DOI QR코드

DOI QR Code

Improving the Efficiency and Scalability of Standard Methods for Data Cryptography

  • Abu-Faraj, Mua'ad M. (The University of Jordan) ;
  • Alqadi, Ziad A. (Albalaqa Applied University)
  • Received : 2021.12.05
  • Published : 2021.12.30

Abstract

Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data.

Keywords

References

  1. Hindi, A., Dr. Dwairi, M., Alqadi, Z.: Analysis of Procedures used to Build an Optimal Fingerprint Recognition System. International Journal of Computer Science and Mobile Computing 9(2), 21-37 (2020) https://doi.org/10.47760/ijcsmc.2020.v09i11.002
  2. Zahran, B., Ayyoub, B., Nader, J., Al-Qadi, Z.: Suggested Method to Create Color Image Features Victor. Journal of Engineering and Applied Sciences 14(1), 2203-2207 (2019) https://doi.org/10.36478/jeasci.2019.2203.2207
  3. Abdul Elminaam, D., Abdul Kader, H. and Hadhoud, M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12), 280-286 (2008)
  4. Stallings, W.: Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, 2006.
  5. Preet, S., Raman, M.: Comparison of Data Encryption Algorithms. International Journal of Computer science and Communications 2(1), pp. 125-127 (2011)
  6. Gurjeevan, S., Ashwani, K., Sandha, K.S.: A Study of New Trends in Blowfish Algorithm. International Journal of Engineering Research and Applications (IJERA) 1(2), pp.321-326 (2018)
  7. Monika, A., Pradeep, M.: A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering (IJCSE) 4(5), pp. 877-882 (2012)
  8. Li, P., Chen, Z., Yang, L. T., Zhao, L. , and Zhang, Q.: A Privacy-preserving High-order Neuro-fuzzy C-means Algorithm with Cloud Computing. Neurocomputing 256, pp. 82-89 (2017) https://doi.org/10.1016/j.neucom.2016.08.135
  9. Yin, S., and Liu, J.: A K-means Approach for Map-reduce Model and Social Network Privacy Protection. Journal of Information Hiding and Multimedia Signal Processing 7(6), pp. 1215-1221 (2016)
  10. Teng, L., Li, H., Liu, J., and Yin, S.: An Efficient and Secure Cipher-text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-attribute Sorting Method. International Journal of Network Security 20(5), pp. 872-878 (2018)
  11. Elgendy, I., Zhang, W., Liu, C., and Hsu, C.: An Efficient and Secured Framework for Mobile Cloud Computing. IEEE Transactions on Cloud Computing 9(1), pp. 79-87 (2018) https://doi.org/10.1109/TCC.2018.2847347
  12. Karthikeyan, B., Sasikala, T., and Priya, S. B.: Key Exchange Techniques Based on Secured Energy Efficiency in Mobile Cloud Computing. Applied Mathematics & Information Sciences 13(6), pp. 1039-1045 (2019) https://doi.org/10.18576/amis/130618
  13. B. Karthikeyan, T. Sasikala, and S. B. Priya, "Key exchange techniques based on secured energy efficiency in mobile cloud computing," Applied Mathematics & Information Sciences, vol. 13, no. 6, pp. 1039-1045, 2019. https://doi.org/10.18576/amis/130618
  14. Xu, J. Wei, L., Wu, W., Wang, A., Zhang, Y., and Zhou ,F.: Privacy-preserving Data Integrity Verification by using Lightweight Streaming Authenticated Data Structures for Healthcare Cyber-physical System. Future Generation Computer Systems 108, pp. 1287-1296 (2020) https://doi.org/10.1016/j.future.2018.04.018
  15. Haseeb, K., Almgren, A., Ud Din, I., Islam, N., and Altameem, A.: SASC: Secure and Authentication-based Sensor Cloud architecture for intelligent Internet of Things. Sensors 20(9), pp. 2468-2486 (2020) https://doi.org/10.3390/s20092468
  16. Zhu, H., Yuan, Y., Chen, Y., et al.: A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7, pp.9003-90044 (2019)
  17. Zhang, Z., and Luo, J.: A Data Value Classification and Encryption Mechanism Based on Metadata Attributes. Journal of Northwest University 46(2) pp. 188-194 (2016)
  18. Mehrotra S., Rajan, M.: Comparative Analysis of Encryption Algorithm for Data Communication. International Journal of Computer Science and Technology 2(2), pp. 292-294 (2011)
  19. Chandra M.: Superiority of Blowfish Algorithm. IJARCSSE 2(9), pp. 196-201 (2012)
  20. Yogesh, K. A.: Comparative Study of Different Symmetric Key Cryptography. International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2(7), pp. 204-206 (2013)
  21. Abdul, D.S., Kader, H.M., Abdul, Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. Communications of the IBIMA 8, pp. 58-64 (2009)
  22. Jawahar, T., Nagesh, K.: DES, AES and Blowfish Symmetric Key Cryptography Algorithm Simulation Based Performance Analysis. The International Journal of Emerging Technology and Advanced Engineering IJETAE 1(2), pp. 6-12 (2011)
  23. Mohit, M., Rajeev, B., Amritpal, S., Tejinder, S.: Comparative Analysis of Cryptographic Algorithms. International Journal of Advanced Engineering Technology, pp.16-18 (2018)
  24. Imran, A., Rafeek, K.: Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering 3(10), pp.713-(2013)
  25. Riman, C., and Hallal, H.: DES Based Educational Data Encryption System. International Conference on Security and Management (WORLDCOMP'13) (2013)