Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 9
Abstract
Cryptography and cryptanalysis are in ever-lasting struggle. As the encryption techniques advance, the cryptanalysis techniques advance as well. To properly face the great danger of the cryptanalysis techniques, we should diligently look for more effective encryption techniques. These techniques must properly handle any weaknesses that may be exploited by hacking tools. We address this problem by proposing an innovative encryption technique. Our technique has unique features that make it different from the other standard encryption methods. Our method advocates the use of dynamic substitution and tricky manipulation operations that introduce tremendous confusion and diffusion to ciphertext. All this is augmented with an effective key expansion that not only allows for implicit embedment of the key in all of the encryption steps but also produces very different versions of this key. Experiments with our proof-of-concept prototype showed that our method is effective and passes very important security tests.
Authors and Affiliations
Muhammed Jassem Al-Muhammed
Implementation of Forward Chaining and Certainty Factor Method on Android-Based Expert System of Tomato Diseases Identification
Plant disease is one of the reasons that cause the destruction of plant. It affects plant productivity and quality. Most of the farmers made mistake in cope with this problem because of the lack of knowledge. Expert syst...
Effective Strategies for ROI and Image Matching
The paper presents an exceptional four matching strategies: systematic, random, gradient and simulated annealing using diferent metrics. We consider two kinds of image matching algorithms. The first one oriented on the w...
Phishing Websites Classification using Hybrid SVM and KNN Approach
Phishing is a potential web threat that includes mimicking official websites to trick users by stealing their important information such as username and password related to financial systems. The attackers use social eng...
Prediction by a Hybrid of Wavelet Transform and Long-Short-Term-Memory Neural Network
Data originating from some specific fields, for in-stance tourist arrivals, may exhibit a high degree of fluctuations as well as non-linear characteristics due to time varying behaviors. This paper proposes a new hybrid...
Automatic Detection of Omega Signals Captured by the Poynting Flux Analyzer (PFX) on Board the Akebono Satellite
The Akebono satellite was launched in 1989 to observe the Earth’s magnetosphere and plasmasphere. Omega was a navigation system with 8 ground stations transmitter and had transmission pattern that repeats every 10 s. Fro...