ENHANCED CAESAR CIPHER ALGORITHM USING DYNAMIC KEY GENERATION WITH TIMESTAMP TECHNIQUE FOR DATA SECURITY
DOI:
https://doi.org/10.35631/JISTM.1142009Keywords:
Caesar Cipher, Cryptography, Data Security, Encryption, TimestampAbstract
Data security remains a critical concern in the digital era due to the rising frequency of unauthorized access. While the Caesar Cipher is a foundational cryptographic technique, its static nature makes it highly vulnerable to frequency analysis and brute-force attacks. This study proposes an Enhanced Caesar Cipher algorithm that integrates Dynamic Key Generation utilizing a timestamp technique to improve data confidentiality. By generating keys dynamically based on the exact time of encryption, the algorithm ensures that the same plaintext results in different ciphertexts at different intervals, effectively mitigating basic substitution pattern recognition.Experimental results demonstrate that the proposed method maintains a lightweight computational profile, achieving an average encryption time of 0.3 seconds for a 1 MB file with a linear scaling pattern . This efficiency makes the algorithm particularly suitable for low-power environments, IoT applications, and educational purposes where modern complex encryption may be resource-prohibitive. While not intended to replace high-security standards like AES, this enhanced approach provides a significant security improvement over the traditional Caesar Cipher by introducing temporal variability into the key space.
Downloads
References
Abed, H. H., Shaeel, A. S., Shallal, R., & Annoze, A. (2023). Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement. 13(6), 6797–6805. https://doi.org/10.11591/ijece.v13i6.pp6797-6805
Abikoye, O. C., Oladipupo, E. T., Imoize, A. L., Awotunde, J. B., Lee, C. C., & Li, C. T. (2023). Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme. Future Internet, 15(3), 1–33. https://doi.org/10.3390/fi15030099
Adewale Daniel Sontan, & Segun Victor Samuel. (2024). The intersection of Artificial Intelligence and cybersecurity: Challenges and opportunities. World Journal of Advanced Research and Reviews, 21(2), 1720–1736. https://doi.org/10.30574/wjarr.2024.21.2.0607
Ani Petrosyan. (2024). usage internet. https://www.statista.com/statistics/273018/number-of-internet-users-worldwide/
Cipher, C. (2022). 1 , 2 , 3. 4(3), 179–184.
Dhawan, S., Bhuyan, H. K., Pani, S. K., Ravi, V., Gupta, R., Rana, A., & Al Mazroa, A. (2024). Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic. Journal of Safety Science and Resilience, 5(1), 91–101. https://doi.org/10.1016/j.jnlssr.2023.12.003
İhsan, A., & Doğan, N. (2024). An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-024-18722-x
Jain, A., Dedhia, R., & Patil, A. (2015). Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. In International Journal of Computer Applications (Vol. 129, Issue 13).
Lefkowitz, J. (2024). Global Threat Intelligence Report Data, Insights, and Strategies for Navigating Today’s Cyber, Physical, and Geopolitical Threat Landscape. https://flashpoint.io/
Maimut, D., & Reyhanitabar, R. (2014). Authenticated encryption: Toward next-generation algorithms. IEEE Security and Privacy, 12(2), 70–72. https://doi.org/10.1109/MSP.2014.19
Nahar, K., & Chakraborty, P. (2020). A Modified Version of Vigenere Cipher using 95 95 Table. International Journal of Engineering and Advanced Technology, 9(5), 1144–1148. https://doi.org/10.35940/ijeat.e9941.069520
Patni, P. (n.d.). A Poly-alphabetic Approach to Caesar Cipher Algorithm. www.ijcsit.com
Purnamasari, D., Herlinudinkhaji, D., Dewi, A. K., & Mauludin, M. Z. (2024). Foveal Avascular Zone Image Encryption using Pixel Scrambling Combination Technique for Medical Image Security. JURNAL INFOTEL, 16(1). https://doi.org/10.20895/infotel.v16i1.1029
Qiao, H., Ren, J., Wang, Z., & Hu, Y. (2024). Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box. Symmetry, 16(1), 1–12. https://doi.org/10.3390/sym16010037
Satish Dadasaheb Tribhuvan, S. A. S. (2024). Caesar Cipher Techniques. International Research Journal of Modernization in Engineering Technology and Science. https://doi.org/10.56726/IRJMETS50200
Seyi, O. B., Best, O. F., & Eyitemi, A. B. (2024). Implementation of Caesar Cipher Encryption Using Python Programming Language. International Journal of Multidisciplinary Research and Growth Evaluation, 5(5), 533–539. https://doi.org/10.54660/.IJMRGE.2024.5.5.533-539
Suhael, S. M., Ahmed, Z. A., & Hussain, A. J. (2024). Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem. Baghdad Science Journal, 21(1), 151–160. https://doi.org/10.21123/bsj.2023.8361
Ummadi Thirupalu, E. al. (2023). New Era of Micro Cipher Algorithm (MCA) : Cipher Text for any Length of Plaintext. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 241–246. https://doi.org/10.17762/ijritcc.v11i10.8485
Veera, D., Mangrulkar, R., Bhadane, C., Bhowmick, K., & Chavan, P. (2024). Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption. Journal of Information and Telecommunication, 8(2), 280–300. https://doi.org/10.1080/24751839.2023.2285549
Veera, D., Mangrulkar, R., Bhadane, C., & Chavan, P. (2024). Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption Modi fi ed Caesar Cipher and Card Deck Shu ffl e. https://doi.org/10.1080/24751839.2023.2285549
