Message Security and Parity Bit Recovery

Authors

  • Khean Ouk Department of Computer Science, Royal University of Phnom Penh, Phnom Penh, Cambodia
  • Kimsoung Lim Department of IT, Emperor Bank PLC, Phnom Penh, Cambodia
  • Sensamnang Ouk Department of IT, Amreth Microfinance Institute, Phnom Penh, Cambodia

Keywords:

encryption, decryption, RAID-5, Parity bit, Cryptography, One Time pad, Cryptosystem, key

Abstract

Today is the age of the digital era which uses ICT around the world in daily life. The confrontation of using ICT is security breach. To protect the daily works and daily messages transferring are more secure as needed, we must take countermeasure to prevent the accidental happening to them. One of those countermeasures is using One Time Pad technique to encrypt and decrypt messages unbreakable. This encryption and decryption will highly secure messages. The amount of data is huge to store and need to be recovered as soon as possible. Most people around the world are using IT system such as banking and Microfinance which its data cost billions dollar. If there is a catastrophe occurring to loss data, their businesses will be bankruptcy. One of the most powerful techniques to recover data effectively is a parity bit. The RAID-5 level has ability to recover data effectively when a hard disk among at least 3 hard disks in array failed during the RAID-5 is working because of its parity bit. This information security method is to ensure the confidential, integrity and availability of data.

 

References

DavidA.Patterson,Garth Gibson,and Randy H.Katz,“ A Case for Redundant Arrays of Inexpensive Disks (RAID)”, SIGMOD Conferences ,Volume 17, Issue 3,1988.

Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad, “An Enhanced Practical Difficulty of One-Time Pad Algorithm Resolving the Key Management and Distribution Problem”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2018,Hong Kong,2018.

E. Yaghoubi & L. A. Bakhtiar & A. Adami & S. M. Hamidi &M. Hosseinzadeh, “All optical OR/AND/XOR gates based on nonlinear directional coupler”, Journal of Optics ,2014.

Prof. D. Chandrasekhar Rao, Dr. Amiya Kumar Rath, Dr. M. R. Kabat, “CRYPTOGRAPHY AND NETWORK SECURITY LECTURE NOTES”, Odisha, pp 18.

C. E. Shannon,“Communication Theory of Secrecy Systems”, Bell System Technical Journal, vol.28-4,pp 656-715, 1949.

Muhammad Iqbal, Muhammad Akbar Syahbana Pane,Andysah Putera Utama Siahaan, “SMS Encryption Using One-Time Pad Cipher”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 18, Issue 6, PP 54-58,2016.

Downloads

Published

2020-10-31

How to Cite

[1]
K. Ouk, K. Lim, and S. Ouk, “Message Security and Parity Bit Recovery”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 8, no. 5, pp. 36–42, Oct. 2020.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.