Message Encryption Using Deceptive Text and Randomized Hashing
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and an encrypted special index file to message receiver.The original message is embedded in the meaningful deceptive text.The positions of the characters of the plain text in the deceptive text are stored in the index file.The receiver decrypts the index file and gets back the original message from the received deceptive text. Authentication is achieved by verifying the hash value of the plaintext created by the Message Digest Algorithm at the receiver side.In order to prevent collision attcks on hashing algorithms that are intended for use with standard digital signature algorithms we provide an extra layer of security using randomized hashing method.
Authors and Affiliations
VAMSIKRISHNA YENIKAPATI , B. POORNA SATYANARAYANA
Performance Evaluation of Requirements Engineering Methodology for Automated Detection of Non Functional Requirements
Requirement Engineering (RE) deals with the requirements of a proposed solution and handles conflicting requirements of the various stakeholders and is critical to the success of a project. Good requirement engineering m...
Output Regulation of the Tigan System
This paper solves the problem of regulating the output of the Tigan system (2008), which is one of the recently discovered three-dimensional chaotic attractors. Tigan system has many interesting complex dynamical behavio...
A Study on Similarity Computations in Template Matching Technique for Identity Verification
This paper describes a study on the development of a human face verification system by merely using template matching (TM) as the main verification engine. In contrast to common face recognition techniques, our approach...
INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS
Cloud computing is an emerging technology that access emote servers through Internet to maintain data and pplications. It incorporates the advantages of grid and utility omputing. This paper expresses the mportance o...
Spectrum Sharing in a Long Term Spectrum Strategy via Cognitive Radio for Heterogeneous Wireless Networks
In this paper, Spectrum sharing technique among service providers to share the licensed spectrum of the licensed service providers for Heterogeneous wireless networks in a dynamic manner is proposed. Here, we could analy...