Message Encryption Using Deceptive Text and Randomized Hashing
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and an encrypted special index file to message receiver.The original message is embedded in the meaningful deceptive text.The positions of the characters of the plain text in the deceptive text are stored in the index file.The receiver decrypts the index file and gets back the original message from the received deceptive text. Authentication is achieved by verifying the hash value of the plaintext created by the Message Digest Algorithm at the receiver side.In order to prevent collision attcks on hashing algorithms that are intended for use with standard digital signature algorithms we provide an extra layer of security using randomized hashing method.
Authors and Affiliations
VAMSIKRISHNA YENIKAPATI , B. POORNA SATYANARAYANA
Solution for Vehicles Noise Cancellation With Modification of LMS Adaptive Algorithm
The problems of noise cancelling systems are based on the specific characteristics of their sources. Therefore, the knowledge of each noise source should be represented prior to the excecution of the designed noise cance...
SQL Injection in Oracle An exploration of vulnerabilities
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection ca...
Results evaluation of max rule, min rule and product rule in score fusion multibiometric systems
this paper discusses about unibiometric systems, multibiometric systems, product rule, max rule and min rule of score level fusion. Score level fusion is used to generate scores of a person. Min max normalization scheme...
Image Mining using Content Based Image Retrieval System
The image depends on the Human perception and is also based on the Machine Vision System. The Image Retrieval is based on the color Histogram, texture. The perception of the Human System of Image is based on the Human Ne...
Power and Delay Aware On-Demand Routing For Ad Hoc Networks
Wide implementation of IEEE 802.11 based networks could ead to deployment of localized wireless data communication environments with a limited number of mobile hosts, called ad hoc networks. Implementation of a proper r...