Symmetric Cryptography for Confidential Communications: Implemented by Enhancing the Caesar Cipher
Keywords:
Algorithm, Caesar Cipher, Complexity, Cryptography, Symmetric.Abstract
Purpose: This paper identifies and rectifies the key lapses associated with the existing Caesar cryptographic algorithm and further implements the proposed solution, analyses and demonstrates the validity of the improvements effected. The achieved model was implemented as a software solution and duly demonstrated to be a good choice of encryption algorithm in modern-day cryptography.
Methodology: The methodology adopted in this study is typically the waterfall model, further incorporating the Object-Oriented Design and Analysis to facilitate the deployment of a cross-platform friendly software implementation of the model solution developed. Computational analysis of the blueprint technique employed to rectify the lapses associated with the existing Caesar cipher e.g., Diffie Helman Technique is elucidated with a more comprehensive description of the architectural design and functionality of the model accessible via: https://github.com/Maihanks/EnhancedCaeserCIpher . A blend of secondary and primary data was used for experimentation and random text data was used to test the modelled solution primarily to validate its feasibility in real-time.
Results: The result obtained is a software implementation of the Enhanced Caesar Cipher developed and demonstrated in real-time to be feasible, functional, and cross-platform friendly accessible via: https://github.com/Maihanks/EnhancedCaeserCIpher. It was experimented and demonstrated to have rectified the key lapses associated with the conventional Caesar Cipher analysed and discussed in this paper.
Unique contribution to theory, policy, and practice: The result arrived at by the end of the research include: (a) an improved and better version of the Caesar cipher dully implemented, rectifying the conventional Caesar cipher's lapses as described in detail in this paper (b) An automated version of the Caesar Cipher deployed as a software solution (c) A higher complexity for the ameliorated Caesar Cipher with a complexity of O(n2) was achieved which is far better than the conventional Caesar cipher's complexity of O(n).
Keywords: Algorithm, Caesar Cipher, Complexity, Cryptography, Symmetric.
Downloads
References
Aamer, N., & Muhammad, Y. (2005). A performance Comparison of Data Encryption
Algorithms. IEEE. DOI: 10.1109/ICICT.2005.1598556
Atish, J., et al. (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications, 129 (13), 6-11. DOI: 10.5120/ijca2015907062
Desoky, et al. (2008). An Implementation of the Blowfish Cryptosystem. IEEE.
Diaa, S., et al. (2008). Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Computer Science and Network Security.
Diaa, S., et al. (2010). Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security, 78-87.
Inan, Y. (2019). Analyzing the Classic Caesar Method Cryptography. 4th International Conference on Computational Mathematics and Engineering Sciences (pp. 213-220). Turkey: ResearchGate.
Jangir, N. (2014, April). Cryptography Security System. Kota.
Javed, A. N. (2005). A Performance Comparison of Data Encryption Algorithms. IEEE.
Mansoor, E., et al. (2013). Symmetric Algorithm Survey: A Comparative Analysis. Internal Journal of Computer Applications, 0975-8887.
Monika, A., & Pradeep, M. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering (IJCSE), 877-882.
Mousa, A. (2005). Data Encryption Performance Based on Blowfish. 47th International Symposium ELMAR.
Munir, M. W. (2005). Cryptography. ResearchGate.
Nils, P., et al.(2020). How are Hybrid Development Approaches Organized? – A Systematic Literature. Review. IEEE/ACM International Conference on Software and
System Processes (ICSSP)
Ochoche Abraham, G. O. (2012). An Improved Caesar Cipher (ICC) Algorithm.
International Journal of Engineering Science & Advanced technology,
– 1202.
Piotr, B., & Wiesław, W. (2010). Multi-core Implementation of the Symmetric
Cryptography algorithms in the measurement system. Measurement, 43(8), 1049- 1060. https://doi.org/10.1016/j.measurement.2010.03.002
Point, T. (2018). Java Cryptography. Tutorials Point (I) Pvt. Ltd.
Rountree, D. (2011). Security for Microsoft Windows System Administrators. ScienceDirect.
Savarese, C., & Hart, B. (2010). The Caesar Cipher. Retrieved from http://www.cs.trincoll.edu /~crypto/historical/caesar.html
Senthil, K., et al. (2013). A modern avatar of Julius Caesar and Vigenere cipher. IEEE International Conference. Computational Intelligence and Computing Research (ICCIC).
Sharma, H., et al . (2010). Implementation and analysis of various symmetric cryptosystems. Indian Journal of Science and Technology.
Sinkov, A. (1996). Elementary Cryptoanalysis – A Mathematical Approach.. The Mathematical Association of America. Washington, D.C.
Verma, O.P et al. (2011). Performance Analysis Of Data Encryption Algorithms. IEEE. Delhi
Technological University India.
Wikipedia. (2021). Retrieved from:
https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange.
Zhang, T. N., & Teng. (2009). A Study of DES and Blowfish Encryption Algorithm. IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Munura Maihankali, Esther Chinwe Eze
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.