform Caesar Encryption is 41.
The Caesar Encryption is described by the equation C=(P+K) Mod 94
8. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
46
The Plaintext Message Considered for Encryption is “ This Message is Very Secret OK”.
The Matrix form of the numerical Values of the above Plaintext Message is represented below.
42
46
83
68
85
66
68
50
88
85
68
85
82
72
68
70
64
82
82
68
44
82
72
71
51
Adding the Key Value K to each Plaintext Character and taking Modulus 94 , we get
41
42
41
46
41
83
41
68
41
85
41
66
41
68
41
50
41
88
41
85
41
68
41
85
41
82
41
72
41
68
41
70
41
64
41
82
41
82
41
68
41
44
41
82
41
72
41
71
41
51
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
MOD 94
The resultant Ciphertext Matrix is :
C =
83
87
30
16
32
13
15
91
35
32
15
32
29
19
15
17
11
29
29
15
85
29
19
18
92
The Transpose of the above Matrix is :
CT =
83
13
15
17
85
87
15
32
11
29
30
91
29
29
19
16
35
19
29
18
32
32
15
15
92
Exclusive-Or the Matrices C and CT we get :
C⊕ CT =
0
90
17
1
23
90
0
29
40
61
17
29
0
14
28
1
40
14
0
29
23
61
28
29
0
Now Performing Columnar Transposition on the above Matrix in a random order Column
selection : C4, C1, C3, C1, C0.
9. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
47
Reading the Above Matrix in the above Order and making a single row we get :
C = 23 1 17 90 0 29 0 14 40 1 61 40 29 0 90 29 0 14 40 1 0 29 28 61
23
Now replacing each numerical value by its character representation from the table, the Ciphertext
sequence would be as follows.
Ciphetext = 8 “ 2 { ! > ! / I “ ^ I > ! { > ! / I “ ! > = ^ 8
The Next step is to perform the Transposition Technique on the above ciphertext sequence
by performing Permutation as C=C3 C8 C23 C17 C0 C6 C24 C9
C14 C2 C13 C7 C1 C16 C10
C15 C21 C17 C20 C19 C18 C12
C11 C4 C5
The Final Ciphertext Message is :
Ciphertext C = { I ^ / 8 ! 8 “ { 2 ! / “ ! ^> > / ! “ I > I ! >
The Decryption is performed in the reverse Order.
The input to the decryption algorithm is the above ciphertext sequence. Performing the reverse
Permutation , we get C=C0 C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C13 C14 C15
C16 C17 C18 C19 C20 C21 C22 C23 C24.
Representing ciphetext in the Matrix form and performing C⊕CT, we get Partial Plaintext.
Using the Secret Key and decrypting , the resultant Plaintext would be “ This Message is Very
Secret OK “.
5. FEATURES OF THE PROPOSED ALGORITHM:
Key length of the Algorithm is 100-bits
Brute force attack requires 93! Attempts , which makes the algorithm more robust
The proposed algorithm includes rich character set compare to Caesar cipher
The algorithm occupies memory approximately equal to 5 Kb
The algorithm works very fast with 1 µS / byte
10. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
48
6. COMPARISION OF THE PROPOSED METHOD WITH OTHER
METHODS :
0
20
40
60
80
100
120
DES CAESAR Method[3] Proposed Method
K
e
y
S
i
z
e
Algorithm
Figure1 : Comparison of Algorithms with respect to Key Length
From the above graph, it is clear that the proposed method is highly resistant to cryptanalytic
attacks. The proposed method involves 93! key combinations. The method used to generate key is
based on Random number generation principle. Hence key generation is purely based on Seed
input to random number generator. Thus by selecting different seed values , different random
number series can be generated which can be effectively used as key values after suitable
manipulations. Thus the proposed method is a very effective cryptographic method.
6. RESISTANCE OF THE ALGORITHM :
Brute force Attack : Caesar cipher requires 25 different key Values to obtain the Plaintext.
Method[3] involves 9 digits key which approximately equal to 236
alternate keys . The proposed
method involves 100 bit key value. The modern DES algorithm involves 56 bit key value. Thus
the proposed method exhibits more resistance against cryptanalytic attacks.
7. CONCLUSION :
Data Security is a very important aspect. The throughput and memory requirements are the two
important factors to be considered while designing ciphers. Classical ciphers can be made
effective and used for providing security by adding the properties possessed by the modern
ciphers. The key generation play a crucial role in designing the ciphers. The key should be truly
random to increase confusion property of the cipher. The present paper has been designed with
11. International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
49
Caesar cipher concept and transposition techniques to provide effective security. The system can
be further improved by using modular arithmetic and exponential mathematical operations. The
proposed method provides high throughput and occupies less memory.
8. REFERENCES :
[1] A.F.A.Abidin, O.Y. Chuan and M.R.K. ariffin-“ A Novel enhancement Technique of the Hill Cipher
for effective Cryptographic Purposes ‘- Journal of Computer science , 7(5): 785-789, 2011
[2] Dharmendra Kumar Gupta , Sumit Kumar Srivastava, Vedpal Singh- “ New Concept of encryption
algorithm A hybrid approach of Caesar Cipher and Columnar transposition in multi stages “ –
Journal of Global Research in Computer Science, Volume 3 , No. 1 , January 2012 , P. No. 60-66
[3] Fauzan Saeed , Mustafa Rashid- “ Integrating Classical Encryption with Modern Technique “ –
IJCSNS, Volume 10, No. 5, May 2010
[4] Prof.K.Govinda , Dr.E. sathiyamoorth-“Multilevel Cryptography Technique Using Graceful Codes “-
JGRCS, Volume 2, No.7, July 2011
[5] Monodeep Banerjee , Saptarshi Naskar , krishnendu Basuli , Samar Sen Sarma- “ A Novel scheme for
Text data encryption “- JGRCS, Volume 3, No.1, January 2012
[6] Phillip I Wilson and Mario Garcia – “ A Modified Version of the Vigenere Algorithm “- IJCSNS,
Vol. 6, No.3B, march 2006
[7] Packirisamy Murali and Gandhi doss Senthil Kumar – “ Modified Version of Playfair cipher using
Linear feedback Shift Register “ – IJCSNS, Vol.8, No.12, December 2008
[8] Raj jain-“The art of Computer Systems Performance Analys is”-John Wiley & sons Inc.
[ 9] Rushdi. A. Hamamreh, Mousa Farajallah – “ Design of a Robust Cryptosystem Algorithm for Non-
Invertible Matrices Based on Hill Cipher “- IJCsNS, Volume 9, No.5, May 2009
[10] Sriram Ramanujam , Mrimuthu Karuppiah – “ Designing an algorithm with high Avalanche effect “-
International Journal of Computer Science and Network Security “, - Volume 11, No.1 , January 2011
[11] http://en.wikipedia.org/wiki/Caesar_cipher
[12] William Stallings- “ Cryptography and Network security, Second Edition
*****