(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Computer Research (IJACR)

ISSN (Print):2249-7277    ISSN (Online):2277-7970
Volume-6 Issue-24 May-2016
Full-Text PDF
DOI:10.19101/IJACR.2016.624019
Paper Title : Block based text data partition with RC4 encryption for text data security
Author Name : Rajni Tiwari and Amit Sinhal
Abstract :

There are several different encryption standards along with different mechanism are used for text data security. In this paper an efficient text data encryption technique has been proposed based on RC4. In this approach the text is divided into different blocks according to the block division mechanism. The block division is based on the number of bytes. Then the divided block is encrypted with RC4 and then each block is converted into an image and sends to the receiver. The receiver received the images and applied different keys. The numbers of keys are depending on the block. If the block is five then the receiver will apply the five keys for the data decrypted and then join the images by the join key. The results are compared by the histogram, key size, number of blocks, key length and number of keys. The results of our approach are efficient in terms of enhancing security by block division, number of keys and key size.

Keywords : RC4, Block division, Histogram, Number of keys, Key size.
Cite this article : Rajni Tiwari and Amit Sinhal, " Block based text data partition with RC4 encryption for text data security " , International Journal of Advanced Computer Research (IJACR), Volume-6, Issue-24, May-2016 ,pp.107-113.DOI:10.19101/IJACR.2016.624019
References :
[1]Stoneburner G, Goguen AY, Feringa A. Sp 800-30. Risk management guide for information technology systems. 2002.
[Google Scholar]
[2]Steve E. An Introduction to information system risk management.2007.
[Google Scholar]
[3]Rahman MA, Al-Shaer E. A declarative approach for modeling and verification of network access control policies. 12th IM 2011.
[Google Scholar]
[4]Jaquith A. Security metrics: replacing fear. Uncertainty and Doubt. Addison Wesley; 2007.
[Google Scholar]
[5]Noel S, Jajodia S, O Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In proceedings of annual computer security applications conference 2003 (pp. 86-95). IEEE.
[Crossref] [Google Scholar]
[6]Ou X, Govindavajhala S, Appel AW. MulVAL: a logic-based network security analyzer. In USENIX security 2005.
[Google Scholar]
[7]Zaidan BB, Zaidan AA, Al-Frajat AK, Jalab HA. On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences. 2010; 10:1650-5.
[Crossref] [Google Scholar]
[8]Singh A, Gilhotra R. Data security using private key encryption system based on arithmetic coding. International Journal of Network Security & its Applications. 2011; 3(3):58-67.
[Google Scholar]
[9]Kumar MK, Azam SM, Rasool S. Efficient digital encryption algorithm based on matrix scrambling technique. International Journal of Network Security & Its Applications. 2010; 2(4): 30-41.
[Crossref] [Google Scholar]
[10]Lakhtaria KI. Protecting computer network with encryption technique: a study. In ubiquitous computing and multimedia applications 2011(pp. 381-90). Springer Berlin Heidelberg.
[Crossref] [Google Scholar]
[11]Raviraj P, Sanavullah MY. The modified 2D-haar wavelet transformation in image compression. Middle-East Journal of Scientific Research. 2007; 2(2):73-8.
[Google Scholar]
[12]Blackedge JM, Ahmed M, Farooq O. Chaiotic image encryption algorithm based on frequency domain scrambling. School of Electrical Engineering Systems Articles, Dublin Institute of Technology. 2010.
[Google Scholar]
[13]Kharate GK, Ghatol AA, Rege PP. Image compression using wavelet packet tree. ICGST-GVIP Journal. 2005; 5(7):37-40.
[Google Scholar]
[14]Walnut DF. An introduction to wavelet analysis. Springer Science & Business Media; 2013.
[Google Scholar]
[15]Ahmad M, Alam MS. A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering. 2009; 2(1):46-50.
[Google Scholar]
[16]Bao L, Zhou Y, Chen CP, Liu H. A new chaotic system for image encryption. In international conference on system science and engineering, 2012 (pp. 69-73). IEEE.
[Crossref] [Google Scholar]
[17]Abusukhon A, Talib M. A novel network security algorithm based on Private Key Encryption. In 2012 international conference on cyber security, cyber warfare and digital forensic (CyberSec) 2012 (pp. 33-7). IEEE.
[Crossref] [Google Scholar]
[18]Zhang J, Chen Z, Xu M. On the security of ID-based multi-receiver threshold signcryption scheme. In international conference on consumer electronics, communications and networks (CECNet) 2012 (pp. 1944-8). IEEE.
[Crossref] [Google Scholar]
[19]Paul A, Das N, Prusty AK. An advanced gray image encryption scheme by using discrete logarithm with logistic and HEH64 chaotic functions. In IEEE 3rd international advance computing conference (IACC) 2013 (pp. 1114-20). IEEE.
[Crossref] [Google Scholar]
[20]Rahman MA, Al-Shaer E. A formal approach for network security management based on qualitative risk analysis. In international symposium on integrated network management 2013 (pp. 244-51). IEEE.
[Google Scholar]
[21]Ramaiya MK, Hemrajani N, Saxena AK. Improvisation of security aspect in steganography applying DES. In international conference on communication systems and network technologies (CSNT) 2013 (pp. 431-6). IEEE.
[Crossref] [Google Scholar]
[22]Ahirwal R, Jain A, Jain YK. Signcryption scheme that utilizes elliptic curve for both encryption and signature generation. International Journal of Computer Applications. 2013; 62(9): 41-8.
[Google Scholar]
[23]Rivest R. RSA Security response to weaknesses in key scheduling algorithm of RC4. Technical note, RSA Data Security, Inc. 2001.
[Google Scholar]
[24]Ren W, Miao Z. A hybrid encryption algorithm based on DES and RSA in Bluetooth communication. In second international conference on modeling, simulation and visualization methods (WMSVM) 2010 (pp. 221-5). IEEE.
[Crossref] [Google Scholar]
[25]Li X, Chen J, Qin D, Wan W. Research and Realization based on hybrid encryption algorithm of improved AES and ECC. In international conference on audio language and image processing (ICALIP) 2010 (pp. 396-400). IEEE.
[Crossref] [Google Scholar]
[26]Chen Y, Chen H, Chen H, Cheng X. Research on data encryption techniques for distributed interactive simulation network. In Computer Application and System Modeling (ICCASM), 2010 International conference on 2010 (pp. 676-9). IEEE.
[Crossref] [Google Scholar]
[27]Xu E, Shao L, Cao G, Ren Y, Qu T. A new method of information encryption. In ISECS international colloquium on computing, communication, control, and management 2009 (pp. 583-6). IEEE.
[Crossref] [Google Scholar]