2022
DOI: 10.52465/joscex.v3i2.86
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2

Abstract: Information has become precious and essential for all fields, so it is crucial to carry out information security. The principle of information security is to protect and safeguard information with the aim that the information is not entitled to be read, modified, or deleted by anyone who does not have rights to it. The purpose of our research is to analyze how the caesar cipher and vernam cipher methods are jointly used in the cryptographic process and are expected to produce a high level of data encryption so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Furthermore, since it employs less processing power, AES is competent in implementing faster encryption strategies compared to others. The change cipher employs a round of encryption as do numerous other square ciphers [11]- [13]. Separate the entered plain content into pieces consisting of four rows and four columns.…”
Section: Aes Algorithm Encryption Proceduresmentioning
confidence: 99%
“…Furthermore, since it employs less processing power, AES is competent in implementing faster encryption strategies compared to others. The change cipher employs a round of encryption as do numerous other square ciphers [11]- [13]. Separate the entered plain content into pieces consisting of four rows and four columns.…”
Section: Aes Algorithm Encryption Proceduresmentioning
confidence: 99%
“…Caesar cipher is an example of a substitution cipher, where each letter in the plaintext is changed to a letter that is moved a predetermined number of positions down the alphabet. Modular arithmetic is used to illustrate the encryption [19], [20]. Julius Caesar, the invention's name, is another name for the Caesar cipher [19].…”
Section: Principle Of Caesar Cipher and Fused Image 21 Caesar Ciphermentioning
confidence: 99%