Skip to main content
Log in

Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India. Here we use Tamil language for encrypting the text named as Tamilian Cryptography. Since Tamil language has 247 characters it is very difficult to crack the message. The message to be encrypted is translated to Tamil language, this translated text is then mapped to a randomly generated 2-bit combination of English alphabets. The result of this process is called intermediate cipher (inter cipher). This is an hybrid algorithm since the inter cipher is encrypted using Advanced Encryption Standard algorithm to enhance the confidentiality of the text. Since the Tamilian Cryptography makes use of three phases namely Translation, Mapping and Encryption, it makes the data much more secure than the existing algorithms like blowfish and Data Encryption Standard (DES) and also the person who tries to decrypt must have the knowledge of Tamil language as well the mapping details to see the original data and This algorithm exhibits stronger avalanche effect of 95% which is greater than blowfish and DES. The evaluation of the proposed algorithm shows that it executes faster and has comparatively lesser encryption time, less memory overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Sapkal, K., & Shrawankar, U. (2016). Transliteration of secured SMS to Indian regional language. Procedia Computer Science,78, 748–755.

    Article  Google Scholar 

  2. Jing, X., Hao, Y., Fei, H., & Li, Z. (2012). Text encryption algorithm based on natural language processing. ACM Digital library, pp. 670–672.

  3. Hughes, J. P., Hibbard, E. A., Cole, J. L., & Anderson, C. (2011). 1619.2-2010—IEEE standard for wide-block encryption for shared storage media. IEEE. https://doi.org/10.1109/ieeestd.2011.5729263.

  4. Baskar, C., Balasubramani, C., & Manivannan, D. (2016). Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Computer Science,78, 165–171.

    Article  Google Scholar 

  5. Chatterjee, R., Bonneau, J., Juels, A., & Ristenpart, T. (2015). Cracking–resistant password vaults using natural language encoders. In IEEE symposium on security and privacy. https://doi.org/10.1109/sp.2015.36.

  6. Kurniawan, D. H., & Munir, R. (2016). Double chaining algorithm, a secure symmetric-key encryption algorithm. In International conference on advanced informatics: concepts, theory and application (ICAICTA). https://doi.org/10.1109/icaicta.2016.7803097.

  7. Ogden, W. C., & Davis, M. W. (2002). Improving cross-language text retrieval with human interactions. In Proceedings of the 33rd annual Hawaii international conference on system sciences. https://doi.org/10.1109/hicss.2000.926726.

  8. Nagarhalli, T. P., Bakal, J. W., & Jain, N. (2016). A survey of Hindi text steganography. International Journal of Scientific & Engineering Research,7, 55–61.

    Google Scholar 

  9. Baker, S. I. B., & Al-Hamami, A. H. (2017). Novel algorithm in symmetric encryption (NASE). In IEEE international conference on new trends in computing sciences (ICTCS). https://doi.org/10.1109/ictcs.2017.54.

  10. Gupta, A., Semwal, S., & Johari, R. (2016). METHS: Mapping from English language to Hindi language for secure commercial transactions. In International conference on computing, communication and automation (ICCCA). https://doi.org/10.1109/ccaa.2016.7813700.

  11. Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science,46, 524–531.

    Article  Google Scholar 

  12. Khairullah, M. (2019). A novel steganography method using transliteration of Bengali text. Journal of King Saud University Computer and Information Sciences,31(3), 348–366. https://doi.org/10.1016/j.jksuci.2018.01.008.

    Article  Google Scholar 

  13. Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.07.007.

    Article  Google Scholar 

  14. Hamzah, A. A., Khattab, S., & Bayomi, H. (2019). A linguistic steganography framework using Arabic calligraphy. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2019.04.015.

    Article  Google Scholar 

  15. Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology,10, 167–171.

    Article  Google Scholar 

  16. Vijaya Bharati, P., & Jyothi Prasad K. S. S. (2016). Cryptic transmission of Telugu text. In International conference on information communication and embedded systems (ICICES). https://doi.org/10.1109/icices.2016.7518877.

  17. Changder, S., Ghosh, D., & Debnath, N. C. (2010). Linguistic approach for text steganography through Indian text. In International conference on computer technology and development. https://doi.org/10.1109/icctd.2010.5645862.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Geetha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Geetha, R., Padmavathy, T., Thilagam, T. et al. Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. Wireless Pers Commun 112, 21–36 (2020). https://doi.org/10.1007/s11277-019-07013-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-07013-6

Keywords

Navigation