Strength of Crypto-Semantic System of Tabular Data Protection

Abstract

The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres of applied uses has been analyzed. The levels of cryptographic strength provided by the crypto-semantic method of data protection with due regard of a cryptanalyst’s resource capabilities are determined. The conditions under which the CSM provides absolute guarantee of text data protection from confidentiality compromise are determined.

Authors and Affiliations

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar

Keywords

Related Articles

An Efficient Distributed Traffic Events Generator for Smart Highways

This paper deals with a spatiotemporal traffic events generator for real highway networks. The goal is to use the event generator to test real-time and batch traffic analysis applications. In this context, we represent a...

Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network

The last decade or so has witnessed a sharp rise in the growth of mobile devices. These mobile devices and wireless communication technologies enable people around the globe to instantaneously communicate with each other...

Improving and Extending Indoor Connectivity Using Relay Nodes for 60 GHz Applications

A 60 GHz wireless system can provide very high data rates. However, it has a tremendous amount of both Free Space Path Loss (FSPL) and penetration loss. To mitigate these losses and extend the system range; we propose te...

Software Architecture Solutions for the Internet of Things: A Taxonomy of Existing Solutions and Vision for the Emerging Research

Recently, Internet of Thing (IoT) systems enable an interconnection between systems, humans, and services to create an (autonomous) ecosystem of various computation-intensive things. Software architecture supports an eff...

Genetic Algorithm for Data Exchange Optimization

Dynamic architectures have emerged to be a promising implementation platform to provide flexibility, high performance, and low power consumption for computing devices. They can bring unique capabilities to computational...

Download PDF file
  • EP ID EP123460
  • DOI 10.14569/IJACSA.2016.071025
  • Views 170
  • Downloads 0

How To Cite

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar (2016). Strength of Crypto-Semantic System of Tabular Data Protection. International Journal of Advanced Computer Science & Applications, 7(10), 187-192. https://europub.co.uk/articles/-A-123460