Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm

被引:0
|
作者
R. Geetha
T. Padmavathy
T. Thilagam
A. Lallithasree
机构
[1] S.A. Engineering College,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2020年 / 112卷
关键词
Security; Tamil language; Cryptography; AES; DES; Blowfish;
D O I
暂无
中图分类号
学科分类号
摘要
Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India. Here we use Tamil language for encrypting the text named as Tamilian Cryptography. Since Tamil language has 247 characters it is very difficult to crack the message. The message to be encrypted is translated to Tamil language, this translated text is then mapped to a randomly generated 2-bit combination of English alphabets. The result of this process is called intermediate cipher (inter cipher). This is an hybrid algorithm since the inter cipher is encrypted using Advanced Encryption Standard algorithm to enhance the confidentiality of the text. Since the Tamilian Cryptography makes use of three phases namely Translation, Mapping and Encryption, it makes the data much more secure than the existing algorithms like blowfish and Data Encryption Standard (DES) and also the person who tries to decrypt must have the knowledge of Tamil language as well the mapping details to see the original data and This algorithm exhibits stronger avalanche effect of 95% which is greater than blowfish and DES. The evaluation of the proposed algorithm shows that it executes faster and has comparatively lesser encryption time, less memory overhead.
引用
收藏
页码:21 / 36
页数:15
相关论文
共 50 条
  • [21] Application of Cellular Automata in Symmetric Key Cryptography
    Roy, Satyabrata
    Nandi, Subrata
    Dansana, Jayanti
    Pattnaik, Prasant Kumar
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [22] A Comparative and Analytical Study on Symmetric Key Cryptography
    Mandal, Bidisha
    Chandra, Sourabh
    Alam, Sk Safikul
    Patra, Subhendu Sekhar
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 131 - 136
  • [23] A New Symmetric Key Encryption Algorithm based on 2-d Geometry
    Chowdhury, Mohammad Jabed Morshed
    Pal, Tapas
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 541 - +
  • [24] Secure Session Key Sharing Using Symmetric Key Cryptography
    Arora, Shweta
    Hussain, Muzzammil
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 850 - 855
  • [25] Application of Cellular Automata in Symmetric Key Cryptography
    Szaban, Miroslaw
    Nowacki, Jerzy Pawel
    Drabik, Aldona
    Seredynski, Franciszek
    Bouvry, Pascal
    ADVANCES IN INFORMATION TECHNOLOGY, 2010, 114 : 154 - +
  • [26] A comparative survey of symmetric and asymmetric key cryptography
    Chandra, Sourabh
    Paira, Smita
    Alam, Sk Safikul
    Sanyal, Goutam
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 83 - 93
  • [27] A Symmetric Key Cryptography using Genetic Algorithm and Error Back Propagation Neural Network
    Sagar, Vikas
    Kumar, Krishan
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1386 - 1391
  • [28] Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique
    Raja, S. P.
    INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2019, 17 (05)
  • [29] A Lightweight Image Encryption Algorithm Based on Secure Key Generation
    Ali, A'Laa Hussein
    Gbashi, Ekhlas Khalaf
    Alaskar, Haya
    Hussain, Abir Jaafar
    IEEE ACCESS, 2024, 12 : 95871 - 95883
  • [30] Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms
    Murugan, Chinnandi Arul
    Karthigaikumar, P.
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (04) : 1385 - 1390