Professional Documents
Culture Documents
net/publication/343979632
CITATIONS READS
0 1,337
2 authors, including:
Rohit Singh
Chandigarh University
3 PUBLICATIONS 2 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Rohit Singh on 30 August 2020.
Abstract— Communication through internet brings teams When these elements are used along, they form cipher text. In
together. Three main parts of communication are sender, decryption part, three elements which are required are Cipher
medium and receiver. Now days, transmission of data over text, Rule and Key. Sender shares the secret key only with the
internet is not safe without any encryption method. All corporate receiver so that the information should stay protected [1].
sectors, banking sectors, government sectors and many other
Caesar cipher is also familiar with another name “Shift
sectors are sharing their data through internet. Hackers always
try to attack on the transmitted data and try to recover the data. Cipher”. Caesar cipher is also known as Julius Caesar, by its
Various techniques are developed for providing the data security. inventor name. In Caesar cipher, all the characters of the
Cryptography is used for safe transmission of data. In plaintext is interchanged by a character of some mounted
cryptography, Encryption is done at sender side and decryption variety of locations down the alphabet [2]. When the key value
is done at receiver side. In the encryption technique, Caesar is 2, all the characters of plaintext are encrypted into cipher
cipher is one of the best example. The analysis of Basic Caesar text by these characters as shown below.
cipher, Delta formation Caesar cipher and XOR Caesar cipher is
done on the basis of many parameters like Avalanche Effect,
Frequency Test and Brute force attack.
PLAINTEXT ABCDEFGHIJKLMNOPQRSTUVWXYZ
CIPERTEXT DEFGHIJKLMNOPQRSTUVWXYZABC
Keywords—Cryptography, Caesar Cipher, Encryption,
Decryption, Security, Brute Force attack.
PLAINTEXT TIME IS MONEY
I. INTRODUCTION CIPHERTEXT WLPH LV PRQHB
KEY VALUE 2
Cryptography means “hiding data or secret writing”. Hiding RULE BASIC CAESAR CIPHER
data from attacker provides data security. Information security
is the prime concern as most of the works are done by the
computers. Components of the cryptography are Plaintext and
Cipher text, Ciphers, Secret Key, Encryption algorithm and
Decryption algorithm. The information that is routed over the
network is called as Plain text and after adding number of
operations on Plaintext, a Cipher text is obtained. Encryption
algorithm and decryption algorithm which are used for encrypt
and decrypt the plaintext are called Ciphers. The number on
which cipher is operated is called as key. In Encryption part,
three elements are required i.e. Plaintext, Rule and Key.
KEY VALUE 4
RULE CAESAR CIPHER WITH XOR FUNCTION
Take an example of plaintext is TIME. PLAINTEXT TIME
TABLE IV. EXAMPLE OF SUBSTITUTION IN PLAINTEXT CIPHERTEXT PNKD
Plaintext TIME
IV. RESULT AND DISCUSSION
Substituted plaintext result HROV
a) Avalanche effect
Avalanche effect determines the strength of any cryptography
technique. Avalanche effect is the ratio of number of flipped
(b) Secure key generation bits to the total number of bits in the cipher text. High
Key an important part during the encryption process. Key avalanche effect is produced by good encryption technique.
procreation task must be robust and tortuous while responding
the information over the network. In this technique secret key
generation process is bifurcated in three parts which trusts on 𝑁𝑜.𝑜𝑓 𝑓𝑙𝑖𝑝𝑝𝑒𝑑 𝑏𝑖𝑡𝑠 𝑖𝑛 𝑡ℎ𝑒 𝑐𝑖𝑝ℎ𝑒𝑟𝑡𝑒𝑥𝑡
𝐴𝑣𝑎𝑙𝑎𝑛𝑐ℎ𝑒 𝑒𝑓𝑓𝑒𝑐𝑡 ∗ 100 (1)
the key value. Key ranges: 𝑁𝑜.𝑜𝑓 𝑏𝑖𝑡𝑠 𝑖𝑛 𝑡ℎ𝑒 𝑐𝑖𝑝ℎ𝑒𝑟𝑡𝑒𝑥𝑡
(i) Key 1<=3:- If key value exist in the spectrum 1<=3, then
it estimates the factorial proceeded by compliment of it and
TABLE VII. AVALANCHE EFFECT ANALYSIS
%age of bits flipped for
Encryption
Key different keywords
techniques
TIME BACK BAD
Basic Caesar 4 28.5714 14.2857 19.0476
XOR
4 25 32.1429 28.5714
technique
Delta
4 60.7143 53.5714 71.4286
formation
Fig. 3 Comparison of different algorithms based on Avalanche Effects Brute force attack is difficult to carry in Advance Caesar
cipher than Basic Caesar cipher.
Figure demonstrates the avalanche effect of various encryption
techniques. Encryption techniques like basic Caesar cipher, V. CONCLUSION
XOR Caesar Cipher and Delta Caesar Cipher are compared on Security plays a major role in wireless type of medium
the basis of avalanche effect. As the graph shown that the because when we transmit our data wirelessly, it can be access
Delta Caesar cipher have higher avalanche effect. by the third party or an outsider. Cryptography plays an
important role for safe transmission of data. Data is encrypted
b) Brute Force Attack and decrypted by many techniques. Caesar cipher is important
In case of brute force attack, an attacker attempts all the technique which has less complex, limited power consumption
feasible set of combinations until plaintext is retrieved from and less memory consumption. Many advancement is done in
the cipher text. Traditional Caesar cipher is mostly affected Caesar cipher to make it more secure. Delta formation Caesar
because of less number of keys. Brute force attack can be cipher and XOR Caesar cipher are the example of advanced
executed by thoroughly scanning all possible keys until the Caesar cipher. Main factor which effect the Caesar cipher is
accurate plaintext is found. Brute force attacks can be brute force attack. Attacker tries all the possible set of key to
minimized by making complex data that cannot be easily recover the data. But the new techniques have substitution in
breached. One way to find the strength of an encryption key which make the Caesar cipher more secure.
system is how long it would theoretically take an attacker to
conduct a successful brute force attack on it.
VI. REFERENCE
[1] L .C HAN, N.M. MAHYUDDIN, ”AN IMPLEMENTATION OF CAESAR
CIPHER AND XOR ENCRYPTION TECHNIQUE IN A SECURE WIRELESS
COMMUNICATION”,IEEE CONFERENCE, PP.111-116, 2014.
[2] A. Rajan, D. Balakumaran, “Advancement in Caesar cipher by
randomization and delta formation”, ICICES, 2014.
[3] P. Garg1, J. Singh Dilawari, “A Review Paper on Cryptography and
Significance of Key Length”, International Journal of Computer Science
and Communication Engineering, pp.88-91, 2012
[4] O. Abraham, “An improved Caesar cipher (ICC) algorithm”,
International Journal Of Engineering Science & Advanced Technology,
pp-1199-1202, 2012.
[5]nD. Thakral, “A Review on Security Issues in Wireless Sensor
Fig. 4 Brute Force Attack Networks”, International Journal of Advanced Research in Computer
Science and Software Engineering, pp-269-273, 2012.
[6] M. Roopak, “Review of Threats in Wireless Sensor Networks”,
International Journal of Computer Science and Information
Technologies, pp-25-31, 2014.
[7] P. Patni, “Implementation and Result Analysis of Polyalphabetic
Approach to Caesar Cipher”, IOSR Journal of Computer Engineering
(IOSR-JCE), vol. 16, pp. 100-106, 2014.
[8] B. Purnama, H. Rohayani. AH, “A New Modified Caesar Cipher
Cryptography Method With Legible Ciphertext From A Message To
Be Encrypted”, International Conference on Computer Science and
Computational Intelligence, pp.195 – 204, 2015.
[9] Fahad NaimNife, A New Modified Cesar Cipher Cryptographic
Method Along With Rail Fence to Encrypt Message, International
Journal of Engineering Research and Development e-ISSN: 2278-
067X, p-ISSN: 2278-800X, www.ijerd.com Volume 11, Issue 02
(February 2015)
[10]Goyal,Khasis. Kinger, Supriya.Modified Caesar Cipherfor Better
Security Enhancement. International Journal of Computer Aplications
(0975- 8887) Volume 73 – No.3 July 2013.
[11]Senthil, K., K. Prasanthi, and R. Rajaram. "A modern avatar of
Julius Caesar and Vigenere cipher." Computational Intelligence and
Computing Research (ICCIC), 2013 IEEE International Conference on.
IEEE, 2013.
[12]Purnama, Benni, and AH Hetty Rohayani. "A New Modified
Caesar Cipher Cryptography Method with Legible Ciphertext from a
Message to be Encrypted." Procedia Computer Science 59 (2015): 195-
204.