A Study on Encryption and Decryption using the Caesar Cipher Method
Keywords:
The Caesar Cipher, Encryption, Ciphertext, Python, cryptographyAbstract
The methodology of ciphertext in Python depends on the specific encryption algorithm used. The ciphertext is the result of applying an encryption algorithm to plaintext, typically involving various text processing and wrapping operations. Here the ciphertext is the encrypted form of the plaintext and is intended to keep the information confidential and secure from unauthorized access.
Downloads
References
Srikantaswamy S and Phaneendra H. 2012, “Improved Caesar cipher with random number generation technique and multistage encryption”. Published by International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012
CSI/FBI 2007, Computer Crime and Security Survey, 9-14-2007. Content Posted by New Media Institute (NMI) Editor. Available at: http://en.wikipedia.org/wiki/Encryption
Rigoberto G. 2009, Using Classical Ciphers in Secondary Mathematics. BSc. Thesis McMurry University Abilene, Texas 2009
Dharmendra K. 2012, New concept of symmetric encryption algorithm a hybrid approach of caesar cipher and columnar transposition in multi stages. Journal of Global Research in Computer Science (JGRCS) Copyright Agreement & Authorship Responsibility Vol 3, No. 1 (2012). Available at:http://www.jgrcs.info/index.php/jgrcs/article/view/295
Prachi P. 2013, A Poly-alphabetic Approach to Caesar Cipher Algorithm. International Journal of Computer Science and Information Technologies(IJCSIT), Vol. 4 (6) , 2013, 954-959
Bhardwaj C. 2012, Modification of Vigenère Cipher by Random Numbers, Punctuations & Mathematical Symbols. Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep.-Oct. 2012), PP 35-38 Available at: www.iosrjournals.org
Ms. Nora Zilam Runera. (2014). Performance Analysis On Knowledge Management System on Project Management. International Journal of New Practices in Management and Engineering, 3(02), 08 - 13. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/28
Kumar, L. R. ., Ashokkumar, C. ., Pandey, P. S. ., Kannaiah, S. K. ., J, B. ., & Hussan, M. I. T. . (2023). Security Enhancement in Surveillance Cloud Using Machine Learning Techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3s), 46–55. https://doi.org/10.17762/ijritcc.v11i3s.6154
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.