Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.12.8

Using Highly Secure Data Encryption Method for Text File Cryptography  

Abu-Faraj, Mua'ad M. (The University of Jordan)
Alqadi, Ziad A. (Albalaqa Applied University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.12, 2021 , pp. 53-60 More about this Journal
Abstract
Many standard methods are used for secret text files and secrete short messages cryptography, these methods are efficient when the text to be encrypted is small, and the efficiency will rapidly decrease when increasing the text size, also these methods sometimes have a low level of security, this level will depend on the PK length and sometimes it may be hacked. In this paper, a new method will be introduced to improve the data protection level by using a changeable secrete speech file to generate PK. Highly Secure Data Encryption (HSDE) method will be implemented and tested for data quality levels to ensure that the HSDE destroys the data in the encryption phase, and recover the original data in the decryption phase. Some standard methods of data cryptography will be implemented; comparisons will be done to justify the enhancements provided by the proposed method.
Keywords
Cryptography; HSDE; PK; MSE; PSNR; speech file; throughput; text file; short message;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. I. of Standards-(NIST), Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)
2 Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In Proc. Fast Softw. Encryption Cambridge Security. Work. Cambridge, U. K., pp. 191-204 (1994)
3 Shannon, C. E.: Communication theory of secrecy systems. Bell System Technical Journal, vol. 28 (4), pp. 656-715 (1949)   DOI
4 Palagushin, V., and Khomonenko, A. D.: Evaluation of cryptographic primitives security based on proximity to the latin square. In Proceeding of the IEEE 18th conference of fruct association, pp. 266-271(2016)
5 S. Manku, S., and Vasanth, K.: Blowfish encryption algorithm for information security. ARPN Journal of Engineering and Applied Sciences, vol. 10(10), pp. 4717-4719 (2015)
6 Nie, T., and Zhang, T.: A study of DES and Blowfish encryption algorithm. In Proceedings of 10th IEEE Region Annual International Conference TENCON, pp. 1-4 (2009)
7 Mushtaq, M. F., Jamel, S. , Mohamad, K. M. , .Khalid, S. A. A., and Deris, M. M.: Key generation technique based on triangular coordinate extraction for hybrid cubes. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. (3-4), pp. 195-200 (2017)
8 Mel, H. X., and Baker. D. M.: Cryptography decrypted. Addison-Wesley (2001)
9 William, E. B., Barker, C.: Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST Special Publication 800-67 (2012)
10 Silva, N. B. F., Pigatto, D. F., Martins, P. S., and Branco, K. R. L. J. C.: Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general-purpose computer. Journal of Network and Computer Applications, vol. 60, pp. 130-143 (2016)   DOI
11 Alshahrani, A. M., and Walker, S.: Implement a novel symmetric block cipher algorithm. International Journal on Cryptography and Information Security, vol. 4 (4), pp. 1-11 (2014)   DOI
12 Smid M. E., and Branstad D. K.: Data Encryption Standard: past and future. In Proceedings of the IEEE, vol. 76 (5), pp. 550-559 (1988)   DOI
13 Dworkin, M.: Recommendation for block cipher modes of operation, NIST Spec. Publ. 800-38B, (2005)
14 Burnett, S., and Paine, S. : RSA Security's Official Guide to Cryptography.McGraw-Hill (2001)
15 Salama, D., Minaam, A., Abdual-kader, H. M, and Hadhoud, M. M.: Evaluating the effects of symmetric cryptography algorithms on power consumption for different data types. International Journal of Network Security, vol. 11(2), pp. 78-87 (2010)
16 Disina, A. H., Jamel, S., Pindar, Z. A., and Deris M. M.: All-or-nothing key derivation function based on quasigroup string. In proceeding of IEEE International Conference on Information Science and Security (ICISS), pp. 6-10 (2016)
17 Disina, A. H., Jamel, S. , Aamir, M., Pindar, Z. A., Deris M. M., and Mohamad, K. M.: A key scheduling algorithm based on dynamic quasigroup string transformation and All-Or-Nothing key derivation function. Journal of Telecommunication, Electronic and Computer Engineering, vol. 9 (3-5), pp. 1-6 (2017)
18 Nechvatal, J., Barker, E., Bassham, L., Burr, W., Dworkin, M., Foti, J., and Roback, E.: Report on the development of the advanced encryption standard (AES). National Institute of Standards and Technology, pp. 1-116 (2000)
19 N. I. of S. and T. NIST: Data Encryption Standard (DES). Federal Information Processing Standards Publication (FIPS PUB 46-3), vol. 25(10), pp. 1-22 (1999)
20 Schneier, B.: Description of a new variable-length key, 64- bit block cipher (Blowfish). In Proceedings of the Fast Software Encryption: Cambridge Security Workshop Cambridge, U. K., pp. 191-204 (1994)
21 Jamel, S., Deris, M. M., Yanto, I. T. R., and Herawan, T.: The hybrid cubes encryption algorithm (HiSea). Communications in Computer and Information Science, Springer-Verlag Berlin Heidelberg, vol. 154, pp. 191-200 (2011)
22 Sasi, S. B., Sivanandam, N., and Emeritus, : A survey on cryptography using optimization algorithms in WSNs. Indian Journal of Science and Technology, vol. 8(3), pp. 216-221 (2015)   DOI
23 Jamel, S.: The hybrid cubes encryption algorithm (HiSea). Ph.D Thesis, Univ. Tun Hussein Onn Malaysia (UTHM), Johor, Malaysia, pp. 1-138 (2012)
24 Ahmad, S., Alam, K. M. R., Rahman, H., and Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In Proceedings of the IEEE International Conference on Networking Systems and Security (2015)
25 Kaushik, A., Barnela M., and Kumar, A.: Keyless user defined optimal security encryption. International Journal of Computer and Electrical Engineering, vol. 4 (2), pp. 2-6 (2012)
26 Goldwasser, S. and Bellare, M. Lecture Notes on Cryptography, Cambridge, Massachusetts (2008)
27 Stallings, W.: Cryptography and network security: principles and practices. Prentice Hall, (2005)
28 Nadeem, A. and Javed, M. Y.: A performance comparison of data encryption algorithms. International Conference on Information and Communication Technologies, pp. 84-89, 2005
29 Patil, P., Narayankar, P., Narayan, D. G., and Meena, S. M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In Procedia Computer Science, vol. 78, pp.617-624 (2016)   DOI
30 Fujisaki, E. and Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. Journal of Cryptology, vol. 26 (1), pp. 80-101 (2013)   DOI
31 Daemen, J., Rijmen, V., and Leuven, K. U.: AES Proposal: Rijndael. (NIST), National Institute of Standards, (1999)
32 Mandal, K., Parakash, C., and Tiwari, A.: Performance evaluation of cryptographic algorithms: DES and AES. In Proceeding of the IEEE Students' Conference on Electrical, Electronics and Computer Science: Innovation for Humanity (SCEECS), (2012)
33 Escala, A., Herold, G., and Rafols, C.: An algebraic framework for Diffie-Hellman assumptions. Journal of Cryptology (2015)
34 Jorstad N., and Landgrave.: Cryptographic algorithm metrics. In 20th National Information Systems Security (1997)
35 Hercigonja, Z., Gimnazija, D., and Varazdin, C.: Comparative analysis of cryptographic algorithms and advanced cryptographic algorithms. International Journal of Digital Technology & Economy, vol. 1(2), pp. 1-8 (2016)
36 Maqsood, F., Ali, M. M., Ahmed, M., and Shah, M. A.: Cryptography: A comparative analysis for modern techniques. International Journal of Advanced Computer Science and Applications, vol. 8(6), pp. 442-448 (2017)
37 Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th ed. Prentice Hall Press (2010)
38 Stallings, W.: The RC4 stream encryption algorithm. In Cryptography and network security, 2005.
39 Kumar, N., and P. Chaudhary, P.: Performance evaluation of encryption/decryption mechanisms to enhance data security. Indian Journal of Science and Technology, vol. 9(20), pp.1-10 (2016)
40 Jamel, S. H. and Deris, M. M.: Diffusive primitives in the design of modern cryptographic algorithms. In proceedings of the International Conference on Computer and Communication Engineering (ICCCE08): Global Links for Human Development, pp. 707-710 (2008)
41 Ebrahim, M., Khan, S., and bin Khalid U.: Symmetric algorithm survey: A comparative analysis. International Journal of Computer Applications, vol. 61(20), pp. 12-19, (2013)
42 Disina, A. H., Pindar, Z. A., and Jamel, S.: Enhanced Caeser cipher to exclude repetition and withstand frequency cryptanalysis. Journal of Network and Information Security, (2015)
43 Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., and Ullah, A.: Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, vol. 8(10), pp. 183-195 (2017)