Advertisement

Intelligent security algorithm for UNICODE data privacy and security in IOT

  • Balajee MaramEmail author
  • J. M. Gnanasekar
  • Gunasekaran Manogaran
  • M. Balaanand
Special Issue Paper
  • 76 Downloads

Abstract

Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.

Keywords

UNICODE S-box Hamming distance Avalanche effect Balanced output 

References

  1. 1.
    Stallings W (2004) Network security essentials (applications and standards). Pearson Education, London, pp 2–80Google Scholar
  2. 2.
    Pfleeger CP, Pfleeger SL (2004) Security in computing. Pearson Education, London, pp 642–666zbMATHGoogle Scholar
  3. 3.
    Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer SocietyGoogle Scholar
  4. 4.
    Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its applicationGoogle Scholar
  5. 5.
    Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computationGoogle Scholar
  6. 6.
    Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3(1):27–41MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Hussain I, Shah T, Mahmood H, Afzal M (2010) Comparative analysis of S-boxes based on graphical SAC. Int J Comput Appl 2(5):1–7Google Scholar
  8. 8.
    Ahmed N (2015) Testing an S-box for cryptographic use. Int J Comput Electr Eng 8:1–5Google Scholar
  9. 9.
    Mroczkowski P (2009) Generating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphers. J Telecommun Inf Technol 2:74–79Google Scholar
  10. 10.
    Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397Google Scholar
  11. 11.
    Shirali-Shahreza H, Shirali-Shahreza M (2008) Steganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection characters. J Theor Appl Inf Technol 4(8):682–687Google Scholar
  12. 12.
    Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075–1082CrossRefGoogle Scholar
  13. 13.
    Kazlauskas K, Vaicekauskas G, Smaliukas R (2015) An algorithm for key-dependent S-box generation in block cipher system. Informatica 26(1):51–65.  https://doi.org/10.15388/informatica.2015.38 CrossRefGoogle Scholar
  14. 14.
    Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23–34MathSciNetzbMATHGoogle Scholar
  15. 15.
    Aldabbagh SSM, Al Shaikhli IFT, Zaba MR (2014) Key-dependent S-box in lightweight block ciphers. J Theor Appl Inf Technol 62(2):554Google Scholar
  16. 16.
    Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952Google Scholar
  17. 17.
    Hussain Alkhaldi A et al (2015) A novel design for the construction of safe S-boxes based on TDERC sequence. Alexandria Eng J.  https://doi.org/10.1016/j.aej.2015.01.003 Google Scholar
  18. 18.
    Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011)Google Scholar
  19. 19.
    Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085Google Scholar
  20. 20.
    Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version)Google Scholar
  21. 21.
    Ramanujam S, Karuppiah M (2011) Designing an algorithm with high avalanche effect. IJCSNS Int J Comput Sci Netw Secur 11(1):106Google Scholar
  22. 22.
    Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153Google Scholar
  23. 23.
    Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562Google Scholar
  24. 24.
    Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343Google Scholar
  25. 25.
    Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646Google Scholar
  26. 26.
    Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSEGoogle Scholar
  27. 27.
    Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6Google Scholar
  28. 28.
    Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616Google Scholar
  29. 29.
    Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602Google Scholar
  30. 30.
    Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630Google Scholar
  31. 31.
    Shirali-Shahreza M, Shirali-Shahreza S (2008) Persian/Arabic unicode text steganography. In: The 4th international conference on information assurance and security, 978-0-7695-3324-7/08 $25.00 © 2008 IEEE.  https://doi.org/10.1109/ias.2008.12
  32. 32.
    Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEEGoogle Scholar
  33. 33.
    Kumar GP, Murmu AK, Parajuli B, Choudhury P (2010) MULET: a multilanguage encryption technique. In: 2010 7th international conference on information technology, 978-0-7695-3984-3/10 $26.00 © 2010 IEEE.  https://doi.org/10.1109/itng.2010.105
  34. 34.
    Tandon A, Sharma R, Sodhiya S, Durai Raj Vincent PM (2015) Universal encryption algorithm using logical operations and bits shuffling for unicode. Indian J Sci Technol.  https://doi.org/10.17485/ijst/2015/v8i15/33437 Google Scholar
  35. 35.
    Balajee Maram K, Gnanasekar JM (2016) UNICODE text security using dynamic and key-dependent 16X16 S-Box. Austr J Basic Appl Sci 10(1):26–36Google Scholar
  36. 36.
    Abdel-Basset M, El-Shahat D, Mirjalili S (2018) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Gener Comput Syst 85:129–145CrossRefGoogle Scholar
  37. 37.
    Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16Google Scholar
  38. 38.
    Abdel-Basset M, Manogaran G, Fakhry AE, El-Henawy I (2018) 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images. Multimed Tools Appl.  https://doi.org/10.1007/s11042-018-6266-0 Google Scholar
  39. 39.
    Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22Google Scholar
  40. 40.
    Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11Google Scholar
  41. 41.
    Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput SystGoogle Scholar
  42. 42.
    Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24Google Scholar
  43. 43.
    Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput SystGoogle Scholar
  44. 44.
    Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515Google Scholar
  45. 45.
    Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEEGoogle Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of CSEGMR Institute of TechnologyRajamIndia
  2. 2.Department of Computer Science and EngineeringSri Venkateswara College of EngineeringSriperumbudurIndia
  3. 3.University of CaliforniaDavisUSA
  4. 4.Department of CSEV.R.S. College of Engineering and TechnologyVillupuramIndia

Personalised recommendations