Symmetric Cryptography for Confidential Communications: Implemented by Enhancing the Caesar Cipher

Authors

  • Munura Maihankali Robert Gordon University Aberdeen
  • Esther Chinwe Eze Robert Gordon University Aberdeen

Keywords:

Algorithm, Caesar Cipher, Complexity, Cryptography, Symmetric.

Abstract

Purpose: This paper identifies and rectifies the key lapses associated with the existing Caesar cryptographic algorithm and further implements the proposed solution, analyses and demonstrates the validity of the improvements effected. The achieved model was implemented as a software solution and duly demonstrated to be a good choice of encryption algorithm in modern-day cryptography.  

Methodology: The methodology adopted in this study is typically the waterfall model, further incorporating the Object-Oriented Design and Analysis to facilitate the deployment of a cross-platform friendly software implementation of the model solution developed. Computational analysis of the blueprint technique employed to rectify the lapses associated with the existing Caesar cipher e.g., Diffie Helman Technique is elucidated with a more comprehensive description of the architectural design and functionality of the model accessible via: https://github.com/Maihanks/EnhancedCaeserCIpher . A blend of secondary and primary data was used for experimentation and random text data was used to test the modelled solution primarily to validate its feasibility in real-time.

Results: The result obtained is a software implementation of the Enhanced Caesar Cipher developed and demonstrated in real-time to be feasible, functional, and cross-platform friendly accessible via: https://github.com/Maihanks/EnhancedCaeserCIpher.  It was experimented and demonstrated to have rectified the key lapses associated with the conventional Caesar Cipher analysed and discussed in this paper.

Unique contribution to theory, policy, and practice: The result arrived at by the end of the research include: (a) an improved and better version of the Caesar cipher dully implemented, rectifying the conventional Caesar cipher's lapses as described in detail in this paper (b) An automated version of the Caesar Cipher deployed as a software solution (c)  A higher complexity for the ameliorated Caesar Cipher with a complexity of O(n2) was achieved which is far better than the conventional Caesar cipher's complexity of O(n).

Keywords: Algorithm, Caesar Cipher, Complexity, Cryptography, Symmetric.

Downloads

Download data is not yet available.

Author Biographies

Munura Maihankali, Robert Gordon University Aberdeen

Chevening Scholar, MSc Data Science: School of Computing

Robert Gordon University Aberdeen, United Kingdom.

 

Esther Chinwe Eze, Robert Gordon University Aberdeen

MSc Cyber Security: School of Computing

Robert Gordon University Aberdeen, United Kingdom.

 

References

Aamer, N., & Muhammad, Y. (2005). A performance Comparison of Data Encryption

Algorithms. IEEE. DOI: 10.1109/ICICT.2005.1598556

Atish, J., et al. (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications, 129 (13), 6-11. DOI: 10.5120/ijca2015907062

Desoky, et al. (2008). An Implementation of the Blowfish Cryptosystem. IEEE.

Diaa, S., et al. (2008). Performance Evaluation of Symmetric Encryption Algorithms. International Journal of Computer Science and Network Security.

Diaa, S., et al. (2010). Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. International Journal of Network Security, 78-87.

Inan, Y. (2019). Analyzing the Classic Caesar Method Cryptography. 4th International Conference on Computational Mathematics and Engineering Sciences (pp. 213-220). Turkey: ResearchGate.

Jangir, N. (2014, April). Cryptography Security System. Kota.

Javed, A. N. (2005). A Performance Comparison of Data Encryption Algorithms. IEEE.

Mansoor, E., et al. (2013). Symmetric Algorithm Survey: A Comparative Analysis. Internal Journal of Computer Applications, 0975-8887.

Monika, A., & Pradeep, M. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering (IJCSE), 877-882.

Mousa, A. (2005). Data Encryption Performance Based on Blowfish. 47th International Symposium ELMAR.

Munir, M. W. (2005). Cryptography. ResearchGate.

Nils, P., et al.(2020). How are Hybrid Development Approaches Organized? – A Systematic Literature. Review. IEEE/ACM International Conference on Software and

System Processes (ICSSP)

Ochoche Abraham, G. O. (2012). An Improved Caesar Cipher (ICC) Algorithm.

International Journal of Engineering Science & Advanced technology,

– 1202.

Piotr, B., & Wiesław, W. (2010). Multi-core Implementation of the Symmetric

Cryptography algorithms in the measurement system. Measurement, 43(8), 1049- 1060. https://doi.org/10.1016/j.measurement.2010.03.002

Point, T. (2018). Java Cryptography. Tutorials Point (I) Pvt. Ltd.

Rountree, D. (2011). Security for Microsoft Windows System Administrators. ScienceDirect.

Savarese, C., & Hart, B. (2010). The Caesar Cipher. Retrieved from http://www.cs.trincoll.edu /~crypto/historical/caesar.html

Senthil, K., et al. (2013). A modern avatar of Julius Caesar and Vigenere cipher. IEEE International Conference. Computational Intelligence and Computing Research (ICCIC).

Sharma, H., et al . (2010). Implementation and analysis of various symmetric cryptosystems. Indian Journal of Science and Technology.

Sinkov, A. (1996). Elementary Cryptoanalysis – A Mathematical Approach.. The Mathematical Association of America. Washington, D.C.

Verma, O.P et al. (2011). Performance Analysis Of Data Encryption Algorithms. IEEE. Delhi

Technological University India.

Wikipedia. (2021). Retrieved from:

https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange.

Zhang, T. N., & Teng. (2009). A Study of DES and Blowfish Encryption Algorithm. IEEE.

Downloads

Published

2021-07-02

How to Cite

Maihankali, M. ., & Chinwe Eze, E. . (2021). Symmetric Cryptography for Confidential Communications: Implemented by Enhancing the Caesar Cipher. International Journal of Computing and Engineering, 2(1), 1–13. Retrieved from https://carijournals.org/journals/index.php/IJCE/article/view/605

Issue

Section

Articles