Proposal for Two Enhanced NTRU
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 5
Abstract
Sound is very widely used in communication. In order to ensure secure communication a cryptographic data scheme is used. Secure sound is needed in many fields such as military, business, banking and electronic commerce. There is also an increasing demand for secured sound in network communication. Several symmetric and asymmetric algorithms are used for sound encryption. In this work, NTRU, the last in line public key cryptosystem is enhanced in two methods and used for encrypting sound files after converting the sound into text. In the proposed methods the message is encrypted one character at a time, since NTRU encrypts only prime numbers, thus 7 bits of each character is encrypted and the eighth bit is left without encryption. In method I NTRU algorithm is enhanced by adding the result obtained from calculating a mathematical equation of one variable to the message and then the resulted encrypted bit is fed-back and added to the next bit of the message in the next step; this procedure is repeated for the subsequent bits of the message. In method II NTRU algorithm is enhanced by adding the subsequent states of LFSR (Linear Feedback Shift Register) to the subsequent bytes of the message. The proposed methods are tested on several sound files; the results show that the proposed methods I and II maintain approximately the same original method encryption and decryption time while generating more complex encryption.
Authors and Affiliations
Ahmed Sadiq, Najlaa Hussein, Suha Raheem Khoja
TOWARDS A SEAMLESS FUTURE GENERATION NETWORK FOR HIGH SPEED WIRELESS COMMUNICATIONS
The MIMO technology towards achieving future generation broadband networks design criteria is presented. Typical next generation scenarios are investigated. The MIMO technology is integrated with the OFDM technology for...
Aggregation Operator for Assignment of Resources in Distributed Systems
In distributed processing systems it is often necessary to coordinate the allocation of shared resources that should be assigned to processes in the modality of mutual exclusion; in such cases, the order in which the sha...
Improving Image Encryption Using 3D Cat Map and Turing Machine
Security of data is of prime importance. Security is a very complex and vast topic. One of the common ways to protect this digital data from unauthorized eavesdropping is encryption. This paper introduces an improved ima...
A Gaps Approach to Access the Efficiency and Effectiveness of IT-Initiatives In Rural Areas: case study of Samalta, a village in the central Himalayan Region of India
This paper focuses on the effectiveness and efficiency of IT initiatives in rural areas where topology creates isolation to developmental activities. A village is selected for the study and information is gathered throug...
Fault Attacks Resistant Architecture for KECCAK Hash Function
The KECCAK cryptographic algorithms widely used in embedded circuits to ensure a high level of security to any systems which require hashing as the integrity checking and random number generation. One of the most efficie...