SIGNIFICANCE OF NUMBER THEORY TO DEVELOP SECURITY OF CAESAR CIPHER METHOD
Maqola haqida umumiy ma'lumotlar
Cryptography is a discipline of converting the basic text communication into non readable form. the wide progress of technology increases the necessity of electronic data protection than ever before. Cryptography performance a significant role in data safety techniques. Cryptography has raised as a clarification which performances a dynamic function in data safety arrangement against malevolent attacks. Number Theory plays significant role in the encryption process. Caesar cipher is an earliest and basic cryptographic method of transforming initial text communication in to non-readable to keep the text from opponents. Caesar cipher is an arm of substitution method so we shall underwrite this technique in the range of traditional cryptography through delivering of an escalating and traditional form for Caesar cipher by means of information of mathematics and Computer science to growth the stability of the encryption. I Considered Caesar ciphers as agents and improved form of Traditional method with numerous characters key, that encrypted plaintext is approximately difficult to decrypt.my purposes is to present the utilization of Number Theory in Caesar Cipher Cryptography. We drive quick conversation around the knowledge of encryption in Caesar ciphering and several connected tools in Number Theory.
- Ramandeep Sharma, Richa Sharma and Harmanjit Singh “Classical Encryption Techniques” published in International Journal of Computers & Technology. Volume 3. No. 1, AUG, 2012.
- O.P Verma, RituAg arwal, DhirajDafouti and ShobhaTyagi, “Peformance Analysis of Data Encryption Algorithms”, IEEE, Delhi Technological University India, 2011.
- William Stallings, "Cryptography and Network Security", Fourth Edition, Prentice-Hall -pp.80-81.
- Stallings, W. (2006), Cryptography and Network Security 4/E., Pearson Education India.
- Atul Kahate (2009), Cryptography and Network Security, 2nd edition, McGraw-Hill
- Behrouz A Fourouzan, Debdeep Mukhopadhyay (2010), Cryptography and Network, 2nd edition, McGraw-Hill.
- Senthil, K., K. Prasanthi, and R. Rajaram. "A modern avatar of Julius Caesar and Vigenere cipher." Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on. IEEE, 2013.
- Gaurav Sharma, Ajay Kakkar, "Cryptography Algorithms and approaches used for data security”, International Journal of Scientific & Engineering Research Vol. 3, Issue 6, 2012.
- Hamdan.O.Alanazi, B.B.Zaidan and A.A.Zaidan, “New Comparative Study Between DES, 3DES and AES within Nine Factors”, JOURNAL OF COMPUTING. Vol.2, Issue 3. Pp.152-157, MARCH, 2010.
- Jason Crampton, “Time-Storage Trade-Offs for Cryptographically-Enforced Access Control”, Lecture Notes in Computer Science, Springer, 2011, Vol. 6879/2011, pp. 245-261.
- Jiannong Cao, Lin Liao, Guojun Wang, “Scalable key management for Secure Multicast Communication in the Mobile Environment” Pervasive and Mobile Computing Vol. 2, pp.187–203, 2006.
- Stalling, William.”Cryptography and Network Security: Principles and Practice”. 5th ed, Prentice Hall, 2006.
- “Classical-Encryption Techniques”, mrajacse.files.wordpress.com/chapter-2.
- Sinkov A., “Elementary “Cryptanalysis-A mathematical Approach”, Mathematical Association of America, 1966.
- Jason Crampton, “Time-Storage Trade-Offs for Cryptographically-Enforced Access Control”, Lecture Notes in Computer Science, Springer, 2011, Vol. 6879/2011, pp. 245-261.
- Stalling, William.”Cryptography andNetwork Security: Principles andPractice”. 5th ed, Prentice Hall, 2006.
- Gaurav Sharma, Ajay Kakkar, "Cryptography Algorithms and approaches used for data security”, International Journal of Scientific & Engineering Research Vol. 3, Issue 6, 2012
- Sinkov A., “Elementary “Cryptanalysis-A mathematical Approach”, Mathematical Association of America, 1966.
- Kraft, J. S., & Washington, L. C. (2018). An introduction to number theory with cryptography. CRC press.
- Koblitz, N. (2000). A survey of number theory and cryptography. In Number Theory (pp. 217-239). Hindustan Book Agency, Gurgaon.
Noori, A. ., & Abid, A. . (2023). SIGNIFICANCE OF NUMBER THEORY TO DEVELOP SECURITY OF CAESAR CIPHER METHOD. Academic Research in Educational Sciences, 4(5), 775–784. https://doi.org/
Noori, Ahmad Shah, and Abdullah Abid,. “SIGNIFICANCE OF NUMBER THEORY TO DEVELOP SECURITY OF CAESAR CIPHER METHOD.” Academic Research in Educational Sciences, vol. 5, no. 4, 2023, pp. 775–784, https://doi.org/.
Noori, . and Abid, . 2023. SIGNIFICANCE OF NUMBER THEORY TO DEVELOP SECURITY OF CAESAR CIPHER METHOD. Academic Research in Educational Sciences. 5(4), pp.775–784.