DOI QR코드

DOI QR Code

Using Highly Secure Data Encryption Method for Text File Cryptography

  • Abu-Faraj, Mua'ad M. (The University of Jordan) ;
  • Alqadi, Ziad A. (Albalaqa Applied University)
  • Received : 2021.12.05
  • Published : 2021.12.30

Abstract

Many standard methods are used for secret text files and secrete short messages cryptography, these methods are efficient when the text to be encrypted is small, and the efficiency will rapidly decrease when increasing the text size, also these methods sometimes have a low level of security, this level will depend on the PK length and sometimes it may be hacked. In this paper, a new method will be introduced to improve the data protection level by using a changeable secrete speech file to generate PK. Highly Secure Data Encryption (HSDE) method will be implemented and tested for data quality levels to ensure that the HSDE destroys the data in the encryption phase, and recover the original data in the decryption phase. Some standard methods of data cryptography will be implemented; comparisons will be done to justify the enhancements provided by the proposed method.

Keywords

References

  1. Burnett, S., and Paine, S. : RSA Security's Official Guide to Cryptography.McGraw-Hill (2001)
  2. Disina, A. H., Jamel, S. , Aamir, M., Pindar, Z. A., Deris M. M., and Mohamad, K. M.: A key scheduling algorithm based on dynamic quasigroup string transformation and All-Or-Nothing key derivation function. Journal of Telecommunication, Electronic and Computer Engineering, vol. 9 (3-5), pp. 1-6 (2017)
  3. Jamel, S., Deris, M. M., Yanto, I. T. R., and Herawan, T.: The hybrid cubes encryption algorithm (HiSea). Communications in Computer and Information Science, Springer-Verlag Berlin Heidelberg, vol. 154, pp. 191-200 (2011)
  4. Stallings, W.: The RC4 stream encryption algorithm. In Cryptography and network security, 2005.
  5. Sasi, S. B., Sivanandam, N., and Emeritus, : A survey on cryptography using optimization algorithms in WSNs. Indian Journal of Science and Technology, vol. 8(3), pp. 216-221 (2015) https://doi.org/10.17485/ijst/2015/v8i3/59585
  6. Jamel, S.: The hybrid cubes encryption algorithm (HiSea). Ph.D Thesis, Univ. Tun Hussein Onn Malaysia (UTHM), Johor, Malaysia, pp. 1-138 (2012)
  7. Ahmad, S., Alam, K. M. R., Rahman, H., and Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In Proceedings of the IEEE International Conference on Networking Systems and Security (2015)
  8. Fujisaki, E. and Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. Journal of Cryptology, vol. 26 (1), pp. 80-101 (2013) https://doi.org/10.1007/s00145-011-9114-1
  9. Salama, D., Minaam, A., Abdual-kader, H. M, and Hadhoud, M. M.: Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, vol. 11(2), pp. 78-87 (2010)
  10. Goldwasser, S. and Bellare, M. Lecture Notes on Cryptography, Cambridge, Massachusetts (2008)
  11. Kaushik, A., Barnela M., and Kumar, A.: Keyless user defined optimal security encryption. International Journal of Computer and Electrical Engineering, vol. 4 (2), pp. 2-6 (2012)
  12. Stallings, W.: Cryptography and network security: principles and practices. Prentice Hall, (2005)
  13. Mandal, K., Parakash, C., and Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In Proceeding of the IEEE Students' Conference on Electrical, Electronics and Computer Science: Innovation for Humanity (SCEECS), (2012)
  14. Ebrahim, M., Khan, S., and bin Khalid U.: Symmetric algorithm survey: A comparative analysis. International Journal of Computer Applications, vol. 61(20), pp. 12-19, (2013)
  15. Kumar, N., and P. Chaudhary, P.: Performance evaluation of encryption/decryption mechanisms to enhance data security. Indian Journal of Science and Technology, vol. 9(20), pp.1-10 (2016)
  16. Disina, A. H., Pindar, Z. A., and Jamel, S.: Enhanced Caeser cipher to exclude repetition and withstand frequency cryptanalysis. Journal of Network and Information Security, (2015)
  17. Palagushin, V., and Khomonenko, A. D.: Evaluation of cryptographic primitives security based on proximity to the latin square. In Proceeding of the IEEE 18th conference of fruct association, pp. 266-271(2016)
  18. Jamel, S. H. and Deris, M. M.: Diffusive primitives in the design of modern cryptographic algorithms. In proceedings of the International Conference on Computer and Communication Engineering (ICCCE08): Global Links for Human Development, pp. 707-710 (2008)
  19. Nadeem, A. and Javed, M. Y.: A performance comparison of data encryption algorithms. International Conference on Information and Communication Technologies, pp. 84-89, 2005
  20. S. Manku, S., and Vasanth, K.: Blowfish encryption algorithm for information security. ARPN Journal of Engineering and Applied Sciences, vol. 10(10), pp. 4717-4719 (2015)
  21. Daemen, J., Rijmen, V., and Leuven, K. U.: AES Proposal: Rijndael. (NIST), National Institute of Standards, (1999)
  22. Escala, A., Herold, G., and Rafols, C.: An algebraic framework for Diffie-Hellman assumptions. Journal of Cryptology (2015)
  23. Jorstad N., and Landgrave.: Cryptographic algorithm metrics. In 20th National Information Systems Security (1997)
  24. Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., and Ullah, A.: Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, vol. 8(10), pp. 183-195 (2017)
  25. Hercigonja, Z., Gimnazija, D., and Varazdin, C.: Comparative analysis of cryptographic algorithms and advanced cryptographic algorithms. International Journal of Digital Technology & Economy, vol. 1(2), pp. 1-8 (2016)
  26. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th ed. Prentice Hall Press (2010)
  27. William, E. B., Barker, C.: Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST Special Publication 800-67 (2012)
  28. Maqsood, F., Ali, M. M., Ahmed, M., and Shah, M. A.: Cryptography: A comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, vol. 8(6), pp. 442-448 (2017)
  29. Alshahrani, A. M., and Walker, S.: Implement a novel symmetric block cipher algorithm. International Journal on Cryptography and Information Security, vol. 4 (4), pp. 1-11 (2014) https://doi.org/10.5121/ijcis.2014.4401
  30. Smid M. E., and Branstad D. K.: Data Encryption Standard: past and future. In Proceedings of the IEEE, vol. 76 (5), pp. 550-559 (1988) https://doi.org/10.1109/5.4441
  31. N. I. of S. and T. NIST: Data Encryption Standard (DES). Federal Information Processing Standards Publication (FIPS PUB 46-3), vol. 25(10), pp. 1-22 (1999)
  32. Dworkin, M.: Recommendation for block cipher modes of operation, NIST Spec. Publ. 800-38B, (2005)
  33. Patil, P., Narayankar, P., Narayan, D. G., and Meena, S. M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In Procedia Computer Science, vol. 78, pp.617-624 (2016) https://doi.org/10.1016/j.procs.2016.02.108
  34. Silva, N. B. F., Pigatto, D. F., Martins, P. S., and Branco, K. R. L. J. C.: Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general-purpose computer. Journal of Network and Computer Applications, vol. 60, pp. 130-143 (2016) https://doi.org/10.1016/j.jnca.2015.10.007
  35. N. I. of Standards-(NIST), Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)
  36. Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., and Roback, E.: Report on the development of the advanced encryption standard (AES). National Institute of Standards and Technology, pp. 1-116 (2000)
  37. Nie, T., and Zhang, T.: A study of DES and Blowfish encryption algorithm. In Proceedings of 10th IEEE Region Annual International Conference TENCON, pp. 1-4 (2009)
  38. Schneier, B.: Description of a new variable-length key, 64- bit block cipher (Blowfish). In Proceedings of the Fast Software Encryption: Cambridge Security Workshop Cambridge, U. K., pp. 191-204 (1994)
  39. Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In Proc. Fast Softw. Encryption Cambridge Security. Work. Cambridge, U. K., pp. 191-204 (1994)
  40. Mushtaq, M. F., Jamel, S. , Mohamad, K. M. , .Khalid, S. A. A., and Deris, M. M.: Key generation technique based on triangular coordinate extraction for hybrid cubes. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. (3-4), pp. 195-200 (2017)
  41. Disina, A. H., Jamel, S., Pindar, Z. A., and Deris M. M.: All-or-nothing key derivation function based on quasigroup string. In proceeding of IEEE International Conference on Information Science and Security (ICISS), pp. 6-10 (2016)
  42. Shannon, C. E.: Communication theory of secrecy systems. Bell System Technical Journal, vol. 28 (4), pp. 656-715 (1949) https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  43. Mel, H. X., and Baker. D. M.: Cryptography decrypted. Addison-Wesley (2001)