Improved Hybrid Cryptographic Methods: Enhancing Caesar and Vigenère Cipher Algorithms
Keywords:
Caesar cipher, Data security, Hybrid cipher techniques, Hybrid cryptography, Secure communication, Vigenère cipherAbstract
This study presents a novel approach to enhancing the security of traditional cryptographic techniques by integrating improved hybrid methods based on the Caesar and Vigenère cipher algorithms. While these classical ciphers have historical significance, they are increasingly vulnerable to modern cryptanalysis. Our research introduces innovative modifications that combine the strengths of both algorithms, resulting in a robust encryption framework capable of resisting various attack vectors. The Vigenere and Caesar ciphers were expanded and changed to incorporate symbols, numerals, and alphabets. However, this also caused confusion and diffusion within the newly created modified cipher. The modified hybrid of the Vigenère and Caesar ciphers is now a very powerful cipher that is hard to crack with brute force, frequency methods, etc. Through comprehensive analysis and experimentation, we demonstrate significant improvements in key space complexity and decryption time efficiency while maintaining user-friendliness. The proposed hybrid model not only fortifies the encryption process but also ensures that it remains accessible for practical applications, making it suitable for both educational purposes and real-world implementations in secure communications.
References
S. S. Dhanda, B. Singh, and P. Jindal, “Lightweight cryptography: a solution to secure IoT," Wireless Personal Communications, vol. 112, pp. 1947-1980, Jan. 2020, doi: https://doi.org/10.1007/s11277-020-07134-3.
T. Yousuf, R. Mahmoud, F. Aloul, and I. Zualkernan, "Internet of things (IoT) security: current status, challenges and countermeasures," International Journal for Information Security Research (IJISR), vol. 5, no. 4, pp. 608-616, Dec. 2015, Available: https://doi.org/10.20533/ijisr.2042.4639.2015.0070.
P. Bhatt and B. Thakker, "Secure IoT-GSM based smart home system with confidentiality and integrity," 2017 International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, Jan. 6–7, 2017. Available: https://www.researchgate.net/publication/324797976.
G. Sharma, A. Kakkar, R. Scholar, and A. Prof, “Cryptography Algorithms and approaches used for data security,” International Journal of Scientific & Engineering Research, vol. 3, no. 6, 2012, Available: https://www.ijser.org/researchpaper/Cryptography-Algorithms-and-approaches-used-for-data-security.pdf.
E. I. Imran and F. Abdulameerabdulkareem, "Enhancement caesar cipher for better security," IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 3, pp. 01-05, 2014, Available: https://www.iosrjournals.org/iosr-jce/papers/Vol16-issue3/Version-5/A016350105.pdf.
V. Subhashini and N. Geethanjali, "An enhanced approach on Vigenere cipher by polyalphabetic," International Journal of Latest Trends in Engineering and Technology, vol. 8, no. 1, pp. 372-379, 2017, Available: https://www.ijltet.org/journal/148594784948.1418.pdf.
K. Senthil, K. Prasanthi, and R. Rajaram, "A modern avatar of Julius Ceasar and Vigenere cipher," 2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013, pp. 1-3, doi: https://doi.org/10.1109/ICCIC.2013.6724170.
G.-Z. Nacira and A. Abdelaziz, "The/spl theta/-vigenere cipher extended to numerical data," Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004., Damascus, Syria, 2004, pp. 413-414, doi: https://doi.org/10.1109/ICTTA.2004.1307807.
A. Saraswat, C. Khatri, P. Thakral, and P. Biswas, "An extended hybridization of vigenére and caesar cipher techniques for secure communication," Procedia Computer Science, vol. 92, pp. 355-360, 2016, doi: https://doi.org/10.1016/j.procs.2016.07.390.
J. K. Pal, J. Mandal, and S. Gupta, "Composite transposition substitution chaining based cipher technique," in 2008 16th International Conference on Advanced Computing and Communications, 2008, pp. 433-439, doi: https://doi.org/10.1109/ADCOM.2008.4760485.
A.Blair, "Learning the Caesar and Vigenere Cipher by hierarchical evolutionary re-combination," in 2013 IEEE Congress on Evolutionary Computation, Cancun, Mexico, 2013, pp. 605-612, doi: https://doi.org/10.1109/CEC.2013.6557624.
J. J. Benz, "PGP: a hybrid solution," SANS Institute InfoSec Reading Room, 2001, Available: https://www.sans.org/white-papers/717/.
E. Fujisaki and T. Okamoto, “Secure Integration of Asymmetric and Symmetric Encryption Schemes,” Journal of Cryptology, vol. 26, no. 1, pp. 80–101, Dec. 2011, doi: https://doi.org/10.1007/s00145-011-9114-1.
S. S. Rizvi, A. Riasat, and K. M. Elleithy, "Combining private and public key encryption techniques for providing extremely secure environment for an academic institution application," International Journal of Network Security & its Application, vol. 2, no. 1, 2010, https://www.researchgate.net/publication/41099679_COMBINING_PRIVATE_AND_PUBLIC_KEY_ENCRYPTION_TECHNIQUES_FOR_PROVIDING_EXTREME_SECURE_ENVIRONMENT_FOR_AN_ACADEMIC_INSTITUTION_APPLICATION.
D. Salama, A. Elminaam, H. Mohamed, A. Kader, and M. Hadhoud, "Evaluating The Performance of Symmetric Encryption Algorithms," International Journal of Network Security, vol. 10, no. 3, pp. 216-222, 2010, http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p213-219.pdf.
D. K. Gupta, S. K. Srivastava and Vedpal Singh, "New concept of symmetric encryption algorithm a hybrid approach of Caesar cipher and columnar transposition in multi-stages," Journal of Global Research in Computer Science, vol. 3, no. 1, pp. 60-66, 2012, https://www.rroij.com/open-access/new-concept-of-symmetric-encryption-algorithm-a-hybrid-approach-of-caesar-cipher-60-66.pdf.