Encryption technique performed by Hill Cipher uses a square matrix calculation. The ciphertext resulted is obtained from the calculation of matrix multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before the receiver can decode the ciphertext into legible message. The listener can anytime read the key that flows to receiver. By knowing the key, the listener will absolutely break the ciphertext and turn into plaintext. Three Pass Protocol is a way to limit the key being distributed in air. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the security.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
Computers uses a file which is a collection of information. The information is sensitive part of the organizations , and can be classified into simple, important, and critical information. Any loss or threat to information can prove to be great loss to the organization as well to people. The most important goal for designing any encryption algorithm is the security against unauthorized attacks. This paper introduces a new method to enhance the performance of the (Cesar Cipher algorithm ). This is done by replacing the single key (Offsite) that used by the standard algorithm with dynamic key his value is changed for each letter depending on its position and the value of the previous letter. This replacement adds a new level of protection strength and more robustness against breaking methods. One more powerful technique added by the proposed algorithm is repeat the encryption for the entered text several times.
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTIONijcisjournal
This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the Substitution- Permutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
To enhance the security and reliability of the widely-used stream ciphers, a 2-D and a 3-D mesh-knight Algorithm Based Fault Tolerant (ABFT) schemes for stream ciphers are developed which can be universally applied to RC4 and other stream ciphers. Based on the ready-made arithmetic unit in stream ciphers, the proposed 2-D ABFT scheme is able to detect and correct any simple error, and the 3-D meshknight ABFT scheme is capable of detecting and correcting up to three errors in an n2 -data matrix with liner computation and bandwidth overhead. The proposed schemes provide one-to-one mapping between data index and check sum group so that error can be located and recovered by easier logic and simple operations.
A New Modified Version of Caser Cipher AlgorithmIJERD Editor
Computers uses a file which is a collection of information. The information is sensitive part of the organizations , and can be classified into simple, important, and critical information. Any loss or threat to information can prove to be great loss to the organization as well to people. The most important goal for designing any encryption algorithm is the security against unauthorized attacks. This paper introduces a new method to enhance the performance of the (Cesar Cipher algorithm ). This is done by replacing the single key (Offsite) that used by the standard algorithm with dynamic key his value is changed for each letter depending on its position and the value of the previous letter. This replacement adds a new level of protection strength and more robustness against breaking methods. One more powerful technique added by the proposed algorithm is repeat the encryption for the entered text several times.
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTIONijcisjournal
This paper proposes a new system of Substitution-Permutation network along with Randomization Expansion of 240 bits of input data. System uses 16 S-Boxes which are selected randomly based on the subkey values throughout 64 rounds of substitution steps. 64 sub-keys are generated during the Substitution- Permutation process. The middletext is transposed based on decimal value of the sub-key generated during the each round. A CBC mode is the best associated with this system.
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are
used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.
Client server computing in mobile environments part 2Praveen Joshi
Client server computing in mobile environments. Versatile, Message based, Modular Infrastructure intended to improve usability, flexibility, interoperability and scalability as compared to Centralized, Mainframe, time sharing computing.
Intended to reduce Network Traffic.
Communication is using RPC or SQL
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
Information And Data Security Pseudorandom Number Generation and Stream Cipher seminar
Mustansiriya University
Department of Education
Computer Science
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Geometric efficient matching algorithm for firewallseSAT Journals
Abstract Concept of Firewall is the most important thing in network and the traffic which is passing through network perimeter needs to be filtering the traffic that is going to pass through it. Thus there is potential risk in this process. As each packet needs to be checked with each firewall rule to find the matching rules. ’Geometric Efficient Matching Algorithm ‘ is one of the computational geometry algorithm which gives practically better solution for the purpose of finding the rule which exactly matches. With the help of firewall rule statistics we have generated random model of perimeter rule which is not uniform. We also reduced the space requirement up to 2-3 MB for 5000 rules. Also it solves problem of firewall misconfiguration for firewall packet matching Key Words: Network level protection and security, Network Communication.
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
Abstract Cryptography is one of the prime techniques of secured symbolic data transmission over any communication channel. Security is the most challenging and essential aspects in today’s internet and network applications. Thus, design of a secure encryption algorithm is very necessary which can protect the unauthorized attacks. An encryption algorithm is computationally secure if it cannot be intruded with the standard resources. The algorithm proposed here is graph based. Its efficiency surpasses the standard DES algorithm in general. Graphs can be used for designing block ciphers, stream ciphers or public-key ciphers. The algorithm is graph automorphism based partial symmetric key algorithm and it is not fully depended on secret key and produces different cipher text by applying same key on the same plain text. Keywords: DES, Graph Automorphism, Hamiltonian Cycle, Encryption, Decryption
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...TELKOMNIKA JOURNAL
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity
of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique
properties that can perform mathematical operations against ciphertext. This paper proposed the use of
the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the
additional properties so that it can calculate the results of voting data that has been encrypted without
having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote
tallying process by comparing the advantages and disadvantages of each algorithm.
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are
used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.
Client server computing in mobile environments part 2Praveen Joshi
Client server computing in mobile environments. Versatile, Message based, Modular Infrastructure intended to improve usability, flexibility, interoperability and scalability as compared to Centralized, Mainframe, time sharing computing.
Intended to reduce Network Traffic.
Communication is using RPC or SQL
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
Information And Data Security Pseudorandom Number Generation and Stream Cipher seminar
Mustansiriya University
Department of Education
Computer Science
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Geometric efficient matching algorithm for firewallseSAT Journals
Abstract Concept of Firewall is the most important thing in network and the traffic which is passing through network perimeter needs to be filtering the traffic that is going to pass through it. Thus there is potential risk in this process. As each packet needs to be checked with each firewall rule to find the matching rules. ’Geometric Efficient Matching Algorithm ‘ is one of the computational geometry algorithm which gives practically better solution for the purpose of finding the rule which exactly matches. With the help of firewall rule statistics we have generated random model of perimeter rule which is not uniform. We also reduced the space requirement up to 2-3 MB for 5000 rules. Also it solves problem of firewall misconfiguration for firewall packet matching Key Words: Network level protection and security, Network Communication.
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
Abstract Cryptography is one of the prime techniques of secured symbolic data transmission over any communication channel. Security is the most challenging and essential aspects in today’s internet and network applications. Thus, design of a secure encryption algorithm is very necessary which can protect the unauthorized attacks. An encryption algorithm is computationally secure if it cannot be intruded with the standard resources. The algorithm proposed here is graph based. Its efficiency surpasses the standard DES algorithm in general. Graphs can be used for designing block ciphers, stream ciphers or public-key ciphers. The algorithm is graph automorphism based partial symmetric key algorithm and it is not fully depended on secret key and produces different cipher text by applying same key on the same plain text. Keywords: DES, Graph Automorphism, Hamiltonian Cycle, Encryption, Decryption
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...TELKOMNIKA JOURNAL
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity
of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique
properties that can perform mathematical operations against ciphertext. This paper proposed the use of
the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the
additional properties so that it can calculate the results of voting data that has been encrypted without
having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote
tallying process by comparing the advantages and disadvantages of each algorithm.
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide protection of our data from unauthorized access. An effective encryption/ decryption algorithm design to enhance data security is a challenging task while computation, complexity, robustness etc. are concerned. The multiple encryption technique is a process of applying encryption over a single encryption process in a number of iteration. Elliptic Curve Cryptography (ECC) is well known and well accepted cryptographic algorithm and used in many application as of today. In this paper, we discuss multiple encryptions and analyze the computation overhead in the process and study the feasibility of practical application. In the process we use ECC as a multiple-ECC algorithm and try to analyze degree of security, encryption/decryption computation time and complexity of the algorithm. Performance measure of the algorithm is evaluated by analyzing encryption time as well as decryption time in single ECC as well as multiple-ECC are compared with the help of various examples.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key method is the key used for encryption is the same as the key used for the decryption process. Three-Pass Protocol is one of the modern cryptography where the process of sending a message does not need to distribute the key so that each party both the recipient and sender of the message does not need to know each lock. In this combination of receiving and sending messages using the Caesar Cipher algorithm for encryption and decryption, while for its delivery process using algorithms Three Pass protocol. The results from the combination of the two algorithms are to help the information sent is secure.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
Abstract— Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. Recently the bilinear pairing such as Weil Pairing or Tate Pairing on elliptic curves and hyper elliptic curves has been found various applications in cryptography. Several identity-based cryptosystems using bilinear pairings of elliptic curves or hyper elliptic curves were presented. Blind signature and ring signature are very useful to provide the user’s anonymity and the signer’s privacy. The proposed method focuses an ID-based ring signature scheme which is based on the pairings with elliptic curve cryptography. The proposed method is used to reduce the number of computation of the pairing for the verification of the id based signature and also decoding of the id based public key cryptosystems with authentication by factor of 2.
This presentation contains the contents pertaining to the undergraduate course on Cryptography and Network Security (UITC203) at Sri Ramakrishna Institute of Technology. This covers the classical cryptographic techniques that were in practice and the basic concepts behind the design of Feistel ciphers
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
Compression is an activity performed to reduce its size into smaller than earlier. Compression is created since lack of adequate storage capacity. Data compression is also needed to speed up data transmission activity between computer networks. Compression has the different rule between speed and density. Compressed compression will take longer than compression that relies on speed. Elias Delta is one of the lossless compression techniques that can compress the characters. This compression is created based on the frequency of the character of a character on a document to be compressed. It works based on bit deductions on seven or eight bits. The most common characters will have the least number of bits, while the fewest characters will have the longest number of bits. The formation of character sets serves to eliminate double characters in the calculation of the number of each character as well as for the compression table storage. It has a good level of comparison between before and after compression. The speed of compression and decompression process possessed by this method is outstanding and fast.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Three Pass Protocol Concept in Hill Cipher Encryption Technique
1. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Three-Pass Protocol Concept in Hill Cipher
Encryption Technique
Andysah Putera Utama Siahaan
Faculty of Computer Science, Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
Abstract: Hill Cipher Encryption technique has a square matrix in its calculation. The ciphertext resulted is obtained from the matrix
multiplication between plaintext and key. The reality is the sender must send or tell the receiver the key used to encrypt the data before
the receiver can decode the ciphertext into the legible message. The listener is able to read the key that flows to the receiver. By knowing
the key, the listener will absolutely break the ciphertext and turn into plaintext. Three-Pass Protocol is a way to limit the key being
distributed. The sender and receiver have their own keys in hand. They do not need to share each other. This method will improve the
security.
Keywords: Cryptography, Three-Pass Protocol, Hill Cipher, Encryption, Decryption
1. Introduction
The confidential information must be protected from being
intercepted [9]. There is a various way to perform the
encryption. Hill Cipher is one of the encryption algorithms
that uses matrix [8][7]. The smallest matrix of 2x2 can
produce the ciphertext by providing key as the determinant.
The matrix bigger than 2x2 can be used as well, but the
difficulties in finding the inverse matrix gain more too. In
Hill Cipher, we can randomly describe the integers for keys
beforehand [5][6]. However, sometimes the key provided
does not work. It happens when decoding the ciphertext
back to plaintext. It is different from the original message.
Before using the key, we have to test that it has the right
determinant. Moreover, if so, the inverse key will be applied
to the ciphertext when decryption is happening. Since we
use the key as a password to modify the message, we have to
send or give to someone who is responsible for decrypting
the message. The key must be distributed, and this moment
will be taken by third parties to intercept the known plaintext
to be breakable. Three-Pass Protocol is the best way to
reduce the gap of interception. On the application of this
algorithm, the form of the matrix must be modified. The are
several changes of Hill Cipher part to make the both
algorithms work together.
2. Theories
The symmetric key is one of the cryptographic systems that
uses the same kind of keys in encryption and decryption.
Hill Cipher uses the symmetric key in its application.
However, the keys used in encryption and decryption are
different but same. It happens because the key used in
decryption is the inverse of the original key applied when
sending plaintext to the receiver [2][3]. The both keys must
be correctly calculated for them to generate encrypt and
decrypt key pair in encryption and decryption works.
Hill Cipher is an application of modulo arithmetic in
cryptography [4]. This cryptographic technique uses the
matrix as the vessel of information exchange either on
encryption or decryption part. The basic theory of matrix
used in Hill Cipher is the multiplication between the
matrix and the inverse of the matrix. Hill Cipher is a
symmetric key hard to solve because the cryptanalysis
techniques such as frequency analysis can not be applied
easily to solve this algorithm [2]. Hill cipher is very difficult
to solve if cryptologist has only the ciphertext, but it can be
solved easily if the cryptologist has a part of the plaintext.
Figure 1:The Three-Pass Protocol scheme
Three-Pass Protocol method is a way to send a message
securely from sender to receiver without the need to
exchange or distribute encryption keys [1]. In Three-Pass
Protocol, the sender encrypts the message using a unique
encryption key then they send it to the receiving participant.
When the receiver gets the encrypted message, they then
encrypt it with their own unique encryption key and send
back to the sender. Then the sender decrypts the message
with their own key. After this, there is only one level of
encryption on the package which is sent to the receiver who
decrypts the final layer with their unique decryption key and
reads the data. This protocol can only be used if using
commutative ciphers or LIFO method. Commutative means
that the order of encryption and decryption is
interchangeable (Encryption A - Encryption B - Decryption
A - Decryption B) [4](Figure 1).
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1149
2. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
3. Proposed Work
In the application of Three-Pass Protocol in Hill Cipher, the
plaintext cannot directly transform to ciphertext and then re-
encrypt the message with the second key. If we do this when
doing the decryption, the message will not turn back to its
original message, it turns to different characters order. We
have to modify the encryption block with a square block. It
means, when we use a key of a matrix of 2 x 2, the plaintext
block will be 2 x 2 as well. It is totally different from the
usual Hill Cipher encryption that uses different matrix order.
𝐶 =
𝑎 𝑏
𝑐 𝑑
𝑥
𝑝1 𝑝3
𝑝2 𝑝4
𝑚𝑜𝑑 𝑇𝑜𝑡𝑎𝑙𝐶ℎ𝑎𝑟𝑎𝑐𝑡𝑒𝑟 (1)
𝐷 =
𝑎 𝑏
𝑐 𝑑
−1
𝑥
𝑐1 𝑐3
𝑐2 𝑐4
𝑚𝑜𝑑 𝑇𝑜𝑡𝑎𝑙𝐶ℎ𝑎𝑟𝑎𝑐𝑡𝑒𝑟 (2)
From the formulas above, the encryption and decryption are
using the same blocks with the key.
4. Testing and Implementation
In this section, we try to prove the Three-Pass Protocol.
Let’s take an example below:
Plaintext : ANDY
65 68
78 89
Key 1 :
240 97
65 163
Key 2 :
187 23
148 223
Key 1-1
:
205 145
113 16
Key 2-1
:
55 209
76 115
Now we prove that the keys provided are invertible.
Key 1 :
240 97
65 163
Determinant : (240 * 163 - 97 * 65)mod 256
47 (D ≠ 0and D ≠ Even)
Key 2 :
187 23
148 223
Determinant : (187 * 223 - 23 * 148) mod 256
153 (D ≠ 0 and D ≠ Even)
Since determinants are not zero or even, we can use the key
pair as keys for Hill Cipher.
Encryption 1
Plaintext :
65 68
78 89
Ciphertext 1 :
240 97
65 163
x
65 68
78 89
C1 : (240 * 65 + 97 * 78) mod 256
23166 mod 256
126
C2 : (65 * 65 + 163 * 78) mod 256
16939 mod 256
43
C3 : (240 * 68 + 97 * 89) mod 256
24953 mod 256
121
C4 : (65 * 68 + 163 * 89) mod 256
18927 mod 256
239
Ciphertext 1 :
126 121
43 239
𝑇
Ciphertext 1T
:
126 43
121 239
Encryption 2
Ciphertext 1T
:
126 43
121 239
Ciphertext 2 :
187 23
148 223
x
126 43
121 239
C1 : (187 * 126 + 23 * 121) mod 256
26345mod 256
233
C2 : (148 * 126 + 223 * 121) mod 256
45631mod 256
63
C3 : (187 * 43 + 23 * 239) mod 256
13538mod 256
226
C4 : (148 * 43 + 223 * 239) mod 256
59661mod 256
13
Ciphertext 2 :
233 226
63 13
𝑇
Ciphertext 2T
:
233 63
226 13
Ciphertext 2T
is the final result of the encryption the both
methods. And for the decryption, we do the same way as
easrlier. We see the explanation below:
Decryption 1
Ciphertext 2T
:
233 63
226 13
Ciphertext 3
205 145
113 16
x
233 63
226 13
C1 : (205 * 233 + 145 * 226) mod 256
80535mod 256
151
C2 : (113 * 233 + 16 * 226) mod 256
29945mod 256
249
C3 : (205 * 63 + 145 * 13) mod 256
14800mod 256
208
C4 : (113 * 63 + 16 * 13) mod 256
7327mod 256
159
Ciphertext 3 :
151 208
249 159
𝑇
Ciphertext 3T
:
151 249
208 159
Decryption 2
Ciphertext 3T
:
151 249
208 159
Plaintext :
55 209
76 115
x
151 249
208 159
P1 : (55 * 151 + 209 * 208) mod 256
51777 mod 256
65
P2 : (76 * 151 + 115 * 208) mod 256
35396 mod 256
68
P3 : (55 * 249 + 209 * 159) mod 256
46926 mod 256
78
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1150
3. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
P4 : (76 * 249 + 115 * 159) mod 256
37209 mod 256
89
Plaintext :
65 78
68 89
𝑇
Plaintext T
:
65 68
78 89
PlaintextT
is the final result of the decryption the both
methods.
After calculation, we can see the plaintext is turned into
three parts of ciphertexts before finally turned back into
plaintext again. Each participant needs to perform two stage
of calculation where the sender does the encryption and
decryption.For example in Table 1, it shows the complete
work of encryption and decryption processes. The sentence
is “THE QUICK BROWN FOX JUMPS OVER THE LAZY
DOG”. There are 40 characters. The PT1 shows the ASCII
code of the characters, CT1, CT2 and CT3 is the three-pass
protocol processes. The PT2 is the decryption of the
ciphertext.
Table 1:Sample of Three-Pass Protocol in Hill Cipher
NO. PT1 CT1 CT2 CT3 PT2
1 84 228 5 115 84
2 72 179 225 97 72
3 69 220 63 240 69
4 32 135 123 248 32
5 81 198 212 185 81
6 85 24 131 252 85
7 73 11 42 167 73
8 67 179 20 194 67
9 75 253 102 228 75
10 32 228 140 67 32
11 66 169 123 14 66
12 82 246 81 242 82
13 79 30 154 224 79
14 87 34 32 91 87
15 78 213 124 190 78
16 32 186 153 133 32
17 70 151 150 148 70
18 79 72 28 234 79
19 88 162 109 46 88
20 32 72 110 109 32
21 74 197 79 183 74
22 85 251 141 11 85
23 77 142 202 234 77
24 80 95 169 111 80
25 83 181 111 183 83
26 32 187 141 8 32
27 79 129 90 74 79
28 86 149 88 118 86
29 69 9 70 250 69
30 82 92 222 15 82
31 32 7 151 48 32
32 84 96 213 10 84
33 72 39 122 240 72
34 69 68 208 248 69
35 32 216 153 142 32
36 76 96 232 187 76
37 65 69 139 137 65
38 90 255 179 220 90
39 89 155 206 180 89
40 32 163 180 110 32
The use of Three-Pass Protocol on Hill Cipher is very useful
way to improve the data security level in the process of
sending a message. Besides improving the security, this
method also stops distributing keys between sender and
receiver. If someone wants to take the information, it will be
suspended.In Table 1, we see there are three ciphertext
produced. Someone might be intercepting the information.
But actually, he does not have the keys since they are not
transferred. It is hard to break the hidden information since
the key is not provided. But in the conventional method, the
key is distributed as well. It really makes the key vulnerable.
5. Conclusion
We concludethat Three-Pass Protocol can be applied in Hill
Cipher encryption. It helps the sender to give more
protection to their data from being intercepted. The
undistributed key system is more secure since the both
participants do not have to exchange key when doing this
process. Three-Pass Protocol is the best technique to gain the
information security more.
References
[1] A. A. Abdullah, R. Khalaf dan M. Riza, “A Realizable
Quantum Three-Pass Protocol Authentication,”
Mathematical Problems in Engineering, 2015.
[2] R. Kumar dan R. C., “Analysis of Diffie Hellman Key
Exchange Algorithm with Proposed Key Exchange
Algorithm,” International Journal of Emerging Trends &
Technology in Computer Science, vol. 4, no. 1, pp. 40-
43, 2015.
[3] M. Ahmed, B. Sanja, D. Aldiaz, A. Rezaei dan H.
Omotunde, “Diffie-Hellman and Its Application in
Security Protocols,” International Journal of Engineering
Science and Innovative Technology, vol. 1, no. 2, pp. 69-
73, 2008.
[4] C. Stubbs, “Three-Pass Protocol,” 20 November 2013.
[Online]. Available:
http://asymmetriccryptography.blogspot.co.id/. [Diakses
1 May 2016].
[5] M. N. A. Rahman, A. F. A. Abidin, M. K. Yusof dan N.
S. M. Usop, “Cryptography: A New Approach of
Classical Hill Cipher,” International Journal of Security
and Its Applications, vol. 7, no. 2, pp. 179-190, 2013.
[6] S. I. Chowdhury, S. A. M. Shohag dan H. Sahid, “A
Secured Message Transaction Approach by Dynamic
Hill Cipher Generation and Digest Concatenation,”
International Journal of Computer Applications, vol. 23,
no. 9, pp. 25-31, 2011.
[7] A. A. Khalaf, M. S. A. El-karim dan H. F. A. Hamed, “A
Triple Hill Cipher Algorithm Proposed to Increase the
Security of Encrypted Binary Data and its
Implementation Using FPGA,” ICACT Transactions on
Advanced Communications Technology, vol. 5, no. 1,
pp. 752-757, 2016.
[8] J. Chase dan M. Davis, “Extending the Hill Cipher,”
2010.
[9] A. P. U. Siahaan, "RC4 Technique in Visual
Cryptography RGB Image Encryption," International
Journal of Computer Science and Engineering, vol. 3, no.
7, pp. 1-6, 2016.
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1151
4. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391
Volume 5 Issue 7, July 2016
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Author Profile
Andysah Putera Utama Siahaan was born in
Medan, Indonesia, in 1980. He received the S.Kom.
degree in computer science from Universitas
Pembangunan Panca Budi, Medan, Indonesia, in
2010, and the M.Kom. in computer science as well
from the University of Sumatera Utara, Medan,
Indonesia, in 2012. In 2010, he joined the Department of
Engineering, Universitas Pembangunan Panca Budi, as a Lecturer,
and in 2012 became a junior researcher. He is applying for his Ph.
D. degree in 2016. He has written in several international journal
and conference. He is now active in writing papers and joining
conferences.
Paper ID: ART2016437 DOI: 10.21275/v5i7.ART2016437 1152