Optimized Hybrid Security Model using Base 64 Algorithm in conjunction with Substitution Cipher to Enhance Text Security

被引:0
作者
Maitlo, Abdullah [1 ]
Arain, Rafaqat Hussain [1 ]
Shaikh, Riaz Ahmed [1 ]
Shaikh, Hidayatullah [1 ]
Shah, Mahmood Hussain [2 ]
Shah, Safdar Ali [1 ]
Mahar, Mumtaz Hussain [1 ]
机构
[1] Shah Abdul Latif Univ, Dept Comp Sci, Khairpur, Sindh, Pakistan
[2] Coventry Univ, Sch Strategy & Leadership, Coventry, W Midlands, England
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2018年 / 18卷 / 03期
关键词
Information Security; Network Security; Encryption; Decryption; Substitution Cypher; Cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social business has improved the ability of managers and stakeholders when decision making. However, existing information security systems provide insufficient practice for information protection while transferring information; hackers access valuable information and break encryption codes applied to text messages. This paper presents the development of an Optimized Hybrid Security Model using Base 64 Algorithm and Substitution in Conjunction to enhance message security. This research is a prototype for the user input of message and security key in Hypertext Preprocessor using JQuery. The developed system needs the input of the plain text and the security key. Initially, Base 64 algorithm encrypts plain text into cypher text with the security key and then the Substitution Cipher encrypts the key into a cypher secured key. For testing, 300 text messages were input with different security keys. This research is a step forward in securing text messages; it can be used to encrypt text between sender and receiver through email, or it can be applied on instant messaging services and also can be used for stronger password encryption.
引用
收藏
页码:93 / 98
页数:6
相关论文
共 28 条
  • [1] Abdullah M., 2016, 4 INT AC C PAR IACP, P71
  • [2] Alsmadi I., 2018, PRACTICAL INFORM SEC, P1
  • [3] BBC, 2012, BBC
  • [4] Chunying Gu, 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), P2035, DOI 10.1109/CECNet.2012.6201610
  • [5] Cisco, 2012, WHAT IS NETW SEC
  • [6] Dang-Pham D., 2015, 19 PAC AS C INF SYST
  • [7] Implementing enterprise security : a case study
    Doughty, K
    [J]. COMPUTERS & SECURITY, 2003, 22 (02) : 99 - 114
  • [8] Eloff P., 2002, INF SECUR, P402
  • [9] Gokce A. G., 2012, 2012 International Conference on Information Society (i-Society), P352
  • [10] Protecting the communication: Data protection and security measures under telecommunications regulations in the digital age
    Gurkaynak, Gonenc
    Yilmaz, Ilay
    Taskiran, Nazli Pinar
    [J]. COMPUTER LAW & SECURITY REVIEW, 2014, 30 (02) : 179 - 189