A MODIFIED CAESAR CIPHER ENCRYPTION TECHNIQUE FOR SECURED INFORMATION SHARING
Abstract
The need to ensure the confidentiality of data in a shared environment triggered the implementation of cryptography, where data is transformed into an unintelligible format. In modern cryptography, complex mathematical concepts create a strong encryption system. This paper developed an encryption method based on the Caesar cipher method. The developed method modified the Caesar cipher method by adding a second layer of encryption. In the developed method, after the first encryption using the Caesar cipher substitution method, an alphanumeric table for Caesar cipher text was formulated to generate the final cipher text, which leaves no resemblance to the Caesar cipher encryption. The encryption was implemented using the Python programming language. Both the Caesar cipher and the modified methods were simulated in a Python Integrated Development Environment and tested using a brute force attack. The results showed the Caesar cipher method broken without the shift key available, while the modified method could not be broken. The result demonstrated that a strong encryption technique could be developed with less complexity.
References
Asoronye, G. O., Emereonye, G. I., Onyibe, C. O., & Agha, I. A. (2019). An Efficient Implementation for the Cryptanalysis of Caesars Cipher. In Melting Pot (Vol. 5).
Bellovin, S. M. (2008). The Insider Attack Problem Nature and Scope. Advances in Information Security, 39. https://doi.org/10.1007/978-0-387-77322-3_1 DOI: https://doi.org/10.1007/978-0-387-77322-3_1
Dar, S. B. (2014). Enhancing The Security of Caesar Cipher Using Double Substitution Method. International Journal of Computer Science & Engineering Technology (IJCSET), 5(7).
Delfs, H., & Knebl, H. (2015). Introduction to cryptography: Principles and applications: Third edition. In Introduction to Cryptography: Principles and Applications: Third Edition. https://doi.org/10.1007/978-3-662-47974-2 DOI: https://doi.org/10.1007/978-3-662-47974-2
Goyal, K., & Kinger, S. (2013). Modified Caesar Cipher for Better Security Enhancement. International Journal of Computer Applications, 73(3). https://doi.org/10.5120/12722-9558 DOI: https://doi.org/10.5120/12722-9558
Gunawan, I., Sumarno, Tambunan, H. S., Irawan, E., Qurniawan, H., & Hartama, D. (2019). Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages. Journal of Physics: Conference Series, 1255(1). https://doi.org/10.1088/1742-6596/1255/1/012077 DOI: https://doi.org/10.1088/1742-6596/1255/1/012077
Jain, A., Dedhia, R., & Patil, A. (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications, 129(13). https://doi.org/10.5120/ijca2015907062 DOI: https://doi.org/10.5120/ijca2015907062
Odijie, C. H., Olanrewaju, B. S., & Odijie, B. O. (2025). THE EMERGING TECHNOLOGIES, USE CASES, PROSPECTS, AND CHALLENGES OF 6G WIRELESS SYSTEMS. International Journal Of Novel Research And Development, 10(1), 989996.
Odijie, C. H., Olanrewaju, & Olayinka. (2024). 6G WIRELESS SYSTEM: PAVING THE PATH FOR THE FUTURE OF CONNECTIVITY. In Wellspring University Journal of Science and Computing (Vol. 1, Issue 1). https://ORCID.org/0009-0006-7450-9485
Olanrewaju, B. S., Oghene, F. B.;, & Akilo, B. E. (2024). Implementation of Caesar Cipher Encryption Using Python Programming Language. International Journal of Multidisciplinary Research and Growth Evaluation, 5(5), 533539. DOI: https://doi.org/10.54660/.IJMRGE.2024.5.5.533-539
Olanrewaju, B. S. , & Osunade, O. (2018). Design of a Mathematical Model for Spectrum Utilisation in Cognitive Radio. International Journal of Computer Applications, 180(19). https://doi.org/10.5120/ijca2018916436 DOI: https://doi.org/10.5120/ijca2018916436
Sinclair, S., & Smith, S. W. (2008). Preventative Directions For Insider Threat Mitigation Via Access Control. Advances in Information Security, 39. https://doi.org/10.1007/978-0-387-77322-3_10 DOI: https://doi.org/10.1007/978-0-387-77322-3_10
Ugwunna, C. O., Okimba, P. E., Alabi, O. A., Orji, E. E., Olowofeso, E. O. & Ayomide, S. O (2025). ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS. FUDMA Journal of Sciences (FJS), 8(6) pp 42-49. : https://doi.org/10.33003/fjs-2024-0806-2832 DOI: https://doi.org/10.33003/fjs-2024-0806-2832
Verma, P., Gaba, G. S., & Miglani, R. (2017). Diversified Caesar Cipher for Impeccable Security. International Journal of Security and Its Applications, 11(2). https://doi.org/10.14257/ijsia.2017.11.2.04 DOI: https://doi.org/10.14257/ijsia.2017.11.2.04
Vogel, M. (2011). Quantum Computation and Quantum Information, by M.A. Nielsen and I.L. Chuang. Contemporary Physics, 52(6). https://doi.org/10.1080/00107514.2011.587535 DOI: https://doi.org/10.1080/00107514.2011.587535
Copyright (c) 2025 FUDMA JOURNAL OF SCIENCES

This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences