Revisiting Shift Cipher Technique for Amplified Data Security


  • Raksha Verma Department of Mathematics, University of Delhi, India
  • Anjali Kumari Department of Mathematics, University of Delhi, India
  • Adarsh Anand Department of Operational Research, University of Delhi, India
  • V. S. S. Yadavalli Department of Industrial and Systems Engineering, University of Pretoria, Republic of South Africa



decryption, private key encryption, public key encryption, number theory


Ever since manual work is overtaken by technology and the rapid advancement in the technologies for performing all kinds of work online has created new possibilities for the organizations and institutions of all types. But this has also created opportunities for attackers and opponents by reducing the powers of existing controls over data sharing. All private, public and any other sectors are using the internet for sharing their data. Transmission of unencrypted data over the internet is not secure as it poses many privacy concerns as they can be easily hacked and misused by any unintended person. So, everyone is concerned about safe and secure ways of data transmission in order to avoid leak of private data, as hackers always try to chase the transmitted data and  to recover it and therefore various different techniques are developed in order to make data transmission more secure. Encryption is essential to protect and prevent  such lapses in the transmission of sensitive information over the internet and any other networks. In this paper, the author has worked on a better version of Caesar cipher and invented a method in which modular arithmetic is used to convert plaintext into ciphertext in order to amplify and  to bolster up the security of the sensitive data or information, the author composed the decryption  method  in such a way that it is no way related to encryption by involving the divisibility tests and arithmetic modulo.


Received: 29 May 2022 | Revised: 18 July 2022 | Accepted: 16 August 2022


Conflicts of Interest

The authors declare that they have no conflicts of interest to this work.


Data Availability Statement

Data sharing is not applicable to this article as no new data were created or analyzed in this study.


Metrics Loading ...




How to Cite

Verma, R., Kumari, A., Anand , A., & Yadavalli, V. S. S. (2022). Revisiting Shift Cipher Technique for Amplified Data Security. Journal of Computational and Cognitive Engineering, 3(1), 8–14.



Research Articles