CFP last date
20 May 2024
Reseach Article

Vertically Scrambled Caesar Cipher Method

by Asiya Abdus Salam, Ruba Mahmoud Al Salah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 21
Year of Publication: 2015
Authors: Asiya Abdus Salam, Ruba Mahmoud Al Salah
10.5120/20868-3269

Asiya Abdus Salam, Ruba Mahmoud Al Salah . Vertically Scrambled Caesar Cipher Method. International Journal of Computer Applications. 118, 21 ( May 2015), 9-13. DOI=10.5120/20868-3269

@article{ 10.5120/20868-3269,
author = { Asiya Abdus Salam, Ruba Mahmoud Al Salah },
title = { Vertically Scrambled Caesar Cipher Method },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 21 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number21/20868-3269/ },
doi = { 10.5120/20868-3269 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:20.123087+05:30
%A Asiya Abdus Salam
%A Ruba Mahmoud Al Salah
%T Vertically Scrambled Caesar Cipher Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 21
%P 9-13
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new technique for protected and locked broadcasting of message is presented. This approach uses improved version of ciphering with the combination of double phase encryption. To ripen this method of encryption, a simple technique of vertically selecting the text for ciphering is used. A 6 x 6 matrix based on the alphabets used in the text message. If the message is lengthy, the matrix can duplicate itself accordingly. Message will be fit in the matrix and remaining cells of the matrix will be filled by alphabets. After getting vertically scrambled text, substitution techniques for ciphering is used further to ensure secured transfer of message. The receiver will get to know about the length of the text and shift key for decryption procedure. By using this double phase encryption, the transmission of message will become more secure and robust. The main target of the technique proposed in this paper is that the information cannot be customized by any outsider or intruder.

References
  1. Behrouz A. Forouzan and G. hill, 2006, Data Communications and Networking, 4th Edition by Behrouz.
  2. . Kashish Goyal, Supriya, July 2013 "Modified Caesar Cipher for Better Security Enhancement",International Journal of Computer Science, Volume 73 – No 3.
  3. Kashish Goyal, Supriya, March 2013 " Security Concerns in the world of cloud computing", IJARCS International Journal of Advanced Research in computer science, volume 4 no 4, pp230 – 234.
  4. Stamp M. , May 2011 " Information Security: Principles and Practice", 2nd Edition John Wiley and Sons Inc. ISBN:978-0-470-62639-9.
  5. Pooja Maheswari , 2001 ," Classification of Ciphers", Indian Institute of Technology, Kanpur
  6. G. Sivagurunathan, V. Rajendar and T. Purusothaman, March 2010, " Classification of Substitution Ciphers using Neural networks", IJCS &NS vol 10, no 3.
  7. Aftab Alam, Shah Mehmod, Muhammad Salam, August 2013, " A modified version of playfair cipher using 7 x 4 matrix", IJCT&E vol 5, no4.
  8. Enas Ismael, Farah, June 2014, " Enhancement Caesar Cipher for better Security"Journal of CE, ISSN: 2278-0661.
  9. Gaurav Sharma, Ajay Kakkar, 2012, "Cryptography Algorithms and approaches used for data security", International Journal of Scientific & Engineering Research Vol. 3, Issue 6.
  10. Ochoche Abraham, Ganiyu O. Shefiu, October 2012 , "AN IMPROVED CAESAR CIPHER (ICC) ALGORITHM", International Journal Of Engineering Science & Advanced Technology (IJESAT). Vol. 2, Issue -5. pp . 1198 – 1202.
Index Terms

Computer Science
Information Sciences

Keywords

Caesar cipher vertically scrambled text encryption decryption double phase encryption method.