Results 1 - 10
of
52
1.Introduction Cryptanalysis of Caesar Cipher
"... Caesar Cipher is the most important one in cryptology. Take any book on the subject, you are sure to find its description right in the first chapter. ..."
Abstract
- Add to MetaCart
Caesar Cipher is the most important one in cryptology. Take any book on the subject, you are sure to find its description right in the first chapter.
AN IMPROVED CAESAR CIPHER (ICC) ALGORITHM
"... In this paper, we have introduced some novel improvements to the traditional Caesar cipher algorithm, which completely eliminates its fundamental weaknesses. First we have eliminated spaces from the ciphertext and secondly the process of creating the ciphertext by the Improved Caesar Cipher (ICC) no ..."
Abstract
- Add to MetaCart
In this paper, we have introduced some novel improvements to the traditional Caesar cipher algorithm, which completely eliminates its fundamental weaknesses. First we have eliminated spaces from the ciphertext and secondly the process of creating the ciphertext by the Improved Caesar Cipher (ICC
Automatic Key Generation of Caesar Cipher
, 2013
"... Cryptography has been through numerous phases of evolution. Early ciphers in cryptography were designed to allow encryption and decryption to take place by hand, while those which are developed and used today are only possible due to the high computational performance of modern machines [1]. Conce ..."
Abstract
- Add to MetaCart
, the letters are just moved around. There are numerous number of algorithms are proposed in both techniques. But combination of these techniques rare in the cryptographic trends. So this paper is providing combination of caesar cipher and railfence cipher are proposed. Also the caesar cipher key generation new
A Poly-alphabetic Approach to Caesar Cipher Algorithm
"... Abstract-With the exponential growth of internet and network applications such as e-commerce, the demand for data security increasing than ever before. Encryption algorithms play an important role in information security systems In this paper, author has proposed some modification traditional Caesar ..."
Abstract
- Add to MetaCart
Caesar cipher. Classical Caesar cipher is mono-alphabetic and has a constant key length throughout the text file to be encrypted. Once the attacker gets the key of Caesar cipher it can be broken easily. This paper proposes some modification to overcome this drawback of Caesar cipher. The proposed
ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS
"... Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitation ..."
Abstract
- Add to MetaCart
Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various
Cryptology: From Caesar Ciphers to Public-key Cryptosystems
- The College Mathematics Journal, Vol
, 1987
"... He received an M.A. and Ph.D. (in commutative algebra under the direction of David ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
He received an M.A. and Ph.D. (in commutative algebra under the direction of David
9 Vertically Scrambled Caesar Cipher Method
"... In this paper, a new technique for protected and locked broadcasting of message is presented. This approach uses improved version of ciphering with the combination of double phase encryption. To ripen this method of encryption, a simple technique of vertically selecting the text for ciphering is use ..."
Abstract
- Add to MetaCart
In this paper, a new technique for protected and locked broadcasting of message is presented. This approach uses improved version of ciphering with the combination of double phase encryption. To ripen this method of encryption, a simple technique of vertically selecting the text for ciphering
Enhancing The Security of Caesar Cipher Using Double Substitution Method
"... Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher is an examp ..."
Abstract
- Add to MetaCart
Abstract-Cryptography comes from the Greek words for "secret writing". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for converting data into non-readable form. Caesar Cipher
CRYPTOGRAPHICALLY USE OF CAESAR CIPHER TECHNIQUE IN PASSWORD MANAGING AND SECURITY SYSTEM
"... Abstract In this paper we introduced a new type of social engineering attack via the website. We computed the result and then proposed a method to mitigate that attack. The research objective followed by the description of the experiment and then the mitigation of the suggested attack. The results ..."
Abstract
- Add to MetaCart
were properly tabulated and contained the observations of our results. The paper ends with using the Caesar cipher for introducing the new password set method and its uniqueness. Keywords: Security, Social engineering attack, Vulnerability, Mitigation, Encryption. 1. Introduction Social Engineering
TECHNOLOGY Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique
"... In this paper we have some modification in Caesar Cipher Technique. We have proposed a method to enhancing the Caesar cipher for more efficient and secure. We use Relative Frequency of Letters in Alphabets. We arrange the sequence of letter according to the frequency in increasing ordered. And then ..."
Abstract
- Add to MetaCart
In this paper we have some modification in Caesar Cipher Technique. We have proposed a method to enhancing the Caesar cipher for more efficient and secure. We use Relative Frequency of Letters in Alphabets. We arrange the sequence of letter according to the frequency in increasing ordered
Results 1 - 10
of
52