Proposal for Scrambled Method based on NTRU
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 8
Abstract
Scrambling is widely used to protect the security of data files such as text, image, video or audio files; however, it is not the most efficient method to protect the security of the data files. This article uses NTRU public key cryptosystem to increase the robustness of scrambling of sound files. In this work, we convert the sound file into text, and then scramble it in the following way: first, we encrypt the header of the sound file then, scramble the data of the file after the header in three stages. In each stage we scramble the data of the sound file and keep the original order of data in an array then, the three arrays are encrypted by the sender and sent with the encrypted header to the receiver in one file, while the scrambled data of the sound file is sent to the receiver in another file. We have tested the proposed method on several sound files; the results show that the time of encryption and decryption is reduced to approximately one-third, or less, compared to encrypting the file using NTRU.
Authors and Affiliations
Ahmed Sadiq, Najlaa Hussein, Suha Abdul Khoja
An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System
Characteristics of the mobile ad-hoc networks such as nodes high mobility and limited energy are regarded as the routing challenges in these networks. OLSR protocol is one of the routing protocols in mobile ad hoc networ...
Requirements Analysis through Viewpoints Oriented Requirements Model (VORD)
This paper describes an extension to the Viewpoints Oriented Requirements Definition (VORD) model and attempts to resolve its lack of direct support for viewpoint interaction. Supporting the viewpoint interac...
A GRASP-based Solution Construction Approach for the Multi-Vehicle Profitable Pickup and Delivery Problem
With the advancement of e-commerce and Internet shopping, the high competition between carriers has made many companies rethink their service mechanisms to customers, in order to ensure that they stay competitive in the...
BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra
New terms such as closest vector problem (CVP) and the shortest vector problem (SVP), which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain...
Enhanced Random Early Detection using Responsive Congestion Indicators
Random Early Detection (RED) is an Active Queue Management (AQM) method proposed in the early 1990s to reduce the effects of network congestion on the router buffer. Although various AQM methods have extended RED to enha...