Revisiting shift cipher technique for amplified data security

Show simple item record

dc.contributor.author Verma, Raksha
dc.contributor.author Kumari, Anjali
dc.contributor.author Anand, Adarsh
dc.contributor.author Yadavalli, Venkata S. Sarma
dc.date.accessioned 2025-03-28T10:22:48Z
dc.date.available 2025-03-28T10:22:48Z
dc.date.issued 2024-02
dc.description DATA AVAILABILITY STATEMENT : Data sharing is not applicable to this article as no new data were created or analyzed in this study. en_US
dc.description.abstract Ever sincemanualwork is overtaken by technology, the rapid advancement in the technologies for performing all kinds ofwork online has created newpossibilities for the organizations and institutions of all types.But this has also created opportunities for attackers and opponents by reducing the powers of existing controls over data sharing. All private, public, and any other sectors are using the internet for sharing their data. Transmission of unencrypted data over the internet is not secure as it posesmany privacy concerns as they can be easily hacked andmisused by any unintended person. So, everyone is concerned about safe and secure ways of data transmission in order to avoid leak of private data, as hackers always try tochase the transmitted data and torecover it, and thereforevarious different techniques are developed inorder tomake data transmission more secure. Encryption is essential to protect and prevent such lapses in the transmission of sensitive information over the internet and any other networks. In this paper, the author has worked on a better version of Caesar cipher and invented a method in which modular arithmetic is used to convert plaintext into ciphertext in order to amplify and to bolster up the security of the sensitive data or information, and the author composed the decryption method in such a way that it is no way related to encryption by involving the divisibility tests and arithmetic modulo. en_US
dc.description.department Industrial and Systems Engineering en_US
dc.description.librarian am2024 en_US
dc.description.sdg SDG-09: Industry, innovation and infrastructure en_US
dc.description.uri http://ojs.bonviewpress.com/index.php/JCCE/index en_US
dc.identifier.citation Verma, R., Kumari, A., Anand, A., & Yadavalli, V. S. S. (2024). Revisiting Shift Cipher Technique for Amplified Data Security. Journal of Computational and Cognitive Engineering, 3(1), 8–14. https://DOI.org/10.47852/bonviewJCCE2202261. en_US
dc.identifier.issn 2810-9570 (print)
dc.identifier.issn 2810-9503 (online)
dc.identifier.other 10.47852/bonviewJCCE2202261
dc.identifier.uri http://hdl.handle.net/2263/101791
dc.language.iso en en_US
dc.publisher Bon View Publishi​ng en_US
dc.rights © The Author(s) 2022. This is an open access article under the CC BY License. en_US
dc.subject Decryption en_US
dc.subject Private key encryption en_US
dc.subject Public key encryption en_US
dc.subject Number theory en_US
dc.subject SDG-09: Industry, innovation and infrastructure en_US
dc.title Revisiting shift cipher technique for amplified data security en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record