Strength of Crypto-Semantic System of Tabular Data Protection

Abstract

The strength of the crypto-semantic method (CSM) of text data protection based on the use of lexicographical systems in the form of applied linguistic corpora within the formally defined restrictions of selected spheres of applied uses has been analyzed. The levels of cryptographic strength provided by the crypto-semantic method of data protection with due regard of a cryptanalyst’s resource capabilities are determined. The conditions under which the CSM provides absolute guarantee of text data protection from confidentiality compromise are determined.

Authors and Affiliations

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar

Keywords

Related Articles

An Automatic Multiple Sclerosis Lesion Segmentation Approach based on Cellular Learning Automata

Multiple Sclerosis (MS) is a demyelinating nerve disease which for an unknown reason assumes that the immune system of the body is affected, and the immune cells begin to destroy the myelin sheath of nerve cells. In Path...

Implementation of a Hierarchical Hybrid Intrusion Detection Mechanism in Wireless Sensors Network

During the last years, Wireless Sensor Networks (WSNs) have attracted considerable attention within the scientific community. The applications based on Wireless Sensor Networks, whose areas include, agriculture, military...

Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption

This paper proposes an efficient image encryption that is based on Arnold transform (AT) and the Singular value decomposition (SVD). The proposed method employs AT on a plain image to transpose all image pixels in the p...

A Hybrid Method to Improve Forecasting Accuracy Utilizing Genetic Algorithm –An Application to the Data of Operating equipment and supplies

In industries, how to improve forecasting accuracy such as sales, shipping is an important issue. There are many researches made on this. In this paper, a hybrid method is introduced and plural methods are compared. Focu...

Universal Simplest possible PLC using Personal Computer

Need of industrial automation and control is not closed yet. PLC, the programmable logic controller as available in 2009 with all standardized possible features, discussed here concisely. This work on PLC gives a simples...

Download PDF file
  • EP ID EP123460
  • DOI 10.14569/IJACSA.2016.071025
  • Views 163
  • Downloads 0

How To Cite

Hazem (Moh'd Said) Hatamleh, Hassan Mohammad, Roba Aloglah, Saleh Alomar (2016). Strength of Crypto-Semantic System of Tabular Data Protection. International Journal of Advanced Computer Science & Applications, 7(10), 187-192. https://europub.co.uk/articles/-A-123460