2016
DOI: 10.1002/sec.1431
|View full text |Cite
|
Sign up to set email alerts
|

Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study

Abstract: Caesar cipher is a mono alphabetic cipher. It is also a type of substitution cipher in which each letter in the plaintext is "shifted" a certain number of places down the alphabet. However, Caesar cipher method did not last long because of its simplicity and lack of communication security. Therefore, we believe that strengthen the key mechanism should increase its complexity against the various cryptanalysis attacks. This paper proposes an enhanced Caesar cipher method through adopting two private keys that ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Encryption techniques have been popular since the time of Julius Caesar who introduced the Caesar's cipher. 21 Till recent times, the success of encryption techniques relied on using symmetric key encryption meaning that the participating entities must share the unique encryption/decryption key through a secure channel separately. 22 As internet proliferated, it was no longer a viable option to meet or communicate in advance over another secure channel.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Encryption techniques have been popular since the time of Julius Caesar who introduced the Caesar's cipher. 21 Till recent times, the success of encryption techniques relied on using symmetric key encryption meaning that the participating entities must share the unique encryption/decryption key through a secure channel separately. 22 As internet proliferated, it was no longer a viable option to meet or communicate in advance over another secure channel.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…The creation of public keys has shown to be a one-way process that is based on a binary matrix that is created and exchanged by the two communication parties. [7] Abed, B. N. et. al.…”
Section: Literature Reviewmentioning
confidence: 99%