New Generation of Digital Academic-Transcripts using encrypted QR Code TM

Size: px
Start display at page:

Download "New Generation of Digital Academic-Transcripts using encrypted QR Code TM"

Transcription

1 313 New Generation of Digital Academic-Transcripts using encrypted QR Code TM Use of encrypted QR Code TM in Mark-sheets (Academic Transcripts) Somdip Dey Department of Computer Science, St. Xavier s College [Autonomous], Kolkata, India. Mobile: somdipdey@ieee.org; somdipdey@acm.org Abstract Today, because of ever growing digital data, it is very important to optimize these data and preserve them in an eco-friendly manner. In this paper, the author presents a new method to digitize the academic transcript i.e. mark-sheets, and embed the digital format in the mark-sheet itself in the form of encrypted QR Code TM, so that the digital data can not be retrieved by any unauthorized user. In this way, we can save a lot of digital space, which was necessary to save those digital academic records of each student. In our new marksheet system, the digital data, which is embedded in the marksheet in form of encrypted QR code, can only be retrieved and decrypted using our own web-application, which is hosted in our website. Our new mark-sheet system introduces a new generation of digital academic transcripts, which is already under implementation in our St. Xavier s College [Autonomous], Kolkata, India, and till now the implementation results and success of the system have been remarkable. Keywords-result; mark-sheet; QR code; encryption; green computing; I. INTRODUCTION In the modern world, with the evolution of technology and un-ending growth in digital data, there is an essential need of optimization of online data and information present in the digital world. For example, every year millions of student graduate from different universities and colleges from different places in the world. It is not always possible to keep records and marks of all students in paper documents because it will consume a lot of papers, which in fact will harm the plant ecosystem and environment eventually, and for that reason digitization of those records are essential. But, digitization of data is costly too because as the digital data grow in size there is need of lager space and for that reason we need to add new servers and more space to hold those data and information. Keeping this problem in mind, the research group at St. Xavier s College [Autonomous], Kolkata, India, has introduced a new digital mark-sheet system. In our new mark-sheet system, we will be embedding the data digitally in form of QR Code [9][11], which is itself encrypted, so that the marks obtained by the student can not be tampered, and the data embedded in the mark-sheet can be only decrypted and read from our web-application deployed by St. Xavier s College s website. In this way, we do not have to increase our digital space or add new servers to our already existing system just because to save more marks record of students. QR Code TM [9][11][12] is a type of 2 dimensional matrix barcode, which gained popularity because of its large capacity to hold digital data and it can be integrated in any mobile devices. In our new mark-sheet system, we save the essential data of each student in the QR Code, like the student s name, roll number, registration number, semester and year of study, marks obtained in different subjects and grades secured. But, all the data saved and embedded in the QR Code, are encrypted, and then the QR Codes are printed in the mark-sheet of the student. So, in future if the student or any other person wants to see their marks digitally or wants to send their academic information to any University or Organization in digital format, then they can just scan the QR Code, decrypt the data and send the data. II. METHODS USED We use TTJSA encryption technique, which was designed by Nath et al. [1][2][3][4][5] and is an amalgamation of three different cryptographic modules: generalized modified Vernam cipher, MSA [2] and NJJSA [3], for the encryption purpose of data in the QR Code. After encrypting the data, we embed the data in the QR Code using a set of different protocol and ultimately generate the encrypted QR Code. We discuss the procedure in the following sections. A. TTJSA for Encryption Purpose of the Embedded Data TTJSA [1][4][5] is a combined symmetric key cryptographic method, which is formed of generalized modified Vernam cipher, MSA [2] and NJJSA [3] symmetric key cryptographic methods. The algorithm of the execution of TTJSA is as follows: 1) Algorithm of Generalized Modified Vernam Cipher with Feed-Back Mechanism: In this method, we have modified the normal Vernam Cipher [7][8] and made a more generalized version of it. In normal Vernam Cipher we apply XOR operation on the plain text with the key to get our final cipher text and use the vice-versa to get the decrypted out-put /13/$ IEEE

2 314 Formula for Vernam Cipher: Plaintext Key = Ciphertext (Encryption Process) Ciphertext Key = Plaintext (Decryption Process) But, in our method, instead of XOR operation we perform addition operation, i.e. we add the ASCII value of one byte of the plain text with the ASCII value of the corresponding byte of the key, and as an out-put or cipher text byte we generate the added value of plain text and key. But, if the value of the addition is greater than 255 then we send the remainder excessive value to the next byte of the plaintext and add it with it, i.e. if plain text + Key > 255, then {(plaintext + Key) 255} + next plaintext + Key. We call this method as feedback mechanism. Formula for our modified Vernam Cipher method: Plaintext + Key = Cipher Text, for Plaintext + Key < 256; Or else, {(plaintext + Key) 255} + next plaintext + Key = Cipher text But, we apply the aforementioned formula as block ciphers. First, we split the total plaintext file into blocks of bytes, where each block is less than or equal to 255. Then, we perform the aforementioned steps and in the last byte of each block, we send the residue value to the next block. This is the feedback mechanism, which is the unique feature of the whole method. Because of this property of the method, even if a single byte of data is changed in the original file, the output cipher text will be totally different. The method and execution of each step can be further known from the research-paper on TTJSA method [1]. 2) NJJSAA Algorithm: The encryption number (=secure) and randomization number (=times) is calculated according to the method mentioned in MSA algorithm [2]. Step 1: Read 32 bytes at a time from the input file. Step 2: Convert 32 bytes into 256 bits and store in some 1- dimensional array. Step 3: Choose the first bit from the bit stream and also the corresponding number(n) from the key matrix. Interchange the 1st bit and the n-th bit of the bit stream. Step 4: Repeat step-3 for 2nd bit, 3rd bit th bit of the bit stream Step 5: Perform right shift by one bit. Step 6: Perform bit(1) XOR bit(2), bit(3) XOR bit(4),...,bit(255) XOR bit(256) Step 7: Repeat Step 5 with 2 bit right, 3 bit right,...,n bit right shift followed by Step 6 after each completion of right bit shift. 3) MSA Encryption and Decryption Algorithm: Nath et al. [2] proposed a symmetric key method where they have used a random key generator for generating the initial key and that key is used for encrypting the given source file. MSA method is an upgraded module of Playfair cipher system [7]. MSA [2] method is basically a substitution method where we take 2 characters from any input file and then search the corresponding characters from the random key matrix and store the encrypted data in another file. MSA method provides us multiple encryptions and multiple decryptions. The key matrix (16x16) is formed from all characters (ASCII code 0 to 255) in a random order. The randomization of key matrix is done using the following function calls: Step-1: call Function cycling() Step-2: call Function upshift() Step-3: call Function downshift() Step-4: call Function leftshift() Step-5: call Function rightshift() How the above functions will work, have been discussed in detail by Nath et al[2]. The idea of these functions is to make elements in a square matrix in a random order so that no one can predict what will be the nearest neighbour of a particular element in that matrix. This method is basically modified Playfair method. In Playfair method one can only encrypt Alphabets but in MSA one can encrypt any character whose ASCII code from and one can apply multiple encryption here which is not possible in normal Playfair method. B. Generation of QR Code To create a QR code [9][11][10][13] is we first create a string of data bits. This string includes the characters of the original message (encrypted message in this case) that you are encoding, as well as some information bits that will tell a QR decoder what type of QR Code it is. After generating the aforementioned string of bits, we use it to generate the error correction code words for the QR Code. QR Codes use Reed-Solomon Error Correction technique [10]. Please note that in coding theory, Reed- Solomon codes (RS codes) are non-binary cyclic error correction codes invented by Irving S. Reed and Gustave Solomon. After the generation of bit-string and error correction code words, the resultant data is used to generate eight different QR Codes, each of which uses a different mask pattern. A mask pattern controls and changes the pixels to light or dark ones, according to a particular formula. The eight mask pattern formulas are defined in the QR Code specification, which is referred at the time of mask generation needed for the QR Code generation. Each of the eight QR codes is then given a penalty score that is based on rules defined in the QR specification. The purpose of this step is to make sure that the QR code doesn't contain patterns that might be difficult for a QR decoder to read, like large blocks of same-colored pixels, for example. After determining the best mask pattern, the QR Code, which uses the best mask pattern, is generated and shown as an output. If the size of the encrypted message becomes more than 1,264 characters then the characters appearing after

3 315 1,264 characters are used separately to generate another QR Code and the above mentioned process is repeated until and unless the total encrypted message is converted to QR Code(s). The method is discussed in details below: The Encrypted file, which is created using the method TTJSA is now treated as the input file and the string is extracted from the file to generate the QR Code. Step 1: call function file_read(output_file) Step 2: call function generateqrcode( str[] ) [9][10][11] [13] Step 3: call function delete_file(output_file) ALGORITHM FOR DECODEQRCODE() We here follow the reverse process of the above generateqrcode() Algorithm to detect the QR Code Image using Library Class and perform error correction using Reed-Solomon technique and get back the encrypted message. III. Fig 2: Decrypted Student s Information from QR Code We have also given a demonstration of our marks-sheet, which is under development process, in the following figure: RESULTS AND DISCUSSION We chose a student of anonymous name and produce the demonstration of the new mark-sheet system of that student g in the followingg figures. Fig 1: Student s Information in form of Encrypted QR Code Decryption of Dataa From QR Code Fig 3: An Actual Result (Mark-Sheet) having the Digital Data (Academic Record) in encrypted QR Code

4 316 Demonstration Test Case: Here, we demonstrate the new academic transcript system by proving a demo example, which was in its initial stages of development. code, and add more relevant and important information about the student in the digital format. We are also trying to implement more security and data assurance, so that the digital data can be saved and retrieved properly and securely. ACKNOWLEDGMENT Somdip Dey (SD) would like to thank his professors Dr. Asoke Nath and Shalabh Agarwal of Department of Computer Science, St. Xavier s College [Autonomous], Kolkata, India, for providing him the opportunity to be part of such a wonderful project. SD would also like to thank his fellow students for helping in the preparation of the project and for their enthusiasm. SD would also like to thank his parents, Sudip Dey and Soma Dey, for their un-ending faith and blessings. Data Embedded Digitally on the QR Code TM Fig 4: Demo of Initial Mark-sheet IV. CONCLUSION AND FUTURE SCOPE The mark-sheet system, presented in this paper, is very effective to save a lot of digital space, and the academic records, which are saved in the mark-sheets, can not be tampered because they are encrypted uniquely using our own custom built cipher method with uniquely generated key, which is very secure indeed. The research group at St. Xavier s College [Autonomous], Kolkata, India, is trying to further optimize the digital information, which is embedded in form of QR REFERENCES [1] Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey, Asoke Nath, Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm, Proceedings of Information and Communication Technologies (WICT), 2011 held at Mumbai, 11 th 14 th Dec, 2011, pp [2] Asoke Nath, Saima Ghosh, Meheboob Alam Mallik, Symmetric Key Cryptography using Random Key generator, Proceedings of International conference on security and management(sam 10) held at Las Vegas, USA Jull 12-15, 2010, P-Vol-2, [3] Neeraj Khanna,Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath, New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm, Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) June 2011, Page (2011). [4] Somdip Dey,Joyshree Nath,Asoke Nath,"An Integrated Symmetric Key Cryptographic Method Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", IJMECS, vol.4, no.5, pp.1-9, [5] Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal of Computer Applications 46(20): 46-53, May Published by Foundation of Computer Science, New York, USA. [6] Somdip Dey, SD-EQR: A New Technique To Use QR CodesTM in Cryptography, Proceedings of 1 st International Conference on Emerging Trends in Computer and Information Technology (ICETCIT 2012), Coimbatore, India, pp [7] Cryptography and Network Security, William Stallings, Prentice Hall of India. [8] Cryptography & Network Security, Behrouz A. Forouzan, Tata McGraw Hill Book Company. [9] "QR Code, Wikipedia", [Online] [Retrieved ] [10] Reed and G. Solomon, Polynomial codes over certain finite fields, Journal of the Society for Industrial and Applied Mathematics, 8(2): , [11] "ZXING- QR Code Library ", [Online] [Retrieved ] [12] N. Johnson and S. Jajodia, Steganaly- sis: The investigation of hidden information, Proc. Of the 1998 IEEE Information Technology Conference, [13] Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath,"Advanced Steganography Algorithm Using Randomized Intermediate QR Host

5 317 Embedded With Any Encrypted Secret Message: ASA_QR Algorithm", IJMECS, vol.4, no.6, pp , [14] Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal of Computer Applications 46(20): 46-53, May Published by Foundation of Computer Science, New York, USA. [15] Somdip Dey, Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2, International Journal of Cyber-Security and Digital Forensics (IJCSDF) 1(3), pp [16] Somdip Dey, SD-EI: A Cryptographic Technique To Encrypt Images, Proceedings of The International Conference on Cyber Security, CyberWarfare and Digital Forensic (CyberSec 2012), held at Kuala Lumpur, Malaysia, 2012, pp [17] Somdip Dey, SD-AEI: An advanced encryption technique for images, 2012 IEEE Second International Conference on Digital Information Processing and Communications (ICDIPC), pp [18] Somdip Dey, SD-REE: A Cryptographic Method To Exclude Repetition From a Message, Proceedings of The International Conference on Informatics & Applications (ICIA 2012), Malaysia, pp [19] Somdip Dey, SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit- Manipulation to Exclude Repetition from a Message to be Encrypted, Journal: Computing Research Repository - CoRR, vol. abs/ , [20] Somdip Dey, An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES, International Journal of Cyber- Security and Digital Forensics (IJCSDF) 1(2), pp [21] Somdip Dey, Asoke Nath, Modern Encryption Standard (MES) Version-I: An Advanced Cryptographic Method, Proceedings of IEEE 2 nd World Congress on Information and Communication Technologies (WICT- 2012), pp

An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES

An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES Somdip Dey St. Xavier s College [Autonomous] Kolkata, India E-mail: somdipdey@ieee.org somdipdey@acm.org ABSTRACT The security

More information

QR Code Based Digitized Marksheet System

QR Code Based Digitized Marksheet System QR Code Based Digitized Marksheet System Kajal P. Chavan, Rupal R. Kamble, Priyanka P. Meshram, Mrs. Kanchan K. Doke Department of Computer Engineering Bharati Vidyapeeth College of Engineering, Mumbai

More information

SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted

SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with -Manipulation to Exclude Repetition from a Message to be Encrypted Somdip Dey (Author) B.Sc. (Hons) Department of Computer Science

More information

Aashijit Mukhopadhyay 2 Department of Computer Science St. Xavier s College(Autonomous) Kolkata, West Bengal India

Aashijit Mukhopadhyay 2 Department of Computer Science St. Xavier s College(Autonomous) Kolkata, West Bengal India ISSN: 2321-7782 (Online) Impact Factor: 6.047 Volume 4, Issue 10, October 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case

More information

Webpage: Volume 5, Issue VII, July 2017 ISSN

Webpage:   Volume 5, Issue VII, July 2017 ISSN Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

Enhanced 3-D PLAYFAIR Cipher

Enhanced 3-D PLAYFAIR Cipher Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering

More information

A Novel Design For Generating Dynamic Length Message Digest To Ensure Integrity Using Block Cipher Approach

A Novel Design For Generating Dynamic Length Message Digest To Ensure Integrity Using Block Cipher Approach A Novel Design For Generating Dynamic Length Message Digest To Ensure Integrity Using Block Cipher Approach Umesh Gandhi 1, Dr.(Mrs.) Poonam Sinha 2, Ms. Rachna Kulhare 3 1(Department of I.I., UIT, Barkatullah

More information

Advanced Steganography Algorithm using Encrypted secret message

Advanced Steganography Algorithm using Encrypted secret message (IJACSA) International Journal of Advanced Computer Science and Applications, Advanced Steganography Algorithm using Encrypted secret message Joyshree Nath A.K.Chaudhuri School of IT University of Calcutta

More information

A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS

A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS IJRET: International Journal of Research in Engineering and Technology eissn: 2319-1163 pissn: 2321-738 A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS Kalavathi Alla 1, Sai Jyothi B 1,2

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3 ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)

More information

A Proposed Method for Cryptography using Random Key and Rotation of Text

A Proposed Method for Cryptography using Random Key and Rotation of Text Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf

More information

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College

More information

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM MAHENDRAN R Assistant professor, Dept of computer science, Puthanampatti ABSTRACT In this modern electronic age we need to protect sensitive and valuable information

More information

Hardware Design and Software Simulation for Four Classical Cryptosystems

Hardware Design and Software Simulation for Four Classical Cryptosystems Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)

More information

Modified Playfair Cipher Using Random Key Linear Congruent Method

Modified Playfair Cipher Using Random Key Linear Congruent Method 4 th INTERNATIONAL SEMINAR: RESEARCH FOR SCIENCE, TECHNOLOGY AND CULTURE (IRSTC 2017) Modified Playfair Cipher Using Random Key Linear Congruent Method Muhammad Syahrizal 1 *, Murdani 2, Surya Darma Nasution

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

Analysis of Cryptography and Pseudorandom Numbers

Analysis of Cryptography and Pseudorandom Numbers ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the

More information

International Journal of Computer Engineering and Applications,

International Journal of Computer Engineering and Applications, International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY

More information

A New variant of Hill Cipher Algorithm for Data Security

A New variant of Hill Cipher Algorithm for Data Security Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi

More information

An Approach for Ensuring Security and its Verification

An Approach for Ensuring Security and its Verification An Approach for Ensuring Security and its Verification Suparna Karmakar Department of Information Technology Guru Nanak Institute of Technology Sodepur, Kolkata, West Bengal, India E-mail - karmakarsuparna27@gmail.com

More information

Data Encryption Standard (DES)

Data Encryption Standard (DES) Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

3D (6 X 4 X 4) - Playfair Cipher

3D (6 X 4 X 4) - Playfair Cipher 3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital

More information

Survey: Recent Modifications in Vigenere Cipher

Survey: Recent Modifications in Vigenere Cipher IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha

More information

Cryptography Algorithms using Artificial Neural Network Arijit Ghosh 1 Department of Computer Science St. Xavier s College (Autonomous) Kolkata India

Cryptography Algorithms using Artificial Neural Network Arijit Ghosh 1 Department of Computer Science St. Xavier s College (Autonomous) Kolkata India Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Science & Technology (DCRUST), Sonepat

Science & Technology (DCRUST), Sonepat A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &

More information

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.

More information

Proposing A Symmetric Key Bit-Level Block Cipher

Proposing A Symmetric Key Bit-Level Block Cipher Proposing A Symmetric Key Bit-Level Block Cipher Sarbajit Manna, Saurabh Dutta Abstract A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some 3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some popular block ciphers Triple DES Advanced Encryption

More information

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY Daffodil International University Institutional Repository DIU Journal of Science and Technology Volume,Issue,January 007 007-0-0 FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

More information

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages. Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets

More information

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American Danielle Curran Dr. Derek Bruff Math 115F: Cryptography October 26, 2010 The Hill Cipher In 1929 Lester Hill, a professor at Hunter College, published an article in the American Mathematical Monthly called

More information

Error Correction and Detection using Cyclic Redundancy Check

Error Correction and Detection using Cyclic Redundancy Check Error Correction and Detection using Cyclic Redundancy Check Dr. T. Logeswari Associate Professor, Dept of Computer Science, New Horizon College, Banglore, Karnataka, India ABSTRACT: In this paper Cyclic

More information

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key

Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,

More information

Keywords: Playfair, Matrix, XOR operation

Keywords: Playfair, Matrix, XOR operation Modified Playfair Cipher for Encrypting Images Faisal Mohammed Abdalla 1, Khadiga Mohammed Adam Babiker 2 1 Collage of computer science and information technology, Karary University, Omdurman, Sudan 2

More information

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái Cryptography and Network Security Block Ciphers + DES Lectured by Nguyễn Đức Thái Outline Block Cipher Principles Feistel Ciphers The Data Encryption Standard (DES) (Contents can be found in Chapter 3,

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed Vijaya Kumar. B.1 #1, T. Thammi Reddy.2 #2 #1. Dept of Electronics and Communication, G.P.R.Engineering College,

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of

More information

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),

More information

Diversified Caesar Cipher for Impeccable Security

Diversified Caesar Cipher for Impeccable Security Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics

More information

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with

More information

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G

More information

Design and Analysis of New Symmetric Block Cipher Algorithm

Design and Analysis of New Symmetric Block Cipher Algorithm Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Classical Encryption Techniques

Classical Encryption Techniques Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The

More information

CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques

CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques CS 556 Spring 2017 Project 3 Study of Cryptographic Techniques Project Due Dates: Part A: Due before class on CANVAS by Thursday, March 23, 2017 Part B: Due before class on CANVAS by Thursday April 6,

More information

Advanced Cryptographic Technique Using Double Point Crossover

Advanced Cryptographic Technique Using Double Point Crossover Advanced Cryptographic Technique Using Double Point Crossover P. Lakshmi Devi 1, G. Sai veena 2 Associate professor 1, Annamacharya Institute of Technology & Sciences, Rajampet, A.P, India M.Tech scholar

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant

More information

SOLUTIONS FOR HOMEWORK # 1 ANSWERS TO QUESTIONS

SOLUTIONS FOR HOMEWORK # 1 ANSWERS TO QUESTIONS SOLUTIONS OR HOMEWORK # 1 ANSWERS TO QUESTIONS 2.4 A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A block cipher is one in which a block of plaintext is treated

More information

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS

More information

Performance Evaluation & Design Methodologies for Automated CRC Checking for 32 bit address Using HDLC Block

Performance Evaluation & Design Methodologies for Automated CRC Checking for 32 bit address Using HDLC Block Performance Evaluation & Design Methodologies for Automated CRC Checking for 32 bit address Using HDLC Block 32 Bit Neeraj Kumar Misra, (Assistant professor, Dept. of ECE, R D Foundation Group of Institution

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

Combination of RGB Substitution for Text to Image Encryption Technique using AES

Combination of RGB Substitution for Text to Image Encryption Technique using AES Combination of RGB Substitution for Text to Image Encryption Technique using AES Sourabh Singh 1 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P),

More information

Implementation of Modified Playfair CBC Algorithm

Implementation of Modified Playfair CBC Algorithm Implementation of Modified Playfair CBC Algorithm Priyanka Goyal Dept. of Computer Science & Engineering ITM Group of Institutions Gwalior, India Gaurav Sharma Dept. of Computer Science & Engineering ITM

More information

Issues in Information Systems Volume 18, Issue 2, pp , 2017

Issues in Information Systems Volume 18, Issue 2, pp , 2017 IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL Abhijit Sen, Kwantlen Polytechnic University, abhijit.sen@kpu.ca ABSTRACT Microsoft Excel offers a number of data manipulation tools that

More information

SXC-JMS: A WEB -BASED JOURNAL MANAGEMENT SYSTEM

SXC-JMS: A WEB -BASED JOURNAL MANAGEMENT SYSTEM SXC-JMS: A WEB -BASED JOURNAL MANAGEMENT SYSTEM Sahon Bhattacharyya 1, Kalyan Mondal 2, Shalabh Agarwal 3 and Asoke Nath 4 Department of Computer Science St. Xavier's College (Autonomous) Kolkata, West

More information

ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION

ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION Er. Suraj Arya 1, Dr.Ankit Kumar 2 1 Research Scholar,Baba Mastnath University, Rohtak, Haryana,(INDIA) 2 Assistant

More information

A Modified Version of Hill Cipher

A Modified Version of Hill Cipher A Modified Version of Hill Cipher A.F.A.Abidin 1, O.Y.Chuan 2 Faculty of Informatics Universiti Sultan Zainal Abidin 21300 Kuala Terengganu, Terengganu, Malaysia. M.R.K.Ariffin 3 Institute for Mathematical

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY

More information

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017 Department of Computer Science and Engineering CSE 3482 Introduction to Computer Security Instructor: N. Vlajic Date: Mar 1, 2017 Midterm Examination Instructions: Examination time: 75 min. Print your

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

Enhanced Network Security Using Text to Image Encoding

Enhanced Network Security Using Text to Image Encoding 2015 International Conference on Smart Sensors and Systems (IC-SSS) Enhanced Network Security Using Text to Image Encoding Rahulkrishna P K 1, Eshwari R 2, Shree Harsha N J 3, Divyashree E 4, C Gururaj

More information

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2014 1 / 31 Who am I Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,

More information

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION 132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS

More information

Linear Algorithm for Imbricate Cryptography Using Pseudo Random Number Generator

Linear Algorithm for Imbricate Cryptography Using Pseudo Random Number Generator Linear Algorithm for Imbricate Cryptography Using Pseudo Random Number Generator Rohit Rastogi Sr. Asst Professor, CSE-Dept, ABES Engg. College Ghaziabad (U.P.), INDIA Email Id: rohit.rastogi@abes.ac.in

More information

Secret Key Algorithms (DES)

Secret Key Algorithms (DES) Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used

More information

A SIMPLIFIED IDEA ALGORITHM

A SIMPLIFIED IDEA ALGORITHM A SIMPLIFIED IDEA ALGORITHM NICK HOFFMAN Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions

More information

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android Journal of Physics: Conference Series PAPER OPEN ACCESS An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android To cite this article: M A Budiman et

More information

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of

More information

Geldy : A New Modification of Block Cipher

Geldy : A New Modification of Block Cipher Geldy : A New Modification of Block Cipher Candy Olivia Mawalim (13513031) School of Electrical Engineering and Informatics Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia 13513031@std.stei.itb.ac.id

More information

An Application of Graph Theory in Cryptography

An Application of Graph Theory in Cryptography Volume 119 No. 13 2018, 375-383 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Application of Graph Theory in Cryptography P. Amudha 1 A.C. Charles Sagayaraj 2 A.C.Shantha Sheela

More information

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017 Introduction to Cryptology ENEE 459E/CMSC 498R Lecture 1 1/26/2017 Syllabus Highlights Best way to contact me is via email: danadach@ece.umd.edu My office hours; Thurs 3:00-4:00pm, Friday, 12:00-1pm in

More information

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES International Journal of Information Technology and Knowledge Management July-December 2008, Volume 1, No. 2, pp. 475-483 IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

More information

DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE

DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE 25 October, 2017 DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE Document Filetype: PDF 417.33 KB 0 DOC CRYPTOGRAPHY STINSON SOLUTION PART LIST ARCHIVE Additional functions for working with CTLs can

More information

Enhancement Caesar Cipher for Better Security

Enhancement Caesar Cipher for Better Security IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 01-05 Enhancement Caesar Cipher for Better Security Programmer Enas Ismael

More information

Classical Encryption Techniques

Classical Encryption Techniques Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,

More information