Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm

被引:0
|
作者
R. Geetha
T. Padmavathy
T. Thilagam
A. Lallithasree
机构
[1] S.A. Engineering College,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2020年 / 112卷
关键词
Security; Tamil language; Cryptography; AES; DES; Blowfish;
D O I
暂无
中图分类号
学科分类号
摘要
Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India. Here we use Tamil language for encrypting the text named as Tamilian Cryptography. Since Tamil language has 247 characters it is very difficult to crack the message. The message to be encrypted is translated to Tamil language, this translated text is then mapped to a randomly generated 2-bit combination of English alphabets. The result of this process is called intermediate cipher (inter cipher). This is an hybrid algorithm since the inter cipher is encrypted using Advanced Encryption Standard algorithm to enhance the confidentiality of the text. Since the Tamilian Cryptography makes use of three phases namely Translation, Mapping and Encryption, it makes the data much more secure than the existing algorithms like blowfish and Data Encryption Standard (DES) and also the person who tries to decrypt must have the knowledge of Tamil language as well the mapping details to see the original data and This algorithm exhibits stronger avalanche effect of 95% which is greater than blowfish and DES. The evaluation of the proposed algorithm shows that it executes faster and has comparatively lesser encryption time, less memory overhead.
引用
收藏
页码:21 / 36
页数:15
相关论文
共 50 条
  • [41] An Efficient Method for text Encryption using Elliptic Curve Cryptography
    Das, Prasenjit
    Giri, Chandan
    PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018), 2018, : 96 - 101
  • [42] Prospective cryptography in NFC with the lightweight block encryption algorithm LEA
    Van Nguyen, Ha
    Seo, Hwajeong
    Kim, Howon
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8860 : 191 - 203
  • [43] Computational Soundness for Key Exchange Protocols with Symmetric Encryption
    Kuesters, Ralf
    Tuengerthal, Max
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
  • [44] Symmetric-Key Encryption Based on Bioaffinity Interactions
    McGoldrick, Leif K.
    Weiss, Elizabeth A.
    Halamek, Jan
    ACS SYNTHETIC BIOLOGY, 2019, 8 (07): : 1655 - 1662
  • [45] A novel image encryption algorithm based on hybrid chaotic maps using a key image
    Benaissi, Sellami
    Chikouche, Noureddine
    Hamza, Rafik
    OPTIK, 2023, 272
  • [46] Eurus: Towards an Efficient Searchable Symmetric Encryption With Size Pattern Protection
    Liu, Zheli
    Huang, Yanyu
    Song, Xiangfu
    Li, Bo
    Li, Jin
    Yuan, Yali
    Dong, Changyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2023 - 2037
  • [47] An Efficient Data Encryption Through Image via Prime Order Symmetric Key and Bit Shuffle Technique
    Lalitha, R. V. S. S.
    Srinivasu, P. Naga
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 261 - 270
  • [48] An Efficient Algorithm for Key Generation in Advance Encryption Standard using Sudoku Solving Method
    Indrani, B.
    Veni, M. Karthigai
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 858 - 865
  • [49] Hybrid symmetric cryptography approach for secure communication in web application
    Kapoor, Vivek
    Gupta, Rati
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05) : 1179 - 1187
  • [50] Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography
    Roy, Tumpa
    Dutta, Kamlesh
    TRENDS IN NETWORKS AND COMMUNICATIONS, 2011, 197 : 88 - 99