Full Paper View Go Back

A Differential Computational Encryption Modeling Technique on Textual Data

Logunleko K.B.1 , Logunleko A.M.2 , Odufowora M.O.3 , Gbolagade 4 , K.A. 5

Section:Research Paper, Product Type: Journal-Paper
Vol.8 , Issue.1 , pp.81-86, Feb-2020


Online published on Feb 28, 2020


Copyright © Logunleko K.B., Logunleko A.M., Odufowora M.O., Gbolagade, K.A. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Logunleko K.B., Logunleko A.M., Odufowora M.O., Gbolagade, K.A., “A Differential Computational Encryption Modeling Technique on Textual Data,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.1, pp.81-86, 2020.

MLA Style Citation: Logunleko K.B., Logunleko A.M., Odufowora M.O., Gbolagade, K.A. "A Differential Computational Encryption Modeling Technique on Textual Data." International Journal of Scientific Research in Computer Science and Engineering 8.1 (2020): 81-86.

APA Style Citation: Logunleko K.B., Logunleko A.M., Odufowora M.O., Gbolagade, K.A., (2020). A Differential Computational Encryption Modeling Technique on Textual Data. International Journal of Scientific Research in Computer Science and Engineering, 8(1), 81-86.

BibTex Style Citation:
@article{K.B._2020,
author = {Logunleko K.B., Logunleko A.M., Odufowora M.O., Gbolagade, K.A.},
title = {A Differential Computational Encryption Modeling Technique on Textual Data},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {1},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {81-86},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1695},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=1695
TI - A Differential Computational Encryption Modeling Technique on Textual Data
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Logunleko K.B., Logunleko A.M., Odufowora M.O., Gbolagade, K.A.
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 81-86
IS - 1
VL - 8
SN - 2347-2693
ER -

129 Views    185 Downloads    66 Downloads
  
  

Abstract :
Pseudo code and encryption algorithm play a vital role in information security. The existence of information technology has drastically transformed ways of communication with one another. This development has tremendously increased the usage and ways of communication leaving behind the security consideration of what is being transmitted through a communication channel. Therefore, this research produces a technical technique of the differential computation of the encryption algorithms. The aim to be considered is the security of the encrypted data against pattern recognition attack. The research will therefore fill the gap of security threat in EB64 pseudo code as compared with the newly proposed EHB64 pseudo code. In addition, this newly concept introduced generates a symmetric key by shuffling the original key with the textual data, thus making the transformation of each character of the data better each time it is shuffled. Thus the final output of the key-based pseudo code will be stronger than the pseudo code of EB64. Therefore, the developed concept secures the data more adequately than the existing one because of the designed pattern and confusion created during the process.

Key-Words / Index Term :
Confidentiality, Integrity, PEHB64, pseudo code, Key, PEB64

References :
[1] Isnar S, Andysah P, Sumartono U , and Arpan. “Base64 Character Encoding and Decoding Modeling” International Journal of Recent Trends in Engineering & Research, Volume 02, Issue 12; [ISSN: 2455-1457], pp. 63-68, 2016.
[2] Guwalani P, Kala M, Chandrashekar R, Shinde dan J and Mane D. “Image File Security using Base-64 Algorithm,” Pooja Guwalani et al, Int.J.Computer Technology & Applications, vol. 5, no. 6, pp. 1892-1895, 2014.
[3] Nurdiyanto H,. Rahim R, and Wulan N. “Symmetric Stream Cipher using Tr iple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 12005, 2017.
[4] Baraka W, Anael S and Loserian S. “Enhanced Security Model For Mobile Banking Systems In Tanzania”. International Journal of Technology Enhancements and Emerging Engineering Research, Vol 1, Issue 4. ISSN 2347-4289, 2013.
[5] William Stallings. Network Security Essentials, application and standards. New Jersey: Prentice Hall, 2000.
[6] Gurpreet S and Supriya. “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 – 8887), Vol 67– No.19, pp 33-38, 2013.
[7] Saleh Saraireh. “A Secure Data Communication System Using Cryptography and Steganography ”. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No 3, 2013.
[8] Lockefeer L, Hubbers E and Verdult R. “Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities”,. pp. 1-40, 2010.
[9] Shashi M and Rajan M. “Comparative Analysis of Encryption Algorithms for Data Communication”, IJCST Vol.2, Issue 2, 2011.
[10] Therasa M and Poonkuzhali S. “Data Hiding Using Visual Cryptography for Secure Transmission,”International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 4, pp. 440-441, 2015.
[11] Thiagarajan K, Balasubramanian P, Padmashree J. “Encryption and decryption algorithm using algebraic matrix approach” Journal of Physics: Conference Series, J. Phys.: Conf. Ser. 1000 012148, 2018.
[12] Mohan H and Raji R (2011). "Performance Analysis of AES and MARS Encryption Algorithms".International Journal of Computer Science Issues (IJCSI), Vol. 8, issue 4, 2011.
[13] Logunleko K.B, Logunleko A.M, Akinwunmi O.O. & Lawal O.O. (2019): Security Assurance Framework for Intelligible Information Using a Customized Base64 Encryption Algorithm Proceedings of the 17th iSTEAMS Multidisciplinary Research Nexus Conference, D.S. Adegbenro ICT Polytechnic, Itori-Ewekoro, Ogun State, Nigeria, 21st – 23rd, .Pp 85-93, 2019. www.istream.net - DOI Affix-https://doi.org/10.22624/AIM/iSTEAMS-2019/V17N2P10.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation