The Art of Secrecy: Hybridizing Caesar and Columnar Ciphers for Enhanced Data Security

Authors

  • Syeda Wajiha Zahra Department of Computer Science, National University of Technology, Islamabad 44000, Pakistan
  • Mudassar Ali Zaman Department of Computer Science, Alhamd Islamic University, Islamabad 44000, Pakistan
  • Waqas Ahmad Department of Computer Science, Alhamd Islamic University, Islamabad 44000, Pakistan
  • Muhammad Nadeem Department of Computer Science and Technology, University of Science and Technology Beijing, Beijing 100083, China
  • Ali Arshad Department of Computer Science, National University of Technology, Islamabad 44000, Pakistan
  • Saman Riaz Department of Computer Science, National University of Technology, Islamabad 44000, Pakistan

Keywords:

Cryptography, Vigenère Hybridizing Algorithms, Data Security, Caesar Cipher, Columnar Matrix, Hill Cipher

Abstract

Cryptography is currently the most secure way for transmitting data on the Cloud. It employs one or algorithms to securely transport data, preventing any unauthorized access or loss. An assortment of researchers has devised numerous protocols related to secure data transmission. Each method entails transforming data from an accessible format to an inaccessible one. However, more than these approaches are needed to ensure absolute information security. In the context of data security, each algorithm is susceptible to vulnerabilities. Ensuring the implementation of adequate data security protocols will effectively protect the encrypted data against any decryption attempts by malicious actors. An attempt to modify the data will render the assailant incapable of recovering the original and causing damage. This article introduces an innovative method that integrates the substitution cipher and transposition ciphers to guarantee data confidentiality and integrity during transmission and communication. By contrasting our work with prior research, we have demonstrated that the proposed algorithm outperforms the existing cypher schemes. At the end, a conclusion is subsequently attained through a comparative analysis.

Author Biography

Waqas Ahmad, Department of Computer Science, Alhamd Islamic University, Islamabad 44000, Pakistan

My name is Waqas Ahmad. I have been working as a lecturer at Thal University Bhakkar.  Previously I have experience of three years as a Lecturer in the Superior Group of Colleges Bhakkar and worked as a visiting lecturer in the Department of CS&IT University of Sargodha Sub-Campus Bhakkar for 5 Years. I have also worked with these prestigious institutions as Assistant Controller of Examinations and member admission committee. I have broader experience in the field of research. As far as my education is concerned, I have earned a Master of Science in Computer Science from Qurtuba University of Science and Information Technology, Dera Ismail Khan Pakistan.

Downloads

Published

2024-07-08