A Study on Encryption and Decryption using the Caesar Cipher Method

Authors

  • G. Gomathi Jawahar Karunya Institute of Technology and Sciences,Coimbatore.
  • D. Silvester Anto Karunya Institute of Technology and Sciences,Coimbatore.
  • T. John Thomas Karunya Institute of Technology and Sciences,Coimbatore.
  • Krishnendu Karunya Institute of Technology and Sciences,Coimbatore.
  • Melvin Jousva Karunya Institute of Technology and Sciences,Coimbatore.

Keywords:

The Caesar Cipher, Encryption, Ciphertext, Python, cryptography

Abstract

The methodology of ciphertext in Python depends on the specific encryption algorithm used. The ciphertext is the result of applying an encryption algorithm to plaintext, typically involving various text processing and wrapping operations. Here the ciphertext is the encrypted form of the plaintext and is intended to keep the information confidential and secure from unauthorized access.

Downloads

Download data is not yet available.

References

Srikantaswamy S and Phaneendra H. 2012, “Improved Caesar cipher with random number generation technique and multistage encryption”. Published by International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012

CSI/FBI 2007, Computer Crime and Security Survey, 9-14-2007. Content Posted by New Media Institute (NMI) Editor. Available at: http://en.wikipedia.org/wiki/Encryption

Rigoberto G. 2009, Using Classical Ciphers in Secondary Mathematics. BSc. Thesis McMurry University Abilene, Texas 2009

Dharmendra K. 2012, New concept of symmetric encryption algorithm a hybrid approach of caesar cipher and columnar transposition in multi stages. Journal of Global Research in Computer Science (JGRCS) Copyright Agreement & Authorship Responsibility Vol 3, No. 1 (2012). Available at:http://www.jgrcs.info/index.php/jgrcs/article/view/295

Prachi P. 2013, A Poly-alphabetic Approach to Caesar Cipher Algorithm. International Journal of Computer Science and Information Technologies(IJCSIT), Vol. 4 (6) , 2013, 954-959

Bhardwaj C. 2012, Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols. Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 35-38 Available at: www.iosrjournals.org

Ms. Nora Zilam Runera. (2014). Performance Analysis On Knowledge Management System on Project Management. International Journal of New Practices in Management and Engineering, 3(02), 08 - 13. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/28

Kumar, L. R. ., Ashokkumar, C. ., Pandey, P. S. ., Kannaiah, S. K. ., J, B. ., & Hussan, M. I. T. . (2023). Security Enhancement in Surveillance Cloud Using Machine Learning Techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 46–55. https://doi.org/10.17762/ijritcc.v11i3s.6154

Downloads

Published

16.07.2023

How to Cite

Jawahar, G. G. ., Anto, D. S. ., Thomas, T. J. ., Krishnendu, & Jousva, M. . (2023). A Study on Encryption and Decryption using the Caesar Cipher Method. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 357–360. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3176

Issue

Section

Research Article