Review 1
Review 1
Review 1
Faculty of Computing, Bahir Dar Institute of Technology, Bahir Dar University, Bahir Dar,
Ethiopia, Email:bizuayehutadege4@gmail.com
ABSTRACT
Cryptography is one mechanism used to secure our information flowing in unsecure channels
around the world. In this science there are several algorithms used to secure our information like
Caesar, AES, and DES etc. by using those algorithms we can secure the information from illegal
parties. In this paper the researchers tried to enhance the security of Caesar cipher by adding some
additional operation on the key to secure the shared key for communicating parties. The major
problem of Caesar cipher is easily cracked and to enhance those treat adding some feature is the
goal of researcher in this paper. For this paper, they conduct an experiment on three of the
algorithms that are proposed (enhanced Caesar cipher), AES and DES using three different file,
the file size of each of the file is different and the experiment bounded within time for encryption
and decryption. Finally, as the number of file size increase the encryption and decryption time also
increase. As a result, the enhanced Caesar cipher performs an encryption and decryption for those
different files in short time.
3. METHODOLOGY
A. Tools and techniques
In this paper researchers take different algorithm to identify the security level and processing time
for encryption and decryption for different algorithms. The selected algorithms for this paper are
propose (enhanced Caesar cipher), AES and DES. By taking those three algorithms they conduct
an experiment for encryption and decryption with the threshold of time and file size for each
algorithm.
B. Dataset preparation
For this experiment the researcher takes three text file with each of the file have 5, 10, 20 kb file
size respectively and perform an encryption and encryption on each of the file using enhanced
Caesar cipher, DES and AES to identify the secure algorithm for data communication between
parties and the experiments are bounded in time for encryption and decryption of text file using
different file size.
Fig1: Flow chart of the given algorithm
4. CRITIQUES
A. Weakness
The major weakness of this paper is, it does not have enough dataset for experimentation and the
workflow of each of the algorithm is not visible in this paper. The paper does not show the clear
way of expression for which algorithm the key generation is performed, is for DES,AES, or Caesar
cipher and in addition to that the experimentation threshold variable is limited not consider other
variables like storage.
In short, the paper presents the theoretical part of each of the algorithms without proper
consideration of each of the algorithm tasks like how they works but they perform experimentation
on each of the algorithm. The paper does not present how the experimental result comes from each
of the algorithm.
B. Strong side
The paper presents, in taking about encryption and decryption for particular data the time of
execution and as file size of the plaintext increases the time taken for encryption and it also
enhanced decryption for each of the algorithm. I clearly explained the result of the experiment in
conclusion part and the paper show within example in each step how the normal Caesar cipher
works and also how the enhanced Caesar cipher works. The paper also conduct an experimentation
on different algorithms to identify the weakness or better performance of the proposed algorithm
for a unique file in different file size in time bound.
5. REFERENCES
Alanazi, H. O., Zaidan, B. B., Zaidan, A. A., Jalab, H. A., Shabbir, M., & Al-Nabhani, Y.
(2010). New Comparative Study Between DES, 3DES and AES within Nine Factors. 2(3),
152–157. http://arxiv.org/abs/1003.4085
Patil, P., Narayankar, P., Narayan, D. G., & Meena, S. M. (2016). A Comprehensive Evaluation
of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer
Science, 78(December 2015), 617–624. https://doi.org/10.1016/j.procs.2016.02.108