Skip to main content
Top
Published in: Wireless Personal Communications 1/2020

17-12-2019

Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm

Authors: R. Geetha, T. Padmavathy, T. Thilagam, A. Lallithasree

Published in: Wireless Personal Communications | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India. Here we use Tamil language for encrypting the text named as Tamilian Cryptography. Since Tamil language has 247 characters it is very difficult to crack the message. The message to be encrypted is translated to Tamil language, this translated text is then mapped to a randomly generated 2-bit combination of English alphabets. The result of this process is called intermediate cipher (inter cipher). This is an hybrid algorithm since the inter cipher is encrypted using Advanced Encryption Standard algorithm to enhance the confidentiality of the text. Since the Tamilian Cryptography makes use of three phases namely Translation, Mapping and Encryption, it makes the data much more secure than the existing algorithms like blowfish and Data Encryption Standard (DES) and also the person who tries to decrypt must have the knowledge of Tamil language as well the mapping details to see the original data and This algorithm exhibits stronger avalanche effect of 95% which is greater than blowfish and DES. The evaluation of the proposed algorithm shows that it executes faster and has comparatively lesser encryption time, less memory overhead.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sapkal, K., & Shrawankar, U. (2016). Transliteration of secured SMS to Indian regional language. Procedia Computer Science,78, 748–755.CrossRef Sapkal, K., & Shrawankar, U. (2016). Transliteration of secured SMS to Indian regional language. Procedia Computer Science,78, 748–755.CrossRef
2.
go back to reference Jing, X., Hao, Y., Fei, H., & Li, Z. (2012). Text encryption algorithm based on natural language processing. ACM Digital library, pp. 670–672. Jing, X., Hao, Y., Fei, H., & Li, Z. (2012). Text encryption algorithm based on natural language processing. ACM Digital library, pp. 670–672.
4.
go back to reference Baskar, C., Balasubramani, C., & Manivannan, D. (2016). Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Computer Science,78, 165–171.CrossRef Baskar, C., Balasubramani, C., & Manivannan, D. (2016). Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Computer Science,78, 165–171.CrossRef
8.
go back to reference Nagarhalli, T. P., Bakal, J. W., & Jain, N. (2016). A survey of Hindi text steganography. International Journal of Scientific & Engineering Research,7, 55–61. Nagarhalli, T. P., Bakal, J. W., & Jain, N. (2016). A survey of Hindi text steganography. International Journal of Scientific & Engineering Research,7, 55–61.
11.
go back to reference Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science,46, 524–531.CrossRef Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science,46, 524–531.CrossRef
15.
go back to reference Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology,10, 167–171.CrossRef Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology,10, 167–171.CrossRef
Metadata
Title
Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
Authors
R. Geetha
T. Padmavathy
T. Thilagam
A. Lallithasree
Publication date
17-12-2019
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-07013-6

Other articles of this Issue 1/2020

Wireless Personal Communications 1/2020 Go to the issue