Data Encryption by Excluding Repetitive Character in (original) (raw)
Related papers
2012
In this paper the author presents a new cryptographic technique to exclude the repetitive terms in a message, when it is to be encrypted, so that it becomes almost impossible for a person to retrieve or predict the original message from the encrypted message. In modern world, cryptography hackers try to break a code or cryptographic algorithm or try to retrieve the key, which is needed to encrypt a message, by analyzing the insertion or presence of repetitive bits / characters (bytes) in the message and encrypted message to find out the encryption algorithm or the key used for it. So it is must for a good encryption method to exclude the repetitive terms such that no trace of repetitions can be tracked down. For this reason we apply SD-AREE cryptographic method to exclude repetitive terms from a message, which is to be encrypted. In SD-AREE method the repetitive bits / characters are removed and there is no trace of any repetition in the message.
AN IMPROVISED CAESAR CIPHER TECHNIQUE FOR ENHANCING DATA SECURITY
IAEME Publications, 2020
Caesar cipher is a substitution cipher which replaces each letter in plaintext with another letter to form a ciphertext. The attackers can easily access the Caesar cipher by observing the frequency distribution of English letters and ciphertext. Hence, in this paper a new method is proposed by using matrix table, of set value, key and seed function and is found to be more reliable as compared to the existing Caesar cipher method. And also, the results were promising with the capability to withstand attacks like brute force, frequency and data analysing attack etc.
2012
In this paper, the authors propose a new combined symmetric key cryptographic method, SJA-I, which basically has four steps: Firstly, each byte is broken into its equivalent binary format and then single bit manipulation is executed on that; secondly Modified Caesar Cipher technique (SD-REE) and TTJSA cipher algorithm are applied on the data (message) randomly, which depends on the key provided during the time for encryption; thirdly DJSA method applied and in the final stage, Bit Reversal technique is applied to reach the final encrypted form of the original data. The method applied here is being tested on different plain text files and the results were analyzed very carefully. It was found that there was no pattern in the encrypted text and this combined cipher technique can not be broken by usual cryptanalysis attack like, differential attack, plain text attack, spectral analysis (frequency analysis), etc. The authors proposes that SJA-I can be applied for encryption of short message, password, secret key or any type confidential message.
Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis
Cryptography is the art of encoding messages into an unreadable form from a sender and re-transforming back to its readable form at the receiver end. This is an enhanced Caesar cipher against frequency analysis using bidirectional shift. This algorithm encrypts message bit by bit or character by character (stream cipher) and uses one key ideology (symmetric key cipher), the sender encrypts the message before transmitting and the receiver decrypts upon receiving using the same key as the one used for the encryption. It shifts the plain text characters to different direction which eliminates repetition of characters in the cipher text. Previous versions of Caesar cipher hadonly 26 English alphabets to be encrypted, which the attacker knew that there were only 26 choices to choose from, to determine the plain text. And when the alphabet of the same type are encrypted, they will have the same symbol representing each, which gives hint to attacker on how to break it by using frequency cryptanalysis. The enhanced method (Enhanced Caesar cipher) has 95 characters as digital messages as against 26 alphabets. Based on this method, the sender will transposition the bits in the message according to their sequence arrangement (odd and even position) to shift the characters in the odd position to the left and characters in the even position to the right side, based on the key given by the user, as the key to both shifts. Shifting the plain text to different directions mitigates the problem of repetition which the previous version suffers from. To make decryption more difficult, each character will switch position with the next to randomize their arrangement. The cipher was successfully developed and working accurately. It was developed on java platform using java eclipse IDE and NETBEANS IDE 7. 1. 2. It has successfully passed all the tests and proven its accuracy obtaining the result of 100% repetition free. Thus, the proposed method is highly resistant to frequency analysis. This provides more security than the earlier versions and it serves as an option to be integrated with other algorithms to strengthen the security.
Enhancement Caesar Cipher for Better Security
Cryptography is an art and science of converting original message into non readable form. Fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. In this project, encryption will be implemented information that makes it hard to be readable and secure. For that matter, encryption method known as Caesar cipher, one of the simplest and most widely used encryption techniques. In this encryption, it uses the three methods in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in many encryption projects to make data secure and better.
ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS
Cryptography is an art and science of converting original message into non readable form. There are two techniques for converting data into no readable form:1)Transposition technique 2)Substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitations so this talk will present a perspective on combination of techniques substitution and transposition. In this paper I have focused on the well known classical techniques the aim was to induce some strength to these classical encryption for that purpose I blended classical encryption with the some more techniques. my proposed method showed that it is better in terms of providing more security to any given text message. In our experiments I took Caesaer Ciphers as representatives of Classical Techniques. To make it more secure I have used some techniques like I have used multiple level Row Transposition Ciphers, encryption with same key at each level and encryption with different key at each level.
A REVIEW ON ENHANCING CAESAR CIPHER
Few days back, WhatsApp introduced " end-to-end encryption " for his daily users. This encryption not only secures messages but also calls. Sign of relief for users. What does this depict? Not only high profile authorities but also common man is worried about his/her privacy. Earlier, it was not matter of concern, but today very one wants secrecy. In this paper we will take a review on caesar cipher, a methodology for protecting data from third parties.
A New Modified Algorithm Based on Caesar Cipher Cryptography for Hindi Vernacular Language
Research Gate, 2022
Cryptography is the oldest technique to make information secure from any type of cyberattack like DDoS, DoS, Man in the Middle Attack etc. In this paper, we have discussed about the Cryptography and its type and how existing Caesar Cipher work. Here we have proposed an algorithm based on the Caesar Cipher to encrypt the Hindi language. The propose algorithm has implemented through setting up an experiment. This proposed algorithm works on the Hindi Vernacular Language. It uses a random Shift key generation algorithm to Encrypt the message, which is randomly generated into range of 1 to 10 50. The same random generated Shift algorithm will be use to decrypt the message. At the time of encryption random generated key will be displayed to the user and it used to generate Cipher text. The generated Cipher text will be sent to the receiver along with key through secure medium.
A novelty approach of symmetric encryption algorithm
Cryptography plays major role in information security and many encryption, decryption algorithms have been developed and in use for information retrieval and storage but still there is a need to research for better algorithms than existing. Recently Multilanguage encryption and decryption approaches throw a light in this area of research. In this paper we propose a novel encryption and decryption technique in which cipher text is brought into Unicode characters of Hindi, an Indian official language. A software cryptographic tool also can be facilitated for the purpose of information security in the organizations.