A MODIFIED CAESAR CIPHER ENCRYPTION TECHNIQUE FOR SECURED INFORMATION SHARING

  • Babatunde Seyi Olanrewaju Wellspring University Benin
  • Victor Osasu Eguavoen Wellspring University
  • Oluwasogo Adekunle Okunade National Open University of Nigeria, Abuja, Nigeria
Keywords: Cryptography, Caesar cipher, Python Programming language, Brute force attack

Abstract

The need to ensure the confidentiality of data in a shared environment triggered the implementation of cryptography, where data is transformed into an unintelligible format. In modern cryptography, complex mathematical concepts create a strong encryption system. This paper developed an encryption method based on the Caesar cipher method. The developed method modified the Caesar cipher method by adding a second layer of encryption. In the developed method, after the first encryption using the Caesar cipher substitution method, an alphanumeric table for Caesar cipher text was formulated to generate the final cipher text, which leaves no resemblance to the Caesar cipher encryption. The encryption was implemented using the Python programming language. Both the Caesar cipher and the modified methods were simulated in a Python Integrated Development Environment and tested using a brute force attack. The results showed the Caesar cipher method broken without the shift key available, while the modified method could not be broken. The result demonstrated that a strong encryption technique could be developed with less complexity.

References

Asoronye, G. O., Emereonye, G. I., Onyibe, C. O., & Agha, I. A. (2019). An Efficient Implementation for the Cryptanalysis of Caesars Cipher. In Melting Pot (Vol. 5).

Bellovin, S. M. (2008). The Insider Attack Problem Nature and Scope. Advances in Information Security, 39. https://doi.org/10.1007/978-0-387-77322-3_1 DOI: https://doi.org/10.1007/978-0-387-77322-3_1

Dar, S. B. (2014). Enhancing The Security of Caesar Cipher Using Double Substitution Method. International Journal of Computer Science & Engineering Technology (IJCSET), 5(7).

Delfs, H., & Knebl, H. (2015). Introduction to cryptography: Principles and applications: Third edition. In Introduction to Cryptography: Principles and Applications: Third Edition. https://doi.org/10.1007/978-3-662-47974-2 DOI: https://doi.org/10.1007/978-3-662-47974-2

Goyal, K., & Kinger, S. (2013). Modified Caesar Cipher for Better Security Enhancement. International Journal of Computer Applications, 73(3). https://doi.org/10.5120/12722-9558 DOI: https://doi.org/10.5120/12722-9558

Gunawan, I., Sumarno, Tambunan, H. S., Irawan, E., Qurniawan, H., & Hartama, D. (2019). Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages. Journal of Physics: Conference Series, 1255(1). https://doi.org/10.1088/1742-6596/1255/1/012077 DOI: https://doi.org/10.1088/1742-6596/1255/1/012077

Jain, A., Dedhia, R., & Patil, A. (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications, 129(13). https://doi.org/10.5120/ijca2015907062 DOI: https://doi.org/10.5120/ijca2015907062

Odijie, C. H., Olanrewaju, B. S., & Odijie, B. O. (2025). THE EMERGING TECHNOLOGIES, USE CASES, PROSPECTS, AND CHALLENGES OF 6G WIRELESS SYSTEMS. International Journal Of Novel Research And Development, 10(1), 989996.

Odijie, C. H., Olanrewaju, & Olayinka. (2024). 6G WIRELESS SYSTEM: PAVING THE PATH FOR THE FUTURE OF CONNECTIVITY. In Wellspring University Journal of Science and Computing (Vol. 1, Issue 1). https://ORCID.org/0009-0006-7450-9485

Olanrewaju, B. S., Oghene, F. B.;, & Akilo, B. E. (2024). Implementation of Caesar Cipher Encryption Using Python Programming Language. International Journal of Multidisciplinary Research and Growth Evaluation, 5(5), 533539. DOI: https://doi.org/10.54660/.IJMRGE.2024.5.5.533-539

Olanrewaju, B. S. , & Osunade, O. (2018). Design of a Mathematical Model for Spectrum Utilisation in Cognitive Radio. International Journal of Computer Applications, 180(19). https://doi.org/10.5120/ijca2018916436 DOI: https://doi.org/10.5120/ijca2018916436

Sinclair, S., & Smith, S. W. (2008). Preventative Directions For Insider Threat Mitigation Via Access Control. Advances in Information Security, 39. https://doi.org/10.1007/978-0-387-77322-3_10 DOI: https://doi.org/10.1007/978-0-387-77322-3_10

Ugwunna, C. O., Okimba, P. E., Alabi, O. A., Orji, E. E., Olowofeso, E. O. & Ayomide, S. O (2025). ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS. FUDMA Journal of Sciences (FJS), 8(6) pp 42-49. : https://doi.org/10.33003/fjs-2024-0806-2832 DOI: https://doi.org/10.33003/fjs-2024-0806-2832

Verma, P., Gaba, G. S., & Miglani, R. (2017). Diversified Caesar Cipher for Impeccable Security. International Journal of Security and Its Applications, 11(2). https://doi.org/10.14257/ijsia.2017.11.2.04 DOI: https://doi.org/10.14257/ijsia.2017.11.2.04

Vogel, M. (2011). Quantum Computation and Quantum Information, by M.A. Nielsen and I.L. Chuang. Contemporary Physics, 52(6). https://doi.org/10.1080/00107514.2011.587535 DOI: https://doi.org/10.1080/00107514.2011.587535

Published
2025-05-31
How to Cite
Olanrewaju, B. S., Eguavoen, V. O., & Okunade, O. A. (2025). A MODIFIED CAESAR CIPHER ENCRYPTION TECHNIQUE FOR SECURED INFORMATION SHARING. FUDMA JOURNAL OF SCIENCES, 9(5), 180 - 186. https://doi.org/10.33003/fjs-2025-0905-3494