Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm

被引:10
|
作者
Geetha, R. [1 ]
Padmavathy, T. [1 ]
Thilagam, T. [1 ]
Lallithasree, A. [1 ]
机构
[1] SA Engn Coll, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Security; Tamil language; Cryptography; AES; DES; Blowfish; TEXT;
D O I
10.1007/s11277-019-07013-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India. Here we use Tamil language for encrypting the text named as Tamilian Cryptography. Since Tamil language has 247 characters it is very difficult to crack the message. The message to be encrypted is translated to Tamil language, this translated text is then mapped to a randomly generated 2-bit combination of English alphabets. The result of this process is called intermediate cipher (inter cipher). This is an hybrid algorithm since the inter cipher is encrypted using Advanced Encryption Standard algorithm to enhance the confidentiality of the text. Since the Tamilian Cryptography makes use of three phases namely Translation, Mapping and Encryption, it makes the data much more secure than the existing algorithms like blowfish and Data Encryption Standard (DES) and also the person who tries to decrypt must have the knowledge of Tamil language as well the mapping details to see the original data and This algorithm exhibits stronger avalanche effect of 95% which is greater than blowfish and DES. The evaluation of the proposed algorithm shows that it executes faster and has comparatively lesser encryption time, less memory overhead.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [1] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    R. Geetha
    T. Padmavathy
    T. Thilagam
    A. Lallithasree
    Wireless Personal Communications, 2020, 112 : 21 - 36
  • [2] Content based double encryption algorithm using symmetric key cryptography
    Chandra, Sourabh
    Mandal, Bidisha
    Alam, Sk Safikul
    Bhattacharyya, Siddhartha
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1228 - 1234
  • [3] Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
    Yassein, Muneer Bani
    Aljawarneh, Shadi
    Qawasmeh, Ethar
    Mardini, Wail
    Khamayseh, Yaser
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING AND TECHNOLOGY (ICET), 2017,
  • [4] A New Symmetric Key Encryption Algorithm With Higher Performance
    Murtaza, Abid
    Pirzada, Syed Jahanzeb Hussain
    Liu Jianwei
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [5] Proposed Symmetric Key Cryptography Algorithm for Data Security
    Anand, Abhishek
    Raj, Abhishek
    Kohli, Rashi
    Bibhu, Vimal
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 159 - 162
  • [7] DES: The Oldest Symmetric Block Key Encryption Algorithm
    Sharma, Mukta
    Garg, R. B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 53 - 58
  • [8] E-HATS : A Symmetric Key Encryption Algorithm with Dynamic Substitution Rule
    Mullick, Vikalp
    2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 471 - 476
  • [9] A New Efficient Symmetric Encryption Algorithm Design and Implementation
    Tawalbeh, Lo'ai
    Al-Hajsalem, Hend
    Abu-Qtaish, Tasneem
    Khatatbeh, Ayat
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (02): : 102 - 110
  • [10] Big-Key Symmetric Encryption: Resisting Key Exfiltration
    Bellare, Mihir
    Kane, Daniel
    Rogaway, Phillip
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 373 - 402