Revisiting shift cipher technique for amplified data security

dc.contributor.authorVerma, Raksha
dc.contributor.authorKumari, Anjali
dc.contributor.authorAnand, Adarsh
dc.contributor.authorYadavalli, Venkata S. Sarma
dc.date.accessioned2025-03-28T10:22:48Z
dc.date.available2025-03-28T10:22:48Z
dc.date.issued2024-02
dc.descriptionDATA AVAILABILITY STATEMENT : Data sharing is not applicable to this article as no new data were created or analyzed in this study.en_US
dc.description.abstractEver sincemanualwork is overtaken by technology, the rapid advancement in the technologies for performing all kinds ofwork online has created newpossibilities for the organizations and institutions of all types.But this has also created opportunities for attackers and opponents by reducing the powers of existing controls over data sharing. All private, public, and any other sectors are using the internet for sharing their data. Transmission of unencrypted data over the internet is not secure as it posesmany privacy concerns as they can be easily hacked andmisused by any unintended person. So, everyone is concerned about safe and secure ways of data transmission in order to avoid leak of private data, as hackers always try tochase the transmitted data and torecover it, and thereforevarious different techniques are developed inorder tomake data transmission more secure. Encryption is essential to protect and prevent such lapses in the transmission of sensitive information over the internet and any other networks. In this paper, the author has worked on a better version of Caesar cipher and invented a method in which modular arithmetic is used to convert plaintext into ciphertext in order to amplify and to bolster up the security of the sensitive data or information, and the author composed the decryption method in such a way that it is no way related to encryption by involving the divisibility tests and arithmetic modulo.en_US
dc.description.departmentIndustrial and Systems Engineeringen_US
dc.description.librarianam2024en_US
dc.description.sdgSDG-09: Industry, innovation and infrastructureen_US
dc.description.urihttp://ojs.bonviewpress.com/index.php/JCCE/indexen_US
dc.identifier.citationVerma, R., Kumari, A., Anand, A., & Yadavalli, V. S. S. (2024). Revisiting Shift Cipher Technique for Amplified Data Security. Journal of Computational and Cognitive Engineering, 3(1), 8–14. https://DOI.org/10.47852/bonviewJCCE2202261.en_US
dc.identifier.issn2810-9570 (print)
dc.identifier.issn2810-9503 (online)
dc.identifier.other10.47852/bonviewJCCE2202261
dc.identifier.urihttp://hdl.handle.net/2263/101791
dc.language.isoenen_US
dc.publisherBon View Publishi​ngen_US
dc.rights© The Author(s) 2022. This is an open access article under the CC BY License.en_US
dc.subjectDecryptionen_US
dc.subjectPrivate key encryptionen_US
dc.subjectPublic key encryptionen_US
dc.subjectNumber theoryen_US
dc.subjectSDG-09: Industry, innovation and infrastructureen_US
dc.titleRevisiting shift cipher technique for amplified data securityen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Verma_Revisiting_2024.pdf
Size:
573.7 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: