An Enhancement to Caesar Cipher using Euler Totient Function
- 1. Faculty, College of IT & Management Education CIME, Bhubaneswar (Odisha), India.
- 2. Department of Computer Application, North Orissa University, Baripada, (Odisha), India.
Description
Abstract: In this modern world every communication including financial transactions are taking place through the open unsecured network. In order to communicate securely through open networks the messages need to be concealed by using the cryptographic methods. The mono alphabetic traditional Cipher is Caesar cipher is the simplest and fairly popular among the available cryptographic algorithms but it is prone to brute force attack and frequency analysis test. In this paper we propose an enhancement to Caesar cipher by using the Euler Totient function to generate the key to encrypt a text file. The Euler Totient function is applied on the total number of lines of the plain text file. The key value is generated from the plain text hence for different plain text the key value is different; this makes it difficult for the adversary to guess the key thus making the encryption scheme robust. It needs to design secured key distribution schemes to be taken up as the extension work of this scheme.
Notes
Files
C33630211322.pdf
Files
(273.7 kB)
Name | Size | Download all |
---|---|---|
md5:a6a5564c3df1632fe08e5fa34ca730c2
|
273.7 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
References
- A.P. Madushani and P.G.R.S. Ranasinghe, (2019) "A symmetric and a transposition cipher using the Euler's totient function", Ceylon Journal of Science 48(4) 2019: 327-330
- Atish Jain, Ronak Dedhia, Abhijit Patil (2015) "Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication", International Journal of Computer Applications (0975 – 8887) Volume 129 – No.13
- B. Bazith Mohammed (2013) "Automatic Key Generation of Caesar Cipher", International Journal of Engineering Trends and Technology (IJETT) – Volume 6 , ISSN: 2231-538
- B.Murali Krishna, Habibulla Khan, G.L.Madhumati, K.Praveen Kumar, G.Tejaswini, M.Srikanth, P.ravali (2017) "FPGA Implementation of DES Algorithm Using DNA Cryptography",Journal of Theoretical and Applied Information Technology, Vol.95. No 10, ISSN: 1992-8645
- Behrouz A. Ferozan, Debdeep Mukhopadhyay (2013) "Cryptography and Network Security",2nd Edition, McGrawHill Education (India) Private Limited.
- Benni Purnama, Hetty Rohayani.AH ( 2015 ) "A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted" Procedia Computer Science, 59, 195 – 204.
- Bernard Menezes (2011) "Network Security and Cryptography", Cengage Learning, 2nd Edition
- Dwiti Pandya, Khushboo Ram Narayan, Sneha Thakkar, Tanvi Madhekar, B.S. Thakare (2015) "Brief History of Encryption", International Journal of Computer Applications,Volume 131 – No.9, ISSN: 0975 – 8887.
- Fahrul Ikhsan Lubis, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, Rahmat Widia Sembiring,(2017) "Combination of Caesar Cipher Modification with Transposition Cipher" Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 22-25.
- G. Singh(2013) "A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security". International Journal of Computer Applications, Vol. 67, No. 19.
- G. Singh, A.Kumar, K. S. Sandha (2011) "A Study of New Trends in Blowfish Algorithm". International Journal of Engineering Research and Application.
- Greetta Pinheiro, Shruti Saraf (2016)IJCST Vol. 7, Issue 1, Jan – March, ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print).
- Kashish Goyal, Supriya Kinger (2013) "Modified Caesar Cipher for Better Security Enhancement", International Journal of Computer Applications (0975 – 8887) Volume 73– No.3, July 2013
- Kenneth H. Rosen (1986)"Elementary Number Theory and lts pplications", Addison-Wesley Publishing Company
- M. Ilayaraja, K.Shankar, G. Devika(2017) "A Modified Symmetric Key Cryptography Method for Secure Data Transmission", International Journal of Pure and Applied Mathematics, Volume 116 No. 10, 301-308, ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version), Special Issue.
- Murtada Mohamed Abdelwahab (2018) ,"A Compact Cryptosystem Design of Triple-DES",U of K E J Vol. 8 Issue 1, pp. 25-29
- Omar G. Abood, Shawkat K. Guirguis "A Survey on Cryptography Algorithms"International Journal of Scientific and Research Publications, Volume 8, Issue 7, July 2018 495 ISSN 2250-3153.
- Prachi Patni (2013) "A Poly-alphabetic Approach to Caesar Cipher Algorithm " International Journal of Computer Science and Information Technologies, Vol. 4 (6), 954-959, ISSN:0975-9646.
- Sanjeev Kumar Mandal, A R Deepti (2018) "A Secure Cryptosystem by using Euler Totient Function and Modified RSA" IOSR Journal of Engineering (IOSRJEN, Vol. 08, Issue 10, PP 01-07, ISSN (e): 2250-3021, ISSN (p): 2278-8719
- Sh.Ali, M.KhalidMahmood (2020) "New Numbers on Euler's Totien tFunction with Applications", Journal of Mathematical Extension, Vol.14, No.1, 61-83, ISSN: 1735-8299.
- Shahid Bashir Dar (2014) "Enhancing The Security of Caesar Cipher Using Double Substitution Method", International Journal of Computer Science & Engineering Technology Vol. 5 No. 07 Jul 2014, ISSN : 2229-3345
- Williams Stallings (2000) "Cryptography and Network Security", 4th Edition, Prentice Hall. Pearson.
- Z. J. Chowdhury,D. Pishva and G. G. D. Nishantha(2010) "AES and Confidentiality from the Inside Out", Advanced Communication Technology (ICACT), 2010 The 12th International Conference on IEEE, Vol. 2, 1587-1591.
Subjects
- ISSN: 2249-8958 (Online)
- https://portal.issn.org/resource/ISSN/2249-8958#
- Retrieval Number: 100.1/ijeat.C33630211322
- https://www.ijeat.org/portfolio-item/C33630211322/
- Journal Website: www.ijeat.org
- https://www.ijeat.org
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org