Caesar Chiper Algorithm In Message Security

  • Wasis Universitas Pamulang

Abstract

The Caesar Cipher algorithm is one of the classical cryptography methods used to secure messages with letter substitution techniques based on certain shifts in the alphabet. This study aims to analyze and implement this algorithm in message security in order to understand its effectiveness and limitations in the world of information security. The methods used include encryption and decryption processes with character shifts according to the specified key. Implementation is carried out using the Python programming language as a case study. The results of the study show that Caesar Cipher is effective in providing basic security for messages, but has significant weaknesses against brute force attacks because it only has 25 possible keys. Therefore, this algorithm is more suitable for use as a basis for learning in the field of cryptography or combined with other security methods to increase its level of security.

Downloads

Download data is not yet available.

References

P. Khokhar, A. Bajaj, A. Abraham, and P. K. Chakravarthy K, “A Novel Security Enhancement of Caesar Cipher Encryption Technique,” Lect. Notes Networks Syst., 2025, doi: 10.1007/978-3-031-78928-1_30.

M. Tahboush, A. Hamdan, M. Klaib, M. Adawy, and F. Alzobi, “Detection Optimization of Brute-Force Cyberattack Using Modified Caesar Cipher Algorithm Based on Binary Codes ( MCBC ),” vol. 16, no. 3, pp. 523–530, 2025.

Y. Inan, “Decoding Secret Message with Frequency Analysis,” Adv. Intell. Syst. Comput., 2021, doi: 10.1007/978-3-030-64058-3_59.

B. Purnama and A. H. H. Rohayani, “A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext from a Message to Be Encrypted,” Procedia Comput. Sci., 2015, doi: 10.1016/j.procs.2015.07.552.

L. Voleti, B. R.M., S. K. Vallepu, K. Bayoju, and D. Srinivas, “A Secure Image Steganography Using Improved Lsb Technique and Vigenere Cipher Algorithm,” Proc. - Int. Conf. Artif. Intell. Smart Syst. ICAIS 2021, 2021, doi: 10.1109/ICAIS50930.2021.9395794.

U. K. B. R. S. C. M. K. E. G. R. eddy Salla and A. Authors, “Cryptographic Pixel Manipulation for Visual Security,” 2024 IEEE 16th Int. Conf. Comput. Intell. Commun. Networks, 2024, doi: 10.1109/CICN63059.2024.10847492.

S. Thangavelu, V. Sonai, P. Malaisamy, S. M. Nallakannu, and R. Kumar, “A novel permutation based encryption using tree traversal approach,” Recent Adv. Comput. Sci. Commun., 2020, doi: 10.2174/2666255813666191204145836.

U. K. Banala, R. S. Chidipothu, M. K. Enduri, and G. R. E. Salla, “Cryptographic Pixel Manipulation for Visual Security,” Proc. - 2024 IEEE 16th Int. Conf. Commun. Syst. Netw. Technol. CICN, 2024, doi: 10.1109/CICN63059.2024.10847492.

S. N. Gowda, “Innovative enhancement of the Caesar cipher algorithm for cryptography,” Proc. - 2016 Int. Conf. Adv. Comput. Commun. Autom. (Fall), ICACCA, 2016, doi: 10.1109/ICACCAF.2016.7749010.

A. Gurung, S. Gupta, and S. Varshney, “Advanced Caesar Cipher Encryption Algorithm Using Random Key Generation,” 2024 IEEE 9th Int. Conf. Converg. Technol., 2024, doi: 10.1109/I2CT61223.2024.10543755.

A. Serdano, M. Zarlis, and E. B. Nababan, “Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security,” AIMS 2021 - Int. Conf. Artif. Intell. Mechatronics Syst., 2021, doi: 10.1109/AIMS52415.2021.9466039.

Published
2026-02-02
How to Cite
[1]
Wasis, “Caesar Chiper Algorithm In Message Security”, JI, vol. 11, no. 1, pp. 66-70, Feb. 2026.