• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 52
Next 10 →

1.Introduction Cryptanalysis of Caesar Cipher

by Malgorzata Kupiecka
"... Caesar Cipher is the most important one in cryptology. Take any book on the subject, you are sure to find its description right in the first chapter. ..."
Abstract - Add to MetaCart
Caesar Cipher is the most important one in cryptology. Take any book on the subject, you are sure to find its description right in the first chapter.

AN IMPROVED CAESAR CIPHER (ICC) ALGORITHM

by Ochoche Abraham, Ganiyu O. Shefiu
"... In this paper, we have introduced some novel improvements to the traditional Caesar cipher algorithm, which completely eliminates its fundamental weaknesses. First we have eliminated spaces from the ciphertext and secondly the process of creating the ciphertext by the Improved Caesar Cipher (ICC) no ..."
Abstract - Add to MetaCart
In this paper, we have introduced some novel improvements to the traditional Caesar cipher algorithm, which completely eliminates its fundamental weaknesses. First we have eliminated spaces from the ciphertext and secondly the process of creating the ciphertext by the Improved Caesar Cipher (ICC

Automatic Key Generation of Caesar Cipher

by B. Bazith Mohammed , 2013
"... Cryptography has been through numerous phases of evolution. Early ciphers in cryptography were designed to allow encryption and decryption to take place by hand, while those which are developed and used today are only possible due to the high computational performance of modern machines [1]. Conce ..."
Abstract - Add to MetaCart
, the letters are just moved around. There are numerous number of algorithms are proposed in both techniques. But combination of these techniques rare in the cryptographic trends. So this paper is providing combination of caesar cipher and railfence cipher are proposed. Also the caesar cipher key generation new

A Poly-alphabetic Approach to Caesar Cipher Algorithm

by Prachi Patni
"... Abstract-With the exponential growth of internet and network applications such as e-commerce, the demand for data security increasing than ever before. Encryption algorithms play an important role in information security systems In this paper, author has proposed some modification traditional Caesar ..."
Abstract - Add to MetaCart
Caesar cipher. Classical Caesar cipher is mono-alphabetic and has a constant key length throughout the text file to be encrypted. Once the attacker gets the key of Caesar cipher it can be broken easily. This paper proposes some modification to overcome this drawback of Caesar cipher. The proposed

ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS

by Anupama Mishra
"... Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitation ..."
Abstract - Add to MetaCart
Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various

Cryptology: From Caesar Ciphers to Public-key Cryptosystems

by Dennis Luciano, Gordon Prichett - The College Mathematics Journal, Vol , 1987
"... He received an M.A. and Ph.D. (in commutative algebra under the direction of David ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
He received an M.A. and Ph.D. (in commutative algebra under the direction of David

9 Vertically Scrambled Caesar Cipher Method

by Asiya Abdus Salam, Ruba Mahmoud, Al Salah
"... In this paper, a new technique for protected and locked broadcasting of message is presented. This approach uses improved version of ciphering with the combination of double phase encryption. To ripen this method of encryption, a simple technique of vertically selecting the text for ciphering is use ..."
Abstract - Add to MetaCart
In this paper, a new technique for protected and locked broadcasting of message is presented. This approach uses improved version of ciphering with the combination of double phase encryption. To ripen this method of encryption, a simple technique of vertically selecting the text for ciphering

Enhancing The Security of Caesar Cipher Using Double Substitution Method

by Shahid Bashir Dar
"... Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher is an examp ..."
Abstract - Add to MetaCart
Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher

CRYPTOGRAPHICALLY USE OF CAESAR CIPHER TECHNIQUE IN PASSWORD MANAGING AND SECURITY SYSTEM

by Prashant Kumar , Dey , Tarun Kumar , Dey
"... Abstract In this paper we introduced a new type of social engineering attack via the website. We computed the result and then proposed a method to mitigate that attack. The research objective followed by the description of the experiment and then the mitigation of the suggested attack. The results ..."
Abstract - Add to MetaCart
were properly tabulated and contained the observations of our results. The paper ends with using the Caesar cipher for introducing the new password set method and its uniqueness. Keywords: Security, Social engineering attack, Vulnerability, Mitigation, Encryption. 1. Introduction Social Engineering

TECHNOLOGY Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique

by Gaurav Shrivastava, Ravindra Sharma, Manorama Chouhan
"... In this paper we have some modification in Caesar Cipher Technique. We have proposed a method to enhancing the Caesar cipher for more efficient and secure. We use Relative Frequency of Letters in Alphabets. We arrange the sequence of letter according to the frequency in increasing ordered. And then ..."
Abstract - Add to MetaCart
In this paper we have some modification in Caesar Cipher Technique. We have proposed a method to enhancing the Caesar cipher for more efficient and secure. We use Relative Frequency of Letters in Alphabets. We arrange the sequence of letter according to the frequency in increasing ordered
Next 10 →
Results 1 - 10 of 52
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University