An Efficient Implementation for the Cryptanalysis of Caesar’s Cipher

  • Gaylord O Asoronye Akanu Ibiam Federal Polytechnic, Unwana, Ebonyi state, Nigeria
  • Goodluck I Emereonye Akanu Ibiam Federal Polytechnic, Unwana, Ebonyi state, Nigeria
  • 3Christian O Onyibe Akanu Ibiam Federal Polytechnic, Unwana, Ebonyi state, Nigeria
  • Ibiam A Agha Federal Polytechnic Oko, Anambra State, Nigeria
Keywords: cryptography, encryption, decryption, cipher

Abstract

One of the oldest algorithms for symmetric key cryptography is the Caesar’s cipher. Cryptography or message coding techniques are fundamental data security tools. In order to secure data to be transmitted from source to a particular destination there is need for encrypting the data at source and the decrypting of the encrypted data only made possible at the designated destination. The process of decrypting data known as cryptanalysis proves to be a herculean task if the symmetric key (Caesar’s shift) is not known by the cryptanalyst. In this work, a cryptanalysis of the encryption algorithm using the encryption formula CipherText = PlainText + (Key mod 26) that generates the cipher text and the decryption algorithm using the decrypting formula PlainText = CipherText – (Key mod 26) that returns
the cipher text to the original plaintext for the Caesar’s cipher was implemented using file operations in the C programming language. At the instance of inputting a key, it is subjected to modular arithmetic operation with 26 to get a value less or equal to 26, hence transforming the plaintext to a cipher text written into the encrypt.txt file while the decrypted cipher text is written into the decrypt.txt file.

Author Biographies

Gaylord O Asoronye, Akanu Ibiam Federal Polytechnic, Unwana, Ebonyi state, Nigeria

Electronic Library Unit

Goodluck I Emereonye, Akanu Ibiam Federal Polytechnic, Unwana, Ebonyi state, Nigeria

Computer Science Department

3Christian O Onyibe, Akanu Ibiam Federal Polytechnic, Unwana, Ebonyi state, Nigeria

Computer Engineering Department

Ibiam A Agha, Federal Polytechnic Oko, Anambra State, Nigeria

Computer Science Department

Published
2019-12-31
How to Cite
Asoronye, G., Emereonye, G., Onyibe3., & Agha, I. (2019). An Efficient Implementation for the Cryptanalysis of Caesar’s Cipher. The Melting Pot, 5(2). Retrieved from https://journals.aphriapub.com/index.php/TMP/article/view/1046
Section
Articles