You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/343979632

A Review Paper on Cryptography of Modified Caesar Cipher

Conference Paper · August 2018

CITATIONS READS

0 1,337

2 authors, including:

Rohit Singh
Chandigarh University
3 PUBLICATIONS   2 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Digital Watermarking View project

A Review Paper on Cryptography of Modified Caesar Cipher View project

All content following this page was uploaded by Rohit Singh on 30 August 2020.

The user has requested enhancement of the downloaded file.


A Review Paper on Cryptography of Modified Caesar
Cipher
Rohit singh Naveen Kumar Anuja
Chandigarh University Chandigarh University Chandigarh University
Department of Electronics and Department of Electronics and Department of Electronics and
Communication Communication Communication
Mohali, India Mohali, India Mohali, India
rohit.sambyal1740@gmail.com navthakur91@gmail.com akankshaaryan25@gmail.com

Abstract— Communication through internet brings teams When these elements are used along, they form cipher text. In
together. Three main parts of communication are sender, decryption part, three elements which are required are Cipher
medium and receiver. Now days, transmission of data over text, Rule and Key. Sender shares the secret key only with the
internet is not safe without any encryption method. All corporate receiver so that the information should stay protected [1].
sectors, banking sectors, government sectors and many other
Caesar cipher is also familiar with another name “Shift
sectors are sharing their data through internet. Hackers always
try to attack on the transmitted data and try to recover the data. Cipher”. Caesar cipher is also known as Julius Caesar, by its
Various techniques are developed for providing the data security. inventor name. In Caesar cipher, all the characters of the
Cryptography is used for safe transmission of data. In plaintext is interchanged by a character of some mounted
cryptography, Encryption is done at sender side and decryption variety of locations down the alphabet [2]. When the key value
is done at receiver side. In the encryption technique, Caesar is 2, all the characters of plaintext are encrypted into cipher
cipher is one of the best example. The analysis of Basic Caesar text by these characters as shown below.
cipher, Delta formation Caesar cipher and XOR Caesar cipher is
done on the basis of many parameters like Avalanche Effect,
Frequency Test and Brute force attack.
PLAINTEXT ABCDEFGHIJKLMNOPQRSTUVWXYZ
CIPERTEXT DEFGHIJKLMNOPQRSTUVWXYZABC
Keywords—Cryptography, Caesar Cipher, Encryption,
Decryption, Security, Brute Force attack.
PLAINTEXT TIME IS MONEY
I. INTRODUCTION CIPHERTEXT WLPH LV PRQHB
KEY VALUE 2
Cryptography means “hiding data or secret writing”. Hiding RULE BASIC CAESAR CIPHER
data from attacker provides data security. Information security
is the prime concern as most of the works are done by the
computers. Components of the cryptography are Plaintext and
Cipher text, Ciphers, Secret Key, Encryption algorithm and
Decryption algorithm. The information that is routed over the
network is called as Plain text and after adding number of
operations on Plaintext, a Cipher text is obtained. Encryption
algorithm and decryption algorithm which are used for encrypt
and decrypt the plaintext are called Ciphers. The number on
which cipher is operated is called as key. In Encryption part,
three elements are required i.e. Plaintext, Rule and Key.

Fig. 2 Caesar Cipher


Fig. 1 Cryptography
Basic Caesar cipher is easily broken, because of only 26 a) First portion
characters. Attacker can use all the 26 key value and recover Arrange the alphabets in our own choice, which is referred as
the data by choosing the meaning full. Brute force attacker can “KEY TABLE”.
use all the 26 possible set of key. It is highly unsafe for data TABLE I. KEY TABLE
transmission. W Q E R T Y U I O M A S D
F G X J K L Z H C V B N P
II. LITERATURE REVIEW
A.RAJAN (2014) et al. In paper entitled “ADVANCEMENT
Suppose if key given in this form is “k=4” then the alphabets
IN CAESAR CIPHER BY RANDOMIZATION AND DELTA will get shifted to fourth locations according to the KEY
FORMATION” discusses the Caesar cipher by involving the TABLE.
Delta formation method. By adding this algorithm, it’s not easy
for attacker to crack the cipher because the character replaced b) Second portion
is randomly generated. Brute force attacker will also not be In second portion, cipher output is taken into a form where
able to crack it because the characters are replaced by the other every character is mould into combinations of characters. The
character according to delta formation. This method makes the characters of plaintext are taken one by one and then locate its
transmission of data more secure. These delta formation Caesar location in the key table. If the location for first character is x,
ciphers divide in three portions. then select the characters which are located at character are
A. Alphabetic order. k*k. x+k, x+2k, x+3k and continue till the number of selected
B. Character can be made by the combination of characters.
C. Delta formation. KEYTABLE WQERTYUIOMASDFGXJKLZHCVBNP
KEY VALUE 4
Computational complexity in this cipher is less then hill cipher RULE CAESAR CIPHER WITH RANDOMIZATION
and play fair cipher. ATM cards data are encrypted by using PLAINTEXT TIME
this cryptography. CIPHERTEXT ODJXNEUAGSHZBWYPFKRISHZBWYPUA
GLVQTOD
P. Verma (2016) et al. In paper entitled “EXTENDED
CAESAR CIPHER FOR LOW POWERED DEVICES”
demonstrate the Caesar cipher by adding new function in basic T will be encrypted as ODJXNEUAG
Caesar cipher which strengthen its impact to withstand against I will be encrypted as SHZBWYPFK
severe attacks. This extended Caesar cipher has also three M will be encrypted as RISHZBWYP
parts: E will be encrypted as UAGLVQTOD
A. Key generation Process
c) Third portion
B. Encryption Process In third part, the second encrypted message is segmented in
C. Decryption Process square of the ‘k’ value form and then placed in the triangle of
delta.
Basic Caesar cipher has also similar parts but in this paper,
the authors have added more operations in all the process. Like
X+k
in key generation, factorial function is added and then key
value is taken in binary form. In Encryption process, the XOR
of key and plaintext is done. By adding these functions, this
technique has higher avalanche effect and more equalization in
frequency test. X+2k X+3k X+4k
P. Garg et al. In paper entitled “A Review Paper on
Cryptography and Significance of Key Length” states the
importance of the key length. In this paper, author explains
number of algorithm. Public Key cryptography, secrete key
cryptography, and Hash Function are these algorithms. A X+5k X+6k X+7k X+8k X+k*k
single key is used in secrete key cryptography for both
encryption and decryption. Sender uses the key for encrypt the
data and then send the key to receiver for decrypt the data. \For
encryption and decryption of a message
III. CAESAR CIPHER WITH DELTA FORMATION
Fig. 3 Place character in Delta Formation
In this cipher, the upgradation in Caesar cipher is done by n Then arrange the delta formatted character in according to this
delta formation and randomization. The plaintext pattern.
randomization done in three main portions:
TABLE II. PATTERN FOR SWAPPING then transmute the key into its binary form. In the last section,
x+5k x+2k x+6k x+k x+3k x+7k x+4k x+8k x+k*k four complimented bits are pretended to the four bit factorial
output, 8 bit key is formed.
(ii) Key 3<=15:- If key value exists in the scope 3<=15,
KEYTABLE QWERTYUIOPASDFGHJKLZXCVBNM
KEY VALUE 4
then changes the key value directly into its binary equivalent
RULE CAESAR CIPHER WITH DELTA FORMATION followed by bits compliment. There upon these four
PLAINTEXT TIME complimented bits are pretended to the four bits of binary
CIPHERTEXT NDEOJUXAGWHYSZPBFKZIBRSWHYPVA equivalent output.
QUGTLOD
(iii)Key 15<=255:- If key value exist in the range 15<=255,
change the key value directly into its binary match.
III. CAESAR CIPHER WITH XOR FUNCTION TABLE V. SECRET KEY GENERATION
Information is less secure in Caesar cipher as it gets easily
hacked by hackers. To overcome the disadvantages of the Key value 2
existing cease cipher a new method is propound which is Factorial 2(0010)
known as Coherent Caesar Cipher (CCC). The CCC is divided
into four parts which are as following: Bit compliment 13(1101)
a) Substitution in plaintext Binary equivalent of key 00101101
b) Secret key generation
c) Encryption procedure (c) Encryption process
Encryption technique is used so that no any unauthorized
d) Decryption procedure
person can easily understand the data. The information is
(a) Substitution in plaintext: guarded in such a way that only authorized person can
interpret it. Take the first character of plaintext and convert it
Before starting the process of encryption, the plaintext can be
made secure. In this propound method the plaintext characters into binary form. Then XOR operation is performed by
are originally exchanged by characters of alphabets in the plaintext and partial cipher text. After that shuffle the binary
decreasing order. form into predefined pattern. The pattern is given below:
TABLE III. SUBSTITUTION IN PLAINTEXT TABLE VI. PATTERN FOR SWAPPING
Sequence of a b c d e f g h i j k l m Bit Location 12345678
characters in Shuffle Pattern 1 8 6 2 3 4 7 5
increasing n o p q r s t u v w x y z
order
Sequence of z y x w v u t s r q p o n
characters in (d) Decryption process: - The decryption process is the reverse
decreasing of Encryption process.
m l k j i h g f e d c b a
order

KEY VALUE 4
RULE CAESAR CIPHER WITH XOR FUNCTION
Take an example of plaintext is TIME. PLAINTEXT TIME
TABLE IV. EXAMPLE OF SUBSTITUTION IN PLAINTEXT CIPHERTEXT PNKD

Plaintext TIME
IV. RESULT AND DISCUSSION
Substituted plaintext result HROV
a) Avalanche effect
Avalanche effect determines the strength of any cryptography
technique. Avalanche effect is the ratio of number of flipped
(b) Secure key generation bits to the total number of bits in the cipher text. High
Key an important part during the encryption process. Key avalanche effect is produced by good encryption technique.
procreation task must be robust and tortuous while responding
the information over the network. In this technique secret key
generation process is bifurcated in three parts which trusts on 𝑁𝑜.𝑜𝑓 𝑓𝑙𝑖𝑝𝑝𝑒𝑑 𝑏𝑖𝑡𝑠 𝑖𝑛 𝑡ℎ𝑒 𝑐𝑖𝑝ℎ𝑒𝑟𝑡𝑒𝑥𝑡
𝐴𝑣𝑎𝑙𝑎𝑛𝑐ℎ𝑒 𝑒𝑓𝑓𝑒𝑐𝑡 ∗ 100 (1)
the key value. Key ranges: 𝑁𝑜.𝑜𝑓 𝑏𝑖𝑡𝑠 𝑖𝑛 𝑡ℎ𝑒 𝑐𝑖𝑝ℎ𝑒𝑟𝑡𝑒𝑥𝑡

(i) Key 1<=3:- If key value exist in the spectrum 1<=3, then
it estimates the factorial proceeded by compliment of it and
TABLE VII. AVALANCHE EFFECT ANALYSIS
%age of bits flipped for
Encryption
Key different keywords
techniques
TIME BACK BAD
Basic Caesar 4 28.5714 14.2857 19.0476
XOR
4 25 32.1429 28.5714
technique
Delta
4 60.7143 53.5714 71.4286
formation

Fig. 5 Comparison of different algorithms based on Brute Force Attack

Fig. 3 Comparison of different algorithms based on Avalanche Effects Brute force attack is difficult to carry in Advance Caesar
cipher than Basic Caesar cipher.
Figure demonstrates the avalanche effect of various encryption
techniques. Encryption techniques like basic Caesar cipher, V. CONCLUSION
XOR Caesar Cipher and Delta Caesar Cipher are compared on Security plays a major role in wireless type of medium
the basis of avalanche effect. As the graph shown that the because when we transmit our data wirelessly, it can be access
Delta Caesar cipher have higher avalanche effect. by the third party or an outsider. Cryptography plays an
important role for safe transmission of data. Data is encrypted
b) Brute Force Attack and decrypted by many techniques. Caesar cipher is important
In case of brute force attack, an attacker attempts all the technique which has less complex, limited power consumption
feasible set of combinations until plaintext is retrieved from and less memory consumption. Many advancement is done in
the cipher text. Traditional Caesar cipher is mostly affected Caesar cipher to make it more secure. Delta formation Caesar
because of less number of keys. Brute force attack can be cipher and XOR Caesar cipher are the example of advanced
executed by thoroughly scanning all possible keys until the Caesar cipher. Main factor which effect the Caesar cipher is
accurate plaintext is found. Brute force attacks can be brute force attack. Attacker tries all the possible set of key to
minimized by making complex data that cannot be easily recover the data. But the new techniques have substitution in
breached. One way to find the strength of an encryption key which make the Caesar cipher more secure.
system is how long it would theoretically take an attacker to
conduct a successful brute force attack on it.
VI. REFERENCE
[1] L .C HAN, N.M. MAHYUDDIN, ”AN IMPLEMENTATION OF CAESAR
CIPHER AND XOR ENCRYPTION TECHNIQUE IN A SECURE WIRELESS
COMMUNICATION”,IEEE CONFERENCE, PP.111-116, 2014.
[2] A. Rajan, D. Balakumaran, “Advancement in Caesar cipher by
randomization and delta formation”, ICICES, 2014.
[3] P. Garg1, J. Singh Dilawari, “A Review Paper on Cryptography and
Significance of Key Length”, International Journal of Computer Science
and Communication Engineering, pp.88-91, 2012
[4] O. Abraham, “An improved Caesar cipher (ICC) algorithm”,
International Journal Of Engineering Science & Advanced Technology,
pp-1199-1202, 2012.
[5]nD. Thakral, “A Review on Security Issues in Wireless Sensor
Fig. 4 Brute Force Attack Networks”, International Journal of Advanced Research in Computer
Science and Software Engineering, pp-269-273, 2012.
[6] M. Roopak, “Review of Threats in Wireless Sensor Networks”,
International Journal of Computer Science and Information
Technologies, pp-25-31, 2014.
[7] P. Patni, “Implementation and Result Analysis of Polyalphabetic
Approach to Caesar Cipher”, IOSR Journal of Computer Engineering
(IOSR-JCE), vol. 16, pp. 100-106, 2014.
[8] B. Purnama, H. Rohayani. AH, “A New Modified Caesar Cipher
Cryptography Method With Legible Ciphertext From A Message To
Be Encrypted”, International Conference on Computer Science and
Computational Intelligence, pp.195 – 204, 2015.
[9] Fahad NaimNife, A New Modified Cesar Cipher Cryptographic
Method Along With Rail Fence to Encrypt Message, International
Journal of Engineering Research and Development e-ISSN: 2278-
067X, p-ISSN: 2278-800X, www.ijerd.com Volume 11, Issue 02
(February 2015)
[10]Goyal,Khasis. Kinger, Supriya.Modified Caesar Cipherfor Better
Security Enhancement. International Journal of Computer Aplications
(0975- 8887) Volume 73 – No.3 July 2013.
[11]Senthil, K., K. Prasanthi, and R. Rajaram. "A modern avatar of
Julius Caesar and Vigenere cipher." Computational Intelligence and
Computing Research (ICCIC), 2013 IEEE International Conference on.
IEEE, 2013.
[12]Purnama, Benni, and AH Hetty Rohayani. "A New Modified
Caesar Cipher Cryptography Method with Legible Ciphertext from a
Message to be Encrypted." Procedia Computer Science 59 (2015): 195-
204.

View publication stats

You might also like