Strength of Crypto-Semantic System of Tabular Data Protection

Abstract

The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres of applied uses has been analyzed. The levels of cryptographic strength provided by the crypto-semantic method of data protection with due regard of a cryptanalyst’s resource capabilities are determined. The conditions under which the CSM provides absolute guarantee of text data protection from confidentiality compromise are determined.

Authors and Affiliations

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar

Keywords

Related Articles

 Performance Analysis of MIMO-OFDM System Using Singular Value Decomposition and Water Filling Algorithm

  In this paper, MIMO is paired up with OFDM to improve the performance of wireless transmission systems. Multiple antennas are employed both at the transmitting as well as receiving ends. The performance of an OFDM...

Virtual Enterprise Network based on IPSec VPN Solutions and Management

Informational society construction can’t be realized without research and investment projects in Information and Communication Technologies (ICT). In the 21st century, all enterprises have a local area network, a virtual...

Regression Test-Selection Technique Using Component Model Based Modification: Code to Test Traceability

Regression testing is a safeguarding procedure to validate and verify adapted software, and guarantee that no errors have emerged. However, regression testing is very costly when testers need to re-execute all the test c...

Study of Cross-Platform Technologies for Data Delivery in Regional Web Surveys in the Education

Web-surveys are a popular form of collecting primary data from various studies. However, mass regional polls have their own characteristics, including the following: it is necessary to take into account various platforms...

LPA Beamformer for Tracking Nonstationary Accelerated Near-Field Sources

In this paper, a computationally very efficient algorithm for direction of arrival (DOA) as well as range parameter estimation is proposed for near-field narrowband nonstationary accelerated moving sources. The proposed...

Download PDF file
  • EP ID EP123460
  • DOI 10.14569/IJACSA.2016.071025
  • Views 151
  • Downloads 0

How To Cite

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar (2016). Strength of Crypto-Semantic System of Tabular Data Protection. International Journal of Advanced Computer Science & Applications, 7(10), 187-192. https://europub.co.uk/articles/-A-123460