Full Paper View Go Back
Construction of Cryptographic e-Tags using Chronological Binary Transforms
Monday O. Eze1 , Chekwube G. Nwankwo2
Section:Research Paper, Product Type: Isroset-Journal
Vol.3 ,
Issue.4 , pp.13-20, Jul-2015
Online published on Sep 08, 2015
Copyright © Monday O. Eze , Chekwube G. Nwankwo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Monday O. Eze , Chekwube G. Nwankwo, “Construction of Cryptographic e-Tags using Chronological Binary Transforms,” International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.4, pp.13-20, 2015.
MLA Style Citation: Monday O. Eze , Chekwube G. Nwankwo "Construction of Cryptographic e-Tags using Chronological Binary Transforms." International Journal of Scientific Research in Computer Science and Engineering 3.4 (2015): 13-20.
APA Style Citation: Monday O. Eze , Chekwube G. Nwankwo, (2015). Construction of Cryptographic e-Tags using Chronological Binary Transforms. International Journal of Scientific Research in Computer Science and Engineering, 3(4), 13-20.
BibTex Style Citation:
@article{Eze_2015,
author = {Monday O. Eze , Chekwube G. Nwankwo},
title = {Construction of Cryptographic e-Tags using Chronological Binary Transforms},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {4},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {13-20},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=199},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=199
TI - Construction of Cryptographic e-Tags using Chronological Binary Transforms
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Monday O. Eze , Chekwube G. Nwankwo
PY - 2015
DA - 2015/09/08
PB - IJCSE, Indore, INDIA
SP - 13-20
IS - 4
VL - 3
SN - 2347-2693
ER -
Abstract :
A cryptographic tag generator is a computational algorithm designed and implemented to synthesize e-tags for system identification. Some of the digital resources that could be tagged are data files, digital images, video clips, and so on. As a best practice procedure, the tags are usually encrypted before insertion into the internal structure of the identified object, and also decrypted whenever there is a need to read the tags. This research presents a new algorithm for cryptographic tag generation using a series of chronological transformations. The dataset for the experimental run consists of 200 standard identification tags that could be applied for securing the patients’ registration data in a typical hospital information system. The scope of this research covers the synthesis of the tags cum implementation of the cryptographic system, but not the insertion of the cipher tags into the internal structure of the host media. This research is important for a number of reasons. One is that it contributes to the emerging computational field of evolving hybrid technologies that combine steganographic and cryptographic techniques in system security.
Key-Words / Index Term :
Cryptographic Tags, Computational Algorithm, Cryptographic Array, Cryptanalysis, Steganography
References :
[1] O.C. Abikoye, A.G.Akintola, and S. Ibrahim, “Design and Implementation of a Yoruba Language Cryptosystem”, Ilorin Journal of Sc. Vol 1, No. 1, 2014, pp50-60
[2] www.oxforddictionaries.com, Accessed Jul. 10, 2015.
[3] G. Durfee, “Cryptanalysis of RSA Using Algebraic and Lattice Methods”, A PhD Dissertation submitted to the Dept. of Computer Science Stanford University, June 2002..
[4] M. Ahmed, T. M. Shahriar Sazzad and M. E. Mollah, "Cryptography and State-of-the-art Techniques ", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, March 2012, pp583-586
[5] E. Mansoor, S. Khan, and U.B. Khalid. "Symmetric Algorithm Survey: A Comparative Analysis", International Journal of Computer Applications, Vol. 61, No.20, Jan. 2013 pp12-19
[6] K.T. Huang, Y.N. Lin, and J.H. Chiu. Real-time Mode Hopping of Block Cipher Algorithms for Mobile Streaming. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013, pp127-142
[7] R. Masram, V. Shahare, J. Abraham and R. Moona. Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.4, July 2014 , pp43-51
[8] P.T. Kenekayoro. One way functions and public key cryptography, African Journal of Mathematics and Computer Science Research, Vol. 4, No 6, June 2011, pp 213-216.
[9] T. Cormen, C. Leiserson, R. Rivest and C. Stein. Introduction to Algorithms (3rd Ed), The MIT Press, Massachusetts, 2009
[10] T. Hidema and K. Toshinobu. “An Expansion Algorithm for Higher Order Differential Cryptanalysis of Secret Key Ciphers “, Journal of the National Institute of Information and Communications Technology Vol.52 Nos.1/2, 2005, pp119-128
[11] F. Massacci and L. Marraro,"Logical Cryptanalysis as a SAT Problem: Encoding and Analysis of the U.S. Data Encryption Standard",Journal of Automated Reasoning Vol 24, Issue 1-2, 2000, pp165–203.
[12] H. Zodpe, P. Wani and R. Mehta. "Hardware Implementation of Algorithm for Cryptanalysis", International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, March 2013, pp7-15.
[13] K.R. Shah and B. Gambhava, "New Approach of Data Encryption Standard Algorithm", International Journal of Soft Computing and Engineering (IJSCE) Vol. 2, Issue-1, March 2012, pp322-325.
[14] N. Nithin, A. Bongale and G. P. Hegde."Image Encryption based on FEAL Algorithm", International Journal of Advances in Computer Science and Technology, Vol. 2, No.3, March 2013, pp14-20.
[15] K.Mohan, S.E.Neelakandan. "Secured Robust Video Data Hiding Using Symmetric Encryption Algorithms", International Journal of Innovative Research in Engineering & Science, Vol 6, Issue 1, Dec 2012, pp17-29.
[16] P. Garg, S. Varshney, and M. Bhardwaj. "Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm", American Journal of Networks and Communications. Vol. 4, No. 3, 2015, pp. 32-36.
[17] K. Alallayah, M. Amin, W. Abdelwahed and A. Alaa. “Applying Neural Network for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis”. The International Arab Journal of Infor. Tech. Vol. 9, No.2, March 2012, pp163-169.
[18] G. Poonam, "Cryptanalysis of SDES via Evolutionary Computation Techniques", International Journal of Computer Science and Information Security, Vol. 1, No. 1, May 2009, pp1-7
[19] D. Zhu, "Security Control in Inter-Bank Fund Transfer", Journal of Electronic Commerce Research, VOL. 3, NO. 1, 2002, pp15-22.
[20] S. Murdoch and R. Anderson."Security Protocols and Evidence: Where Many Payment Systems Fail", In Proceeding of Financial Cryptography and Data Security, Barbados, March 3-7, 2014, pp1-12
[21] B. Joshi and A. Khandelwal., "Clustering with Data Encryption in Wireless Communication: A Critical Survey", International Journal of Advanced Computer Research, Vol. 4 Number-3 Issue-16, Sep.2014, pp813-818
[22] J. Vagle, "Furtive Encryption: Power, Trust, and the Constitutional Cost of Collective Surveillance", Indiana Law Journal, Vol. 90:101, 2015, pp101-150.
[23] J. Voldman, M. L. Gray, M. Toner, and M. A. Schmidt., “A Microfabrication-Based Dynamic Array Cytometer”, Analytical Chem., 2002, 74 (16), July 10, 2002, pp 3984–3990.
[24] A. Singh and U. Jauhari, “Data Security by Preprocessing the Text with Secret Hiding”, Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.3, May 2012, pp 63-74.
[25] K. I. Rahmani, A. Arora and P. Naina. "A Crypto-Steganography: A Survey", International Journal of Advanced Computer Science and Applications(IJACSA), Vol. 5, No. 7, 2014, pp149-155.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.