Skip to main content
Erschienen in: Service Oriented Computing and Applications 1/2019

26.11.2018 | Special Issue Paper

Intelligent security algorithm for UNICODE data privacy and security in IOT

verfasst von: Balajee Maram, J. M. Gnanasekar, Gunasekaran Manogaran, M. Balaanand

Erschienen in: Service Oriented Computing and Applications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Stallings W (2004) Network security essentials (applications and standards). Pearson Education, London, pp 2–80 Stallings W (2004) Network security essentials (applications and standards). Pearson Education, London, pp 2–80
2.
Zurück zum Zitat Pfleeger CP, Pfleeger SL (2004) Security in computing. Pearson Education, London, pp 642–666MATH Pfleeger CP, Pfleeger SL (2004) Security in computing. Pearson Education, London, pp 642–666MATH
3.
Zurück zum Zitat Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society
4.
Zurück zum Zitat Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application
5.
Zurück zum Zitat Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation
7.
Zurück zum Zitat Hussain I, Shah T, Mahmood H, Afzal M (2010) Comparative analysis of S-boxes based on graphical SAC. Int J Comput Appl 2(5):1–7 Hussain I, Shah T, Mahmood H, Afzal M (2010) Comparative analysis of S-boxes based on graphical SAC. Int J Comput Appl 2(5):1–7
8.
Zurück zum Zitat Ahmed N (2015) Testing an S-box for cryptographic use. Int J Comput Electr Eng 8:1–5 Ahmed N (2015) Testing an S-box for cryptographic use. Int J Comput Electr Eng 8:1–5
9.
Zurück zum Zitat Mroczkowski P (2009) Generating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphers. J Telecommun Inf Technol 2:74–79 Mroczkowski P (2009) Generating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphers. J Telecommun Inf Technol 2:74–79
10.
Zurück zum Zitat Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397 Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397
11.
Zurück zum Zitat Shirali-Shahreza H, Shirali-Shahreza M (2008) Steganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection characters. J Theor Appl Inf Technol 4(8):682–687 Shirali-Shahreza H, Shirali-Shahreza M (2008) Steganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection characters. J Theor Appl Inf Technol 4(8):682–687
12.
Zurück zum Zitat Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075–1082CrossRef Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075–1082CrossRef
14.
Zurück zum Zitat Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23–34MathSciNetMATH Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23–34MathSciNetMATH
15.
Zurück zum Zitat Aldabbagh SSM, Al Shaikhli IFT, Zaba MR (2014) Key-dependent S-box in lightweight block ciphers. J Theor Appl Inf Technol 62(2):554 Aldabbagh SSM, Al Shaikhli IFT, Zaba MR (2014) Key-dependent S-box in lightweight block ciphers. J Theor Appl Inf Technol 62(2):554
16.
Zurück zum Zitat Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952 Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952
18.
Zurück zum Zitat Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011) Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011)
19.
Zurück zum Zitat Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085 Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085
20.
Zurück zum Zitat Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version) Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version)
21.
Zurück zum Zitat Ramanujam S, Karuppiah M (2011) Designing an algorithm with high avalanche effect. IJCSNS Int J Comput Sci Netw Secur 11(1):106 Ramanujam S, Karuppiah M (2011) Designing an algorithm with high avalanche effect. IJCSNS Int J Comput Sci Netw Secur 11(1):106
22.
Zurück zum Zitat Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153 Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153
23.
Zurück zum Zitat Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562 Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562
24.
Zurück zum Zitat Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343 Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343
25.
Zurück zum Zitat Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646 Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646
26.
Zurück zum Zitat Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE
27.
Zurück zum Zitat Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6 Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6
28.
Zurück zum Zitat Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616 Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616
29.
Zurück zum Zitat Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602 Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602
30.
Zurück zum Zitat Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630 Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630
31.
32.
Zurück zum Zitat Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE
35.
Zurück zum Zitat Balajee Maram K, Gnanasekar JM (2016) UNICODE text security using dynamic and key-dependent 16X16 S-Box. Austr J Basic Appl Sci 10(1):26–36 Balajee Maram K, Gnanasekar JM (2016) UNICODE text security using dynamic and key-dependent 16X16 S-Box. Austr J Basic Appl Sci 10(1):26–36
36.
Zurück zum Zitat Abdel-Basset M, El-Shahat D, Mirjalili S (2018) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Gener Comput Syst 85:129–145CrossRef Abdel-Basset M, El-Shahat D, Mirjalili S (2018) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Gener Comput Syst 85:129–145CrossRef
37.
Zurück zum Zitat Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16 Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16
39.
Zurück zum Zitat Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22 Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22
40.
Zurück zum Zitat Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11 Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11
41.
Zurück zum Zitat Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst
42.
Zurück zum Zitat Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24 Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24
43.
Zurück zum Zitat Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst
44.
Zurück zum Zitat Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515 Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515
45.
Zurück zum Zitat Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE
Metadaten
Titel
Intelligent security algorithm for UNICODE data privacy and security in IOT
verfasst von
Balajee Maram
J. M. Gnanasekar
Gunasekaran Manogaran
M. Balaanand
Publikationsdatum
26.11.2018
Verlag
Springer London
Erschienen in
Service Oriented Computing and Applications / Ausgabe 1/2019
Print ISSN: 1863-2386
Elektronische ISSN: 1863-2394
DOI
https://doi.org/10.1007/s11761-018-0249-x

Weitere Artikel der Ausgabe 1/2019

Service Oriented Computing and Applications 1/2019 Zur Ausgabe

Premium Partner