SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-4, Issue-4,
1
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
Abstract— In this era of global communication where online
communication through the use of computer network and
telecommunication system has dominated the means of
communication between people. The goal of privacy is very
paramount. The numbers of people being connected to the
communication system through their mobile phone, computer or
any other e-communication tools are increasing day-by-day.
Hence there is need to secure the communication networks from
adversaries (third parties) between the sender and receivers.
There are many aspects to security approach in data
communication environment. One essential aspect for secure
communications is that of cryptography, which the focus of this
research is. We have developed stand-alone application software
that implements cryptography using Caesar algorithms. This
program can be implemented with chatting software or E-mail
software to encrypt data. The algorithm was coded with Java
programming language.
Index Terms— Caesar Cipher, Cryptography, Java
programming language, Computer network
I. INTRODUCTION
The goal of privacy is achieved if a message is only
received by the intended recipients. This goal is normally
accomplished using encryption algorithms. Encryption
algorithms convert the original message, called the plaintext,
into an encrypted form called the ciphertext that must be
decrypted back into the plaintext by the recipient in order for
it to be meaningful.
Most ciphers use a piece of information called a key for
encryption and decryption, and ciphers that use the same key
for both processes (sender and recipient) are called
symmetric keyciphers, as opposed to asymmetric key ciphers,
in which the keys are different on both sides of the message
transmission channel [1].
Cryptographyis the science of writing in secret code and is
an ancient art; the first documented use of cryptography in
writing dates back to circa 1900 B.C. when an Egyptian
scribe used non-standard hieroglyphs in an inscription. Some
experts argue that cryptography appeared spontaneously
sometime after writing was invented, with applications
ranging from diplomatic missives to war-time battle plans. It
is no surprise, then, that new forms of cryptography came
soon after the widespread development of computer
communications [2].
In cryptography, a Caesar cipher is one of the simplest and
most widely known encryption techniques. It is a type of
substitution cipher in which each letter in the plaintext is
replaced by a letter some fixed number of positions down the
alphabet. For example, with a shift of 3, A would be replaced
by D, B would become E, and so on. The method is named
after Julius Caesar, who used it in his private correspondence
[3]. The focus of this paper is to design and implement a
caser cipher application system that can protect data from
theft or alteration, and also be used for user authentication
when communicating over any untrusted medium, which
includes just about any network, particularly the Internet.
In Caesar Cipher the transformation can be represented by
aligning two alphabets; the cipher alphabet is the plain
alphabet rotated left or right by some number of positions.
For instance, here is a Caesar cipher using a left rotation of
three places (the shift parameter, here 3, is used as the key):
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher:
DEFGHIJKLMNOPQRSTUVWXYZABC. When
encrypting, a person looks up each letter of the message in
the "plain" line and writes down the corresponding letter in
the "cipher" line. Deciphering is done in reverse [4]. The
diagram below illustrates a typical Caesar Cipher. The
Caesar Cipher is an encoding method that works like this;
this example is for a shift amount of 13, which is a ROT-13.
if (character is in alphabet)
{
if(character is in bottom half of alphabet [A-M|a-m] )
character = character + 13;
else /* character is in top half [N-Z|n-z] */
character = character – 13;
}
print(character);
In a Caesar cipher, each letter is replaced by a letter further
along in the alphabet. You can think of it as shifting the
alphabet to the left. The key of a Caesar cipher is the number
of places the alphabet is shifted. Here is a Caesar cipher with
key 3:
A.Objectives of This Research Work
The objectives of this research work are to:
 To achieve the goal of privacy in data communication
and telecommunication system i.e. a message is
only received and decoded by the intended
recipients.
 To provide confidentiality, authenticity, integrity,
and non-repudiation of the information transmitted
through the online
Data Security on Computer Network and
Telecommunication System Using Caesar Cipher
Cryptography Algorithm: AJava Implementation
Akinyele A. Okedola, Yekini N. Asafe
Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm:
A Java Implementation
2
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
communication network.
 To develop a cryptographic algorithm that is an
improvement on the existing system
B.Scope of Study
This research work focuses on design and implementation
of cryptosystems for preventing third parties from assessing
data/information (message) between sender and receiver on
online communication using caesar algorithm with java
programming language.
II.LITERATURE REVIEW
A.Cryptograph Concept and Data Communication
In data and telecommunications, cryptography is
necessary when communicating over any untrusted
medium, which includes just about any network,
particularly the Internet. Within the context of any
application-to-application communication, there are some
specific security requirements, including:
 Authentication: The process of proving one's identity.
(The primary forms of host-to-host authentication
on the Internet today are name-based or
address-based, both of which are notoriously weak.)
 Privacy/confidentiality: Ensuring that no one can
read the message except the intended receiver.
 Integrity: Assuring the receiver that the received
message has not been altered in any way from the
original.
 Non-repudiation: A mechanism to prove that the
sender really sent this message.
Cryptography, then, not only protects data from theft or
alteration, but can also be used for user authentication.
There are, in general, three types of cryptographic schemes
typically used to accomplish these goals: secret key (or
symmetric) cryptography, public-key (or asymmetric)
cryptography, and hash functions, each of which is
described below. In all cases, the initial unencrypted data is
referred to as plaintext. It is encrypted into Cipher text,
which will in turn (usually) be decrypted into usable
plaintext [4].
B.History and usage Caesar Cipher
The Caesar cipher is named after Julius Caesar, who,
according to Suetonius, used it with a shift of three to protect
messages of military significance. While Caesar's was the
first recorded use of this scheme, other substitution ciphers
are known to have been used earlier.
If he had anything confidential to say, he wrote it in
cipher, that is, by so changing the order of the letters of the
alphabet, that not a word could be made out. If anyone wishes
to decipher these, and get at their meaning, he must
substitute the fourth letter of the alphabet, namely D, for A,
and so with the others.
It is unknown how effective the Caesar cipher was at the
time, but it is likely to have been reasonably secure, not least
because most of Caesar's enemies would have been illiterate
and others would have assumed that the messages were
written in an unknown foreign language.[4] There is no
record at that time of any techniques for the solution of
simple substitution ciphers. The earliest surviving records
date to the 9th century works of Al-Kindi in the Arab world
with the discovery of frequency analysis. [5]
A Caesar cipher with a shift of one is used on the back of the
mezuzah to encrypt the names of God. This may be a
holdover from an earlier time when Jewish people were not
allowed to have mezuzot. The letters of the cryptogram
themselves comprise a religiously significant "divine name"
which Orthodox belief holds keeps the forces of evil in check
[6].
In the 19th century, the personal advertisements section in
newspapers would sometimes be used to exchange messages
encrypted using simple cipher schemes. Kahn (1967)
describes instances of lovers engaging in secret
communications enciphered using the Caesar cipher in The
Times. [7] Even as late as 1915, the Caesar cipher was in use:
the Russian army employed it as a replacement for more
complicated ciphers which had proved to be too difficult for
their troops to master; German and Austrian cryptanalysts
had little difficulty in decrypting their messages.[8]
Caesar ciphers can be found today in children's toys such as
secret decoder rings. A Caesar shift of thirteen is also
performed in the ROT13 algorithm, a simple method of
obfuscating text widely found on Usenet and used to obscure
text (such as joke punchlines and story spoilers), but not
seriously used as a method of encryption. [9]
A construction of 2 rotating disks with a Caesar cipher can be
used to encrypt or decrypt the code.
The Vigenère cipher uses a Caesar cipher with a different
shift at each position in the text; the value of the shift is
defined using a repeating keyword. If the keyword is as long
as the message, chosen random, never becomes known to
anyone else, and is never reused, this is the one-time pad
cipher, proven unbreakable. The conditions are so difficult
they are, in practical effect, never achieved. Keywords
shorter than the message (e.g., "Complete Victory" used by
the Confederacy during the American Civil War), introduce
a cyclic pattern that might be detected with a statistically
advanced version of frequency analysis. [10]
In April 2006, fugitive Mafia boss Bernardo Provenzano was
captured in Sicily partly because some of his messages,
written in a variation of the Caesar cipher, were broken.
Provenzano's cipher used numbers, so that "A" would be
written as "4", "B" as "5", and so on. [11]
In 2011, Rajib Karim was convicted in the United Kingdom
of "terrorism offences" after using the Caesar cipher to
communicate with Bangladeshi Islamic activists discussing
plots to blow up British Airways planes or
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-4, Issue-4,
3
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
disrupt their IT networks. Although the parties had access to
far better encryption techniques (Karim himself used PGP for
data storage on computer disks), they chose to use their own
scheme(implemented in Microsoft Excel), rejecting a more
sophisticated code program called Mujhaddin Secrets
"because 'kaffirs', or non-believers, know about it, so it must
be less secure". [12]
The animated series Gravity Falls uses the Caesar cipher as
one of three different ciphers (the other two being Atbash and
an A1Z26 cipher) during the end credits of the first six
episodes.
C.Mathematical Description of Caeser Cipher
To give a mathematical description of caeser cipher, First we
translate all of our characters to numbers, 'a'=0, 'b'=1, 'c'=2,
... , 'z'=25. We can now represent the caesar cipher
encryption function, e(x), where x is the character we are
encrypting, as:
Where k is the key (the shift) applied to each letter. After
applying this function the result is a number which must then
be translated back into a letter. The decryption function is:
III. DESIGN METHODOLOGY, IMPLEMENTATION AND TESTING
A.Design Methodology
This new system will use the same key for both sender and
receiver for encryption and decryption of data. The design
and flow of program will be based on the principle of
encrypting system architecture in figure I. The program
source code is displayed as shown appendix. This program
will help to achieve the goal of privacy in data
communication and telecommunication system.
Figure 1: Encrypting System Architecture
B.Testing and Implementation
The software application program was tested, and it was
observed that it performs the major objectives of the research.
The output is as in the figure below.
Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm:
A Java Implementation
4
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
Figure 2: Interface Shown Plaintext
Figure 3: Interface Shown Cypher text
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-4, Issue-4,
5
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication Pvt. Ltd.
III. CONCLUSION
In this era of global communication through the use of
computer network, telecommunication system and devices,
the need for security of information/data from sender cannot
be over emphasized. Hence there is need for a platform to
prevent unauthorized access to information been sent from
sender to receiver on data communication and
telecommunication system. One of the best methods to
prevent such ugly occurrence of intruder or hijacker to make
use of one data is through the use of Cryptosystem. We have
developed stand-alone application software that implements
cryptography using Caesar algorithms. This program can be
implemented with chatting software or E-mail software
where the data transmitted over a data communication
network.
IV. FURTHER RESEARCH
The system does have a high confidentiality rating in order
to defend against sniffing and man-in-the-middle attacks. It
was observed that the algorithm used was focus on
encrypting only alphabetic data. This means that it cannot
guarantee full security for interception of data within
financial world and mathematics environ. Consequence to
this we proposed a further research in which the Caesar
algorithm will be modified to accommodate all alphanumeric
data and formulae symbol implemented on a computer
network.
REFERENCES
[1] D.E. Comer (2004) Computer Networks and Internets. 4th Edition.
Chapter 40: Network Security Prentice Hall, 2004.
[2] Oludipe O., Yekini N.A., and Adelokun P.A (2011). Data
Communication and Computer Network. Hasfem Publication Nigeria.
[3] Alberto Leon-Garcial and Indra Widjaja. Communication Networks,
Fundmental Concepts and Key Architecture. Second Edition,
McGraw-Hill Publishing Company, New dehlhi 2004
[4] Singh, Simon (2000). The Code Book. Anchor. pp. 14–20. ISBN
0-385-49532-3.
[5] Kahn, David (1967). The Codebreakers. pp. 775–6. ISBN
978-0-684-83130-5).
[6] Leighton, Albert C. (April 1969). "Secret Communication among the
Greeks and Romans". Technology and Culture 10 (2): 139–154.
doi:10.2307/3101474. JSTOR 3101474.
[7] Leyden, John (2006-04-19). "Mafia boss undone by clumsy crypto". The
Register.
http://www.theregister.co.uk/2006/04/19/mafia_don_clueless_crypto/.
Retrieved 2008-06-13.
[8] Luciano, Dennis; Gordon Prichett (January 1987). "Cryptology: From
Caesar Ciphers to Public-Key Cryptosystems". The College Mathematics
Journal 18 (1): 2–17. doi:10.2307/2686311
[9] Pieprzyk, Josef; Thomas Hardjono; Jennifer Seberry (2003).
Fundamentals of Computer Security. Springer. p. 6. ISBN
3-540-43101-2.
[10] Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association
of America. pp. 9–11. ISBN 0-88385-504-6.
[11] Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association
of America. pp. 8–9. ISBN 0-88385-504-6.
[12] Sinkov, Abraham; Paul L. Irwin (1966). Elementary Cryptanalysis: A
Mathematical Approach. Mathematical Association of America. pp.
13–15. ISBN 0-88385-622-0.
[13] Savarese, Chris; Brian Hart (2002-07-15). "The Caesar Cipher".
Retrieved 2008-07-16.
AKINYELE Akinleye Okedola
Obtained B.Sc. Electronics & Computer
Engineering from Lagos State University
and M.Sc. in System Engineering from
University of Lagos. He is a Certified
Wireless Network Administrator
(CWNA), I.T Consultant, Engineer and
a Professional Teacher. He was a head of
Department of Computer Engineering,
Lagos State Polytechnic, and presently
the Head, Record and Statistics in the
Academic Planning Unit of Lagos State
Polytechnic.
Engr. Yekini Nureni Asafe obtained his
academic qualification as follows: M.Sc.
in Computer Science, University of Lagos
Nigeria (UNILAG); B.Sc. in Electronic
and Computer Engineering, Lagos State
University (LASU), and NCE (National
Certificate in Education) in Physics Lagos
State College of Education Ijanikin
(LACOED). He is a Member Nigeria
Computer Society (NCS), International
Association of Engineers (IAENG),
International Association of Computer
Science and Information Technology
(IACSIT), and Member Institute of
Electrical Electronic (MIEEE). He has
co-author, and singular author of several
academic/research publications that has
features in some revered international
journals and conference proceedings both
in Nigeria and in abroad. He has written
about seventeen textbooks in computer
science and engineering

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Cryptography with caesar Cipher
Cryptography with caesar CipherCryptography with caesar Cipher
Cryptography with caesar Cipher
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Cns 1
Cns 1Cns 1
Cns 1
 
Introduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and IIIIntroduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and III
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Tales From the Crypt(ography)
Tales From the Crypt(ography)Tales From the Crypt(ography)
Tales From the Crypt(ography)
 
Bakiya
BakiyaBakiya
Bakiya
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
Transposition Cipher
Transposition CipherTransposition Cipher
Transposition Cipher
 
Product Cipher
Product CipherProduct Cipher
Product Cipher
 
Cryptography by manisha jha
Cryptography by manisha jhaCryptography by manisha jha
Cryptography by manisha jha
 

Similar a Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm: A Java Implementation

Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdfHarrisentertainment
 
Encryption-Decryption Challenge: Caesar Cipher - About me!
Encryption-Decryption Challenge: Caesar Cipher - About me!Encryption-Decryption Challenge: Caesar Cipher - About me!
Encryption-Decryption Challenge: Caesar Cipher - About me!Penelope Markellou
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography worksvimalguptaofficial
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYAdityaShukla141
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docxrobert345678
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)Somaditya Basak
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Journals
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using differenteSAT Publishing House
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxdesalewminale
 

Similar a Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm: A Java Implementation (20)

Computer Security Chapter III.pdf
Computer Security Chapter III.pdfComputer Security Chapter III.pdf
Computer Security Chapter III.pdf
 
cryptography
cryptographycryptography
cryptography
 
Encryption-Decryption Challenge: Caesar Cipher - About me!
Encryption-Decryption Challenge: Caesar Cipher - About me!Encryption-Decryption Challenge: Caesar Cipher - About me!
Encryption-Decryption Challenge: Caesar Cipher - About me!
 
CaesarCipherWorksheet.pdf
CaesarCipherWorksheet.pdfCaesarCipherWorksheet.pdf
CaesarCipherWorksheet.pdf
 
cryptography presentation this about how cryptography works
cryptography presentation this about how  cryptography workscryptography presentation this about how  cryptography works
cryptography presentation this about how cryptography works
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
Crypto
CryptoCrypto
Crypto
 
History of Cryptography
History of CryptographyHistory of Cryptography
History of Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryp Essay
Cryp EssayCryp Essay
Cryp Essay
 
SubstitutionAndCaesar
SubstitutionAndCaesarSubstitutionAndCaesar
SubstitutionAndCaesar
 
Cryptography 387 © David Lippman Creative Commons BY-.docx
  Cryptography   387 © David Lippman  Creative Commons BY-.docx  Cryptography   387 © David Lippman  Creative Commons BY-.docx
Cryptography 387 © David Lippman Creative Commons BY-.docx
 
Unit 1 QB.docx
Unit 1 QB.docxUnit 1 QB.docx
Unit 1 QB.docx
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
Cryptography
CryptographyCryptography
Cryptography
 
Enhancing security of caesar cipher using different
Enhancing security of caesar cipher using differentEnhancing security of caesar cipher using different
Enhancing security of caesar cipher using different
 
security system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptxsecurity system by desu star chapter 2 (1).pptx
security system by desu star chapter 2 (1).pptx
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
Cryptography
CryptographyCryptography
Cryptography
 

Más de Yekini Nureni

INFORMATION COMMUNICATION TECHNOLOGY I
INFORMATION COMMUNICATION TECHNOLOGY IINFORMATION COMMUNICATION TECHNOLOGY I
INFORMATION COMMUNICATION TECHNOLOGY IYekini Nureni
 
INFORMATION COMMUNICATION TECHNOLOGY II
INFORMATION COMMUNICATION TECHNOLOGY IIINFORMATION COMMUNICATION TECHNOLOGY II
INFORMATION COMMUNICATION TECHNOLOGY IIYekini Nureni
 
Management information system mordern perspective
Management information system mordern perspectiveManagement information system mordern perspective
Management information system mordern perspectiveYekini Nureni
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
Conceptual framework of web based expert system based expert
Conceptual framework of web  based expert system based expertConceptual framework of web  based expert system based expert
Conceptual framework of web based expert system based expertYekini Nureni
 
Conceptual framework of web based expert system for troubleshooting milleniu...
Conceptual framework of web  based expert system for troubleshooting milleniu...Conceptual framework of web  based expert system for troubleshooting milleniu...
Conceptual framework of web based expert system for troubleshooting milleniu...Yekini Nureni
 
Empirical analysis of people awareness, attitudes and implications of cashles...
Empirical analysis of people awareness, attitudes and implications of cashles...Empirical analysis of people awareness, attitudes and implications of cashles...
Empirical analysis of people awareness, attitudes and implications of cashles...Yekini Nureni
 
Virtual lecturer web based application system to discharge teachers roles in ...
Virtual lecturer web based application system to discharge teachers roles in ...Virtual lecturer web based application system to discharge teachers roles in ...
Virtual lecturer web based application system to discharge teachers roles in ...Yekini Nureni
 
Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...
Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...
Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...Yekini Nureni
 

Más de Yekini Nureni (9)

INFORMATION COMMUNICATION TECHNOLOGY I
INFORMATION COMMUNICATION TECHNOLOGY IINFORMATION COMMUNICATION TECHNOLOGY I
INFORMATION COMMUNICATION TECHNOLOGY I
 
INFORMATION COMMUNICATION TECHNOLOGY II
INFORMATION COMMUNICATION TECHNOLOGY IIINFORMATION COMMUNICATION TECHNOLOGY II
INFORMATION COMMUNICATION TECHNOLOGY II
 
Management information system mordern perspective
Management information system mordern perspectiveManagement information system mordern perspective
Management information system mordern perspective
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
Conceptual framework of web based expert system based expert
Conceptual framework of web  based expert system based expertConceptual framework of web  based expert system based expert
Conceptual framework of web based expert system based expert
 
Conceptual framework of web based expert system for troubleshooting milleniu...
Conceptual framework of web  based expert system for troubleshooting milleniu...Conceptual framework of web  based expert system for troubleshooting milleniu...
Conceptual framework of web based expert system for troubleshooting milleniu...
 
Empirical analysis of people awareness, attitudes and implications of cashles...
Empirical analysis of people awareness, attitudes and implications of cashles...Empirical analysis of people awareness, attitudes and implications of cashles...
Empirical analysis of people awareness, attitudes and implications of cashles...
 
Virtual lecturer web based application system to discharge teachers roles in ...
Virtual lecturer web based application system to discharge teachers roles in ...Virtual lecturer web based application system to discharge teachers roles in ...
Virtual lecturer web based application system to discharge teachers roles in ...
 
Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...
Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...
Enhancing knowledge sharing in mechatronics system diagnostic and repair (a c...
 

Último

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Último (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm: A Java Implementation

  • 1. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-4, Issue-4, 1 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— In this era of global communication where online communication through the use of computer network and telecommunication system has dominated the means of communication between people. The goal of privacy is very paramount. The numbers of people being connected to the communication system through their mobile phone, computer or any other e-communication tools are increasing day-by-day. Hence there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in data communication environment. One essential aspect for secure communications is that of cryptography, which the focus of this research is. We have developed stand-alone application software that implements cryptography using Caesar algorithms. This program can be implemented with chatting software or E-mail software to encrypt data. The algorithm was coded with Java programming language. Index Terms— Caesar Cipher, Cryptography, Java programming language, Computer network I. INTRODUCTION The goal of privacy is achieved if a message is only received by the intended recipients. This goal is normally accomplished using encryption algorithms. Encryption algorithms convert the original message, called the plaintext, into an encrypted form called the ciphertext that must be decrypted back into the plaintext by the recipient in order for it to be meaningful. Most ciphers use a piece of information called a key for encryption and decryption, and ciphers that use the same key for both processes (sender and recipient) are called symmetric keyciphers, as opposed to asymmetric key ciphers, in which the keys are different on both sides of the message transmission channel [1]. Cryptographyis the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications [2]. In cryptography, a Caesar cipher is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a shift of 3, A would be replaced by D, B would become E, and so on. The method is named after Julius Caesar, who used it in his private correspondence [3]. The focus of this paper is to design and implement a caser cipher application system that can protect data from theft or alteration, and also be used for user authentication when communicating over any untrusted medium, which includes just about any network, particularly the Internet. In Caesar Cipher the transformation can be represented by aligning two alphabets; the cipher alphabet is the plain alphabet rotated left or right by some number of positions. For instance, here is a Caesar cipher using a left rotation of three places (the shift parameter, here 3, is used as the key): Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: DEFGHIJKLMNOPQRSTUVWXYZABC. When encrypting, a person looks up each letter of the message in the "plain" line and writes down the corresponding letter in the "cipher" line. Deciphering is done in reverse [4]. The diagram below illustrates a typical Caesar Cipher. The Caesar Cipher is an encoding method that works like this; this example is for a shift amount of 13, which is a ROT-13. if (character is in alphabet) { if(character is in bottom half of alphabet [A-M|a-m] ) character = character + 13; else /* character is in top half [N-Z|n-z] */ character = character – 13; } print(character); In a Caesar cipher, each letter is replaced by a letter further along in the alphabet. You can think of it as shifting the alphabet to the left. The key of a Caesar cipher is the number of places the alphabet is shifted. Here is a Caesar cipher with key 3: A.Objectives of This Research Work The objectives of this research work are to:  To achieve the goal of privacy in data communication and telecommunication system i.e. a message is only received and decoded by the intended recipients.  To provide confidentiality, authenticity, integrity, and non-repudiation of the information transmitted through the online Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm: AJava Implementation Akinyele A. Okedola, Yekini N. Asafe
  • 2. Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm: A Java Implementation 2 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. communication network.  To develop a cryptographic algorithm that is an improvement on the existing system B.Scope of Study This research work focuses on design and implementation of cryptosystems for preventing third parties from assessing data/information (message) between sender and receiver on online communication using caesar algorithm with java programming language. II.LITERATURE REVIEW A.Cryptograph Concept and Data Communication In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet. Within the context of any application-to-application communication, there are some specific security requirements, including:  Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.)  Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver.  Integrity: Assuring the receiver that the received message has not been altered in any way from the original.  Non-repudiation: A mechanism to prove that the sender really sent this message. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, each of which is described below. In all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into Cipher text, which will in turn (usually) be decrypted into usable plaintext [4]. B.History and usage Caesar Cipher The Caesar cipher is named after Julius Caesar, who, according to Suetonius, used it with a shift of three to protect messages of military significance. While Caesar's was the first recorded use of this scheme, other substitution ciphers are known to have been used earlier. If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others. It is unknown how effective the Caesar cipher was at the time, but it is likely to have been reasonably secure, not least because most of Caesar's enemies would have been illiterate and others would have assumed that the messages were written in an unknown foreign language.[4] There is no record at that time of any techniques for the solution of simple substitution ciphers. The earliest surviving records date to the 9th century works of Al-Kindi in the Arab world with the discovery of frequency analysis. [5] A Caesar cipher with a shift of one is used on the back of the mezuzah to encrypt the names of God. This may be a holdover from an earlier time when Jewish people were not allowed to have mezuzot. The letters of the cryptogram themselves comprise a religiously significant "divine name" which Orthodox belief holds keeps the forces of evil in check [6]. In the 19th century, the personal advertisements section in newspapers would sometimes be used to exchange messages encrypted using simple cipher schemes. Kahn (1967) describes instances of lovers engaging in secret communications enciphered using the Caesar cipher in The Times. [7] Even as late as 1915, the Caesar cipher was in use: the Russian army employed it as a replacement for more complicated ciphers which had proved to be too difficult for their troops to master; German and Austrian cryptanalysts had little difficulty in decrypting their messages.[8] Caesar ciphers can be found today in children's toys such as secret decoder rings. A Caesar shift of thirteen is also performed in the ROT13 algorithm, a simple method of obfuscating text widely found on Usenet and used to obscure text (such as joke punchlines and story spoilers), but not seriously used as a method of encryption. [9] A construction of 2 rotating disks with a Caesar cipher can be used to encrypt or decrypt the code. The Vigenère cipher uses a Caesar cipher with a different shift at each position in the text; the value of the shift is defined using a repeating keyword. If the keyword is as long as the message, chosen random, never becomes known to anyone else, and is never reused, this is the one-time pad cipher, proven unbreakable. The conditions are so difficult they are, in practical effect, never achieved. Keywords shorter than the message (e.g., "Complete Victory" used by the Confederacy during the American Civil War), introduce a cyclic pattern that might be detected with a statistically advanced version of frequency analysis. [10] In April 2006, fugitive Mafia boss Bernardo Provenzano was captured in Sicily partly because some of his messages, written in a variation of the Caesar cipher, were broken. Provenzano's cipher used numbers, so that "A" would be written as "4", "B" as "5", and so on. [11] In 2011, Rajib Karim was convicted in the United Kingdom of "terrorism offences" after using the Caesar cipher to communicate with Bangladeshi Islamic activists discussing plots to blow up British Airways planes or
  • 3. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-4, Issue-4, 3 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. disrupt their IT networks. Although the parties had access to far better encryption techniques (Karim himself used PGP for data storage on computer disks), they chose to use their own scheme(implemented in Microsoft Excel), rejecting a more sophisticated code program called Mujhaddin Secrets "because 'kaffirs', or non-believers, know about it, so it must be less secure". [12] The animated series Gravity Falls uses the Caesar cipher as one of three different ciphers (the other two being Atbash and an A1Z26 cipher) during the end credits of the first six episodes. C.Mathematical Description of Caeser Cipher To give a mathematical description of caeser cipher, First we translate all of our characters to numbers, 'a'=0, 'b'=1, 'c'=2, ... , 'z'=25. We can now represent the caesar cipher encryption function, e(x), where x is the character we are encrypting, as: Where k is the key (the shift) applied to each letter. After applying this function the result is a number which must then be translated back into a letter. The decryption function is: III. DESIGN METHODOLOGY, IMPLEMENTATION AND TESTING A.Design Methodology This new system will use the same key for both sender and receiver for encryption and decryption of data. The design and flow of program will be based on the principle of encrypting system architecture in figure I. The program source code is displayed as shown appendix. This program will help to achieve the goal of privacy in data communication and telecommunication system. Figure 1: Encrypting System Architecture B.Testing and Implementation The software application program was tested, and it was observed that it performs the major objectives of the research. The output is as in the figure below.
  • 4. Data Security on Computer Network and Telecommunication System Using Caesar Cipher Cryptography Algorithm: A Java Implementation 4 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Figure 2: Interface Shown Plaintext Figure 3: Interface Shown Cypher text
  • 5. International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-4, Issue-4, 5 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. III. CONCLUSION In this era of global communication through the use of computer network, telecommunication system and devices, the need for security of information/data from sender cannot be over emphasized. Hence there is need for a platform to prevent unauthorized access to information been sent from sender to receiver on data communication and telecommunication system. One of the best methods to prevent such ugly occurrence of intruder or hijacker to make use of one data is through the use of Cryptosystem. We have developed stand-alone application software that implements cryptography using Caesar algorithms. This program can be implemented with chatting software or E-mail software where the data transmitted over a data communication network. IV. FURTHER RESEARCH The system does have a high confidentiality rating in order to defend against sniffing and man-in-the-middle attacks. It was observed that the algorithm used was focus on encrypting only alphabetic data. This means that it cannot guarantee full security for interception of data within financial world and mathematics environ. Consequence to this we proposed a further research in which the Caesar algorithm will be modified to accommodate all alphanumeric data and formulae symbol implemented on a computer network. REFERENCES [1] D.E. Comer (2004) Computer Networks and Internets. 4th Edition. Chapter 40: Network Security Prentice Hall, 2004. [2] Oludipe O., Yekini N.A., and Adelokun P.A (2011). Data Communication and Computer Network. Hasfem Publication Nigeria. [3] Alberto Leon-Garcial and Indra Widjaja. Communication Networks, Fundmental Concepts and Key Architecture. Second Edition, McGraw-Hill Publishing Company, New dehlhi 2004 [4] Singh, Simon (2000). The Code Book. Anchor. pp. 14–20. ISBN 0-385-49532-3. [5] Kahn, David (1967). The Codebreakers. pp. 775–6. ISBN 978-0-684-83130-5). [6] Leighton, Albert C. (April 1969). "Secret Communication among the Greeks and Romans". Technology and Culture 10 (2): 139–154. doi:10.2307/3101474. JSTOR 3101474. [7] Leyden, John (2006-04-19). "Mafia boss undone by clumsy crypto". The Register. http://www.theregister.co.uk/2006/04/19/mafia_don_clueless_crypto/. Retrieved 2008-06-13. [8] Luciano, Dennis; Gordon Prichett (January 1987). "Cryptology: From Caesar Ciphers to Public-Key Cryptosystems". The College Mathematics Journal 18 (1): 2–17. doi:10.2307/2686311 [9] Pieprzyk, Josef; Thomas Hardjono; Jennifer Seberry (2003). Fundamentals of Computer Security. Springer. p. 6. ISBN 3-540-43101-2. [10] Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association of America. pp. 9–11. ISBN 0-88385-504-6. [11] Beutelspacher, Albrecht (1994). Cryptology. Mathematical Association of America. pp. 8–9. ISBN 0-88385-504-6. [12] Sinkov, Abraham; Paul L. Irwin (1966). Elementary Cryptanalysis: A Mathematical Approach. Mathematical Association of America. pp. 13–15. ISBN 0-88385-622-0. [13] Savarese, Chris; Brian Hart (2002-07-15). "The Caesar Cipher". Retrieved 2008-07-16. AKINYELE Akinleye Okedola Obtained B.Sc. Electronics & Computer Engineering from Lagos State University and M.Sc. in System Engineering from University of Lagos. He is a Certified Wireless Network Administrator (CWNA), I.T Consultant, Engineer and a Professional Teacher. He was a head of Department of Computer Engineering, Lagos State Polytechnic, and presently the Head, Record and Statistics in the Academic Planning Unit of Lagos State Polytechnic. Engr. Yekini Nureni Asafe obtained his academic qualification as follows: M.Sc. in Computer Science, University of Lagos Nigeria (UNILAG); B.Sc. in Electronic and Computer Engineering, Lagos State University (LASU), and NCE (National Certificate in Education) in Physics Lagos State College of Education Ijanikin (LACOED). He is a Member Nigeria Computer Society (NCS), International Association of Engineers (IAENG), International Association of Computer Science and Information Technology (IACSIT), and Member Institute of Electrical Electronic (MIEEE). He has co-author, and singular author of several academic/research publications that has features in some revered international journals and conference proceedings both in Nigeria and in abroad. He has written about seventeen textbooks in computer science and engineering