International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 6, Issue - 24, May 2016
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Block based text data partition with RC4 encryption for text data security

Rajni Tiwari and Amit Sinhal

Abstract

There are several different encryption standards along with different mechanism are used for text data security. In this paper an efficient text data encryption technique has been proposed based on RC4. In this approach the text is divided into different blocks according to the block division mechanism. The block division is based on the number of bytes. Then the divided block is encrypted with RC4 and then each block is converted into an image and sends to the receiver. The receiver received the images and applied different keys. The numbers of keys are depending on the block. If the block is five then the receiver will apply the five keys for the data decrypted and then join the images by the join key. The results are compared by the histogram, key size, number of blocks, key length and number of keys. The results of our approach are efficient in terms of enhancing security by block division, number of keys and key size.

Keyword

RC4, Block division, Histogram, Number of keys, Key size.

Cite this article

Refference

[1][1]Stoneburner G, Goguen AY, Feringa A. Sp 800-30. Risk management guide for information technology systems. 2002.

[2][2]Steve E. An Introduction to information system risk management.2007.

[3][3]Rahman MA, Al-Shaer E. A declarative approach for modeling and verification of network access control policies. 12th IM 2011.

[4][4]Jaquith A. Security metrics: replacing fear. Uncertainty and Doubt. Addison Wesley; 2007.

[5][5]Noel S, Jajodia S, O Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In proceedings of annual computer security applications conference 2003 (pp. 86-95). IEEE.

[6][6]Ou X, Govindavajhala S, Appel AW. MulVAL: a logic-based network security analyzer. In USENIX security 2005.

[7][7]Zaidan BB, Zaidan AA, Al-Frajat AK, Jalab HA. On the differences between hiding information and cryptography techniques: An overview. Journal of Applied Sciences. 2010; 10:1650-5.

[8][8]Singh A, Gilhotra R. Data security using private key encryption system based on arithmetic coding. International Journal of Network Security & its Applications. 2011; 3(3):58-67.

[9][9]Kumar MK, Azam SM, Rasool S. Efficient digital encryption algorithm based on matrix scrambling technique. International Journal of Network Security & Its Applications. 2010; 2(4): 30-41.

[10][10]Lakhtaria KI. Protecting computer network with encryption technique: a study. In ubiquitous computing and multimedia applications 2011(pp. 381-90). Springer Berlin Heidelberg.

[11][11]Raviraj P, Sanavullah MY. The modified 2D-haar wavelet transformation in image compression. Middle-East Journal of Scientific Research. 2007; 2(2):73-8.

[12][12]Blackedge JM, Ahmed M, Farooq O. Chaiotic image encryption algorithm based on frequency domain scrambling. School of Electrical Engineering Systems Articles, Dublin Institute of Technology. 2010.

[13][13]Kharate GK, Ghatol AA, Rege PP. Image compression using wavelet packet tree. ICGST-GVIP Journal. 2005; 5(7):37-40.

[14][14]Walnut DF. An introduction to wavelet analysis. Springer Science & Business Media; 2013.

[15][15]Ahmad M, Alam MS. A new algorithm of encryption and decryption of images using chaotic mapping. International Journal on Computer Science and Engineering. 2009; 2(1):46-50.

[16][16]Bao L, Zhou Y, Chen CP, Liu H. A new chaotic system for image encryption. In international conference on system science and engineering, 2012 (pp. 69-73). IEEE.

[17][17]Abusukhon A, Talib M. A novel network security algorithm based on Private Key Encryption. In 2012 international conference on cyber security, cyber warfare and digital forensic (CyberSec) 2012 (pp. 33-7). IEEE.

[18][18]Zhang J, Chen Z, Xu M. On the security of ID-based multi-receiver threshold signcryption scheme. In international conference on consumer electronics, communications and networks (CECNet) 2012 (pp. 1944-8). IEEE.

[19][19]Paul A, Das N, Prusty AK. An advanced gray image encryption scheme by using discrete logarithm with logistic and HEH64 chaotic functions. In IEEE 3rd international advance computing conference (IACC) 2013 (pp. 1114-20). IEEE.

[20][20]Rahman MA, Al-Shaer E. A formal approach for network security management based on qualitative risk analysis. In international symposium on integrated network management 2013 (pp. 244-51). IEEE.

[21][21]Ramaiya MK, Hemrajani N, Saxena AK. Improvisation of security aspect in steganography applying DES. In international conference on communication systems and network technologies (CSNT) 2013 (pp. 431-6). IEEE.

[22][22]Ahirwal R, Jain A, Jain YK. Signcryption scheme that utilizes elliptic curve for both encryption and signature generation. International Journal of Computer Applications. 2013; 62(9): 41-8.

[23][23]Rivest R. RSA Security response to weaknesses in key scheduling algorithm of RC4. Technical note, RSA Data Security, Inc. 2001.

[24][24]Ren W, Miao Z. A hybrid encryption algorithm based on DES and RSA in Bluetooth communication. In second international conference on modeling, simulation and visualization methods (WMSVM) 2010 (pp. 221-5). IEEE.

[25][25]Li X, Chen J, Qin D, Wan W. Research and Realization based on hybrid encryption algorithm of improved AES and ECC. In international conference on audio language and image processing (ICALIP) 2010 (pp. 396-400). IEEE.

[26][26]Chen Y, Chen H, Chen H, Cheng X. Research on data encryption techniques for distributed interactive simulation network. In Computer Application and System Modeling (ICCASM), 2010 International conference on 2010 (pp. 676-9). IEEE.

[27][27]Xu E, Shao L, Cao G, Ren Y, Qu T. A new method of information encryption. In ISECS international colloquium on computing, communication, control, and management 2009 (pp. 583-6). IEEE.