Automatic Key Generation of Caesar Cipher

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-6 Number-6
Year of Publication : 2013
Authors : B. Bazith Mohammed

Citation 

B. Bazith Mohammed. "Automatic Key Generation of Caesar Cipher". International Journal of Engineering Trends and Technology (IJETT). V6(6):337-339 Dec 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Cryptography has been through numerous phases of evolution. Early ciphers in cryptography were designed to allow encryption and decryption to take place by hand, while those which are developed and used today are only possible due to the high computational performance of modern machines [1]. Conceptually cryptographic technique divided into two categories substitution and transposition methods. Transposition Ciphers are a bit different to Substitution Ciphers. Whereas Substitution ciphers replace each letter with a different letter or symbol to produce the cipher text, in a Transposition cipher, the letters are just moved around. There are numerous number of algorithms are proposed in both techniques. But combination of these techniques rare in the cryptographic trends. So this paper is providing combination of caesar cipher and railfence cipher are proposed. Also the caesar cipher key generation new way to proposed using automatic key generation techniques. Our algorithm supports security for the data containing alphabets with case sensitive, numbers and special characters. The proposed method can be used to simply encode the message for preserving privacy. It is difficult to understand the cipher text..

References

[1] http://practicalcryptography.com/ciphers/
[2] William Stallings, “Cryptography and Network Security: Principles and Practice”, 4th Edition, Prentice Hall, 2006.
[3] Hans Delfs and Helmut Knebl, “Introduction to Cryptography: Principles and Applications”, Springer International Edition.
[4] Ayushi, “A Symmetric Key Cryptographic Algorithm”. International Journal of Computer Applications (0975 – 8887), Volume.1, No.15.
[5] http://en.wikipedia.org/wiki
[6] Behrouz A. Forouzan, “Data Communications and Networking”, 4th Edition, McGraw-Hills, 2006
[7] http://practicalcryptography.com/ciphers/rail-fence-cipher

References
Caesar Cipher, Cryptography, Symmetric Key, Network Security.