INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.9, No.10, Oct. 2017

Multi-layer Masking of Character Data with a Visual Image Key

Full Text (PDF, 709KB), PP.41-49


Views:144   Downloads:2

Author(s)

Asif Karim

Index Terms

Cryptanalysis;cryptology;bit masking;visual key encryption;symmetric encryption

Abstract

Information is one of the single most important factor for understanding a situation as well as deciding upon a solution by effectively devising a working method. Thus the magnitude of securely delivering information to the correct individual or organization has always been a prime concern. The field of Cryptography deals with such necessities as to encrypt the information in such a way so that only the intended receiver, equipped with the right armoury, can decipher the message. Here in this paper a method for encrypting character data has been presented whereby the ASCII values of individual character is converted into their Hex values before they are turned into their binary form, and randomly assigned a single digit Odd integer value for a 1 and single digit Even integer value for a 0. Going forward we do some more processing of the data to make it even more secure, these will be discussed in due course. The receiver must possess a valid Image key in order to decrypt the text. This image is generated during encryption from two RGB (Red, Green and Blue) values- having a difference of a random number produced within the range of total length of the plaintext.

Cite This Paper

Asif Karim,"Multi-layer Masking of Character Data with a Visual Image Key", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.10, pp.41-49, 2017.DOI: 10.5815/ijcnis.2017.10.05

Reference

[1]Caeser, Kennedy (2008). Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition, Wiley, pp. 74.

[2]Kahn, David (1996). The Codebreakers, Rev. Edition, Scribner, pp. 90-107.

[3]A Brief History of Cryptography. Cypher Research Laboratories, Retrieved: 18 March 2017.

[4]Schneier, Bruce (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, pp. 461-466. 

[5]Voborník, Petr. Migration of the Perfect Cipher to the Current Computing Environment. In: WSEAS Transactions on Information Science and Applications, 2014.

[6]Bauer, Friedrich (1998). Decrypted Secrets: Methods and Maxims of Cryptology, Fourth Edition, Springer, pp. 25-26. 

[7]Robshaw, Knudsen (2011). The Block Cipher Companion, Springer, pp. 3-67.

[8]Wu, Hongjun. Cryptanalysis and Design of Stream Ciphers. Thesis Paper, Katholieke Universiteit Leuven, 2008.

[9]Schneier, Ferguson (2003). Practical Cryptography, First Edition, Wiley, pp. 83-95.

[10]Devi, Kiran. A Review on Visual Cryptography Schemes. In: Journal of Global Research in Computer Science, V: 3, N: 6, 2012.

[11]Mani. K, Viswambari. M,"Enhancing the Security in Cryptosystems Based on Magic Rectangle", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.4, pp. 37-47, 2017.DOI: 10.5815/ijcnis.2017.04.05

[12]Oladeji P. Akomolafe, Matthew O. Abodunrin,"A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.6, pp. 53-60, 2017.DOI: 10.5815/ijcnis.2017.06.06

[13]Assche, Gilles Van (2006). Quantum Cryptography and Secret-Key Distillation, First Edition, Cambridge University Press, pp. 01-03.

[14]Kahn, David (1996). The Cryptography for Image Processing and Security (Theory, Methods and Application), 2014, Springer, pp. 23-25.

[15]M.I.Khalil,"Real-Time Encryption/Decryption of Audio Signal", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.2, pp.25-31, 2016.DOI: 10.5815/ijcnis.2016.02.03

[16]Figure 1-6 have been sourced from the World Wide Web.