Strength of Crypto-Semantic System of Tabular Data Protection

Abstract

The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres of applied uses has been analyzed. The levels of cryptographic strength provided by the crypto-semantic method of data protection with due regard of a cryptanalyst’s resource capabilities are determined. The conditions under which the CSM provides absolute guarantee of text data protection from confidentiality compromise are determined.

Authors and Affiliations

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar

Keywords

Related Articles

Motion Blobs as a Feature for Detection on Smoke 

Disturbance that is caused due to visual perception with the atmosphere is coined as smoke, but the major problem is to quantify the detected smoke that is made up of small particles of carbonaceous matter in the air, re...

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Detection and recognition of traffic signs in a video streams consist of two steps: the detection of signs in the road scene and the recognition of their type. We usually evaluate globally this process. This evaluated ap...

Adaptive Simulated Evolution based Approach for Cluster Optimization in Wireless Sensor Networks

Energy consumption minimization is crucial for the constrained sensors in wireless sensor networks (WSNs). Partitioning WSNs into optimal set of clusters is a promising technique utilized to minimize energy consumption a...

A Posteriori Pareto Front Diversification Using a Copula-Based Estimation of Distribution Algorithm

We propose CEDA, a Copula-based Estimation of Distribution Algorithm, to increase the size, achieve high diversity and convergence of optimal solutions for a multiobjective optimization problem. The algorithm exploits th...

OSPF vs EIGRP: A Comparative Analysis of CPU Utilization using OPNET

Routing is difficult in enterprise networks because a packet might have to traverse many intermediary nodes to reach the final destination. The selection of an appropriate routing protocol for a large network is difficul...

Download PDF file
  • EP ID EP123460
  • DOI 10.14569/IJACSA.2016.071025
  • Views 168
  • Downloads 0

How To Cite

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar (2016). Strength of Crypto-Semantic System of Tabular Data Protection. International Journal of Advanced Computer Science & Applications, 7(10), 187-192. https://europub.co.uk/articles/-A-123460