A Differential Computational Encryption Modeling Technique on Textual Data
Keywords:
Confidentiality, Integrity, PEHB64, pseudo code, Key, PEB64Abstract
Pseudo code and encryption algorithm play a vital role in information security. The existence of information technology has drastically transformed ways of communication with one another. This development has tremendously increased the usage and ways of communication leaving behind the security consideration of what is being transmitted through a communication channel. Therefore, this research produces a technical technique of the differential computation of the encryption algorithms. The aim to be considered is the security of the encrypted data against pattern recognition attack. The research will therefore fill the gap of security threat in EB64 pseudo code as compared with the newly proposed EHB64 pseudo code. In addition, this newly concept introduced generates a symmetric key by shuffling the original key with the textual data, thus making the transformation of each character of the data better each time it is shuffled. Thus the final output of the key-based pseudo code will be stronger than the pseudo code of EB64. Therefore, the developed concept secures the data more adequately than the existing one because of the designed pattern and confusion created during the process.
References
Isnar S, Andysah P, Sumartono U , and Arpan. “Base64 Character Encoding and Decoding Modeling” International Journal of Recent Trends in Engineering & Research, Volume 02, Issue 12; [ISSN: 2455-1457], pp. 63-68, 2016.
Guwalani P, Kala M, Chandrashekar R, Shinde dan J and Mane D. “Image File Security using Base-64 Algorithm,” Pooja Guwalani et al, Int.J.Computer Technology & Applications, vol. 5, no. 6, pp. 1892-1895, 2014.
Nurdiyanto H,. Rahim R, and Wulan N. “Symmetric Stream Cipher using Tr iple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 12005, 2017.
Baraka W, Anael S and Loserian S. “Enhanced Security Model For Mobile Banking Systems In Tanzania”. International Journal of Technology Enhancements and Emerging Engineering Research, Vol 1, Issue 4. ISSN 2347-4289, 2013.
William Stallings. Network Security Essentials, application and standards. New Jersey: Prentice Hall, 2000.
Gurpreet S and Supriya. “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security” International Journal of Computer Applications (0975 – 8887), Vol 67– No.19, pp 33-38, 2013.
Saleh Saraireh. “A Secure Data Communication System Using Cryptography and Steganography ”. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No 3, 2013.
Lockefeer L, Hubbers E and Verdult R. “Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities”,. pp. 1-40, 2010.
Shashi M and Rajan M. “Comparative Analysis of Encryption Algorithms for Data Communication”, IJCST Vol.2, Issue 2, 2011.
Therasa M and Poonkuzhali S. “Data Hiding Using Visual Cryptography for Secure Transmission,”International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 4, pp. 440-441, 2015.
Thiagarajan K, Balasubramanian P, Padmashree J. “Encryption and decryption algorithm using algebraic matrix approach” Journal of Physics: Conference Series, J. Phys.: Conf. Ser. 1000 012148, 2018.
Mohan H and Raji R (2011). "Performance Analysis of AES and MARS Encryption Algorithms".International Journal of Computer Science Issues (IJCSI), Vol. 8, issue 4, 2011.
Logunleko K.B, Logunleko A.M, Akinwunmi O.O. & Lawal O.O. " Security Assurance Framework for Intelligible Information Using a Customized Base64 Encryption Algorithm" Proceedings of the 17th iSTEAMS Multidisciplinary Research Nexus Conference, D.S. Adegbenro ICT Polytechnic, Itori-Ewekoro, Ogun State, Nigeria, 21st – 23rd, .Pp 85-93, 2019. www.istream.net - DOI Affix-https://doi.org/10.22624/AIM/iSTEAMS-2019/V17N2P10.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.