Open Access Open Access  Restricted Access Subscription Access

A Case Study on the Implementation of Caesar, Vigene`re, and RSA Ciphers

Anukriti Sharma, Gajanan M Naik

Abstract


This paper presents a comparative analysis of three historically significant cryptographic ciphers: the Caesar cipher, the Vigene`re cipher, and the RSA cipher. Through a case study approach, we implemented each of these ciphers to evaluate their underlying mechanisms, security vulnerabilities, and practical applications. The Caesar cipher, a simple substitution cipher, serves as a foundational example of symmetric encryption. The Vigene`re cipher, a polyalphabetic substitution cipher, demon- strates an evolution in complexity and security over the Caesar cipher. Finally, the RSA cipher provides an example of modern asymmetric cryptography, highlighting the principles of public- key encryption. This study aims to provide a clear understanding of the progression of cryptographic techniques, from classical methods to modern standards, by examining their implementa- tion details and cryptographically analytic resilience.

 


Full Text:

PDF

References


R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.

W. Stallings, Cryptography and Network Security: Principles and Prac- tice, 7th ed. Pearson, 2017.

J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2nd ed. CRC Press, 2L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communi- cations of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.

S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books, 1999.

W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, Nov. 1976.

B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed. New York: John Wiley & Sons, 1996.

A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1996.

T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 3rd ed. Cambridge, MA: MIT Press, 2009.

D. Kahn, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. New York: Scribner, 1996.

C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, Oct. 1949.


Refbacks

  • There are currently no refbacks.