Revisiting Shift Cipher Technique for Amplified Data Security

25Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Ever since manual work is overtaken by technology, the rapid advancement in the technologies for performing all kinds of work online has created new possibilities for the organizations and institutions of all types. But this has also created opportunities for attackers and opponents by reducing the powers of existing controls over data sharing. All private, public, and any other sectors are using the internet for sharing their data. Transmission of unencrypted data over the internet is not secure as it poses many privacy concerns as they can be easily hacked and misused by any unintended person. So, everyone is concerned about safe and secure ways of data transmission in order to avoid leak of private data, as hackers always try to chase the transmitted data and to recover it, and therefore various different techniques are developed in order to make data transmission more secure. Encryption is essential to protect and prevent such lapses in the transmission of sensitive information over the internet and any other networks. In this paper, the author has worked on a better version of Caesar cipher and invented a method in which modular arithmetic is used to convert plaintext into ciphertext in order to amplify and to bolster up the security of the sensitive data or information, and the author composed the decryption method in such a way that it is no way related to encryption by involving the divisibility tests and arithmetic modulo.

Cite

CITATION STYLE

APA

Verma, R., Kumari, A., Anand, A., & Yadavalli, V. S. S. (2024). Revisiting Shift Cipher Technique for Amplified Data Security. Journal of Computational and Cognitive Engineering, 3(1), 8–14. https://doi.org/10.47852/bonviewJCCE2202261

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free