Multilanguage Block Ciphering Using 3D Array
Different types of coding techniques have been introduced in different languages in order to change the characters and information so that it is difficult for others to understand them. But these coding techniques correspond only to that particular language and they do not support the other languages. Also it was not possible to do Multi language encryption by applying one particular algorithm. In MULET  type encryption, the cipher text which is derived by applying the Multilanguage contains not only a shorter multi language characters but also two types of Replacement method are explained in them. Hence there are two shortcomings in this process But the MB3D method, which is now introduced here is free from the above two types of shortcomings and also the cipher text which we get at the end is also a Block cipher, which is a notable feature. This apart, the mapping array used here is made up with the help of Three Dimensional Multi language method and hence it is very difficult for others to understand the information even by attempting the Brute force attack or any similar types of attack. With this MB3D method, it is possible to do the encryption and decryption process for any language in the world which have Unicode.
KeywordsStream Cipher Plain Text Indian Language Cipher Text Mapping Array
Unable to display preview. Download preview PDF.
- 1.Praveen Kumar, G., Arjun Kumar, M.: B. Parajuli, P. Choudhury.: MULET: A Multi-language Encryption Technique. In: IEEE Seventh International Conference on Information Technology, pp. 779–782 (2010)Google Scholar
- 2.Shankar, T.N.: Sahoo, G.: Cryptography by Karatsuba Multiplier with ASCII Codes. International Journal on Computer Applications, 53–60 (2010)Google Scholar
- 3.Sweetman, W.: The Bibliotheca Malabarica- An 18th century library of Tamil Literature. In: World Classical Tamil Conference (WCTC), Part 10, Coimbatore (2010)Google Scholar
- 4.Shanmugam, S.V.: Tholkappiyar concept of Semantics. In: Published in World Classical Tamil Conference (WCTC), Part 9, Coimbatore (2010)Google Scholar
- 5.Paar, C., Pelzl, J., Preneel, B.: Understanding Cryptography.: A Text book for student and Practitioners. Springer (2010)Google Scholar
- 6.Sakthi Vignesh, R., Sudharssun, S., Jegadish Kumar, K.J.: Limitations of Quantum & The Versatility of Classical Cryptography:Comparative Study. In: Second International Conference on Environmental and Computer Science, pp. 333–337 (2009)Google Scholar
- 7.Farmer, S., Sproat, R., Witzel, M.: The collapse of the Indus-script thesis: The myth of a literate Harappan civilization. Electronic Journal of Vedic Studies 11, 19 (2004)Google Scholar
- 8.Krishnamurti, B.: The Dravidian languages. Cambridge University Press (2003)Google Scholar
- 9.Parpola, A.: Syntactic methods in the study of Indus script. In: Proceedings of the Nordic South Asia Conference, Helsinki, pp. 125–136 (1980)Google Scholar
- 10.Unicode Character form, http://www.unicode.org