Abstract
Cryptography is one of the most accepted and successful data security methods used at present by most of the organizations. Encrypting the message using natural languages reduces the encryption time and improves the performance. Tamil is a most ancient Dravidian language spoken in the southern part of India. Here we use Tamil language for encrypting the text named as Tamilian Cryptography. Since Tamil language has 247 characters it is very difficult to crack the message. The message to be encrypted is translated to Tamil language, this translated text is then mapped to a randomly generated 2-bit combination of English alphabets. The result of this process is called intermediate cipher (inter cipher). This is an hybrid algorithm since the inter cipher is encrypted using Advanced Encryption Standard algorithm to enhance the confidentiality of the text. Since the Tamilian Cryptography makes use of three phases namely Translation, Mapping and Encryption, it makes the data much more secure than the existing algorithms like blowfish and Data Encryption Standard (DES) and also the person who tries to decrypt must have the knowledge of Tamil language as well the mapping details to see the original data and This algorithm exhibits stronger avalanche effect of 95% which is greater than blowfish and DES. The evaluation of the proposed algorithm shows that it executes faster and has comparatively lesser encryption time, less memory overhead.
Similar content being viewed by others
References
Sapkal, K., & Shrawankar, U. (2016). Transliteration of secured SMS to Indian regional language. Procedia Computer Science,78, 748–755.
Jing, X., Hao, Y., Fei, H., & Li, Z. (2012). Text encryption algorithm based on natural language processing. ACM Digital library, pp. 670–672.
Hughes, J. P., Hibbard, E. A., Cole, J. L., & Anderson, C. (2011). 1619.2-2010—IEEE standard for wide-block encryption for shared storage media. IEEE. https://doi.org/10.1109/ieeestd.2011.5729263.
Baskar, C., Balasubramani, C., & Manivannan, D. (2016). Establishment of light weight cryptography for resource constraint environment using FPGA. Procedia Computer Science,78, 165–171.
Chatterjee, R., Bonneau, J., Juels, A., & Ristenpart, T. (2015). Cracking–resistant password vaults using natural language encoders. In IEEE symposium on security and privacy. https://doi.org/10.1109/sp.2015.36.
Kurniawan, D. H., & Munir, R. (2016). Double chaining algorithm, a secure symmetric-key encryption algorithm. In International conference on advanced informatics: concepts, theory and application (ICAICTA). https://doi.org/10.1109/icaicta.2016.7803097.
Ogden, W. C., & Davis, M. W. (2002). Improving cross-language text retrieval with human interactions. In Proceedings of the 33rd annual Hawaii international conference on system sciences. https://doi.org/10.1109/hicss.2000.926726.
Nagarhalli, T. P., Bakal, J. W., & Jain, N. (2016). A survey of Hindi text steganography. International Journal of Scientific & Engineering Research,7, 55–61.
Baker, S. I. B., & Al-Hamami, A. H. (2017). Novel algorithm in symmetric encryption (NASE). In IEEE international conference on new trends in computing sciences (ICTCS). https://doi.org/10.1109/ictcs.2017.54.
Gupta, A., Semwal, S., & Johari, R. (2016). METHS: Mapping from English language to Hindi language for secure commercial transactions. In International conference on computing, communication and automation (ICCCA). https://doi.org/10.1109/ccaa.2016.7813700.
Vidhya, P. M., & Paul, V. (2015). A method for text steganography using Malayalam text. Procedia Computer Science,46, 524–531.
Khairullah, M. (2019). A novel steganography method using transliteration of Bengali text. Journal of King Saud University Computer and Information Sciences,31(3), 348–366. https://doi.org/10.1016/j.jksuci.2018.01.008.
Taha, A., Hammad, A. S., & Selim, M. M. (2018). A high capacity algorithm for information hiding in Arabic text. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.07.007.
Hamzah, A. A., Khattab, S., & Bayomi, H. (2019). A linguistic steganography framework using Arabic calligraphy. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2019.04.015.
Roy, S., & Venkateswaran, P. (2013). A text based steganography technique with Indian root. Procedia Technology,10, 167–171.
Vijaya Bharati, P., & Jyothi Prasad K. S. S. (2016). Cryptic transmission of Telugu text. In International conference on information communication and embedded systems (ICICES). https://doi.org/10.1109/icices.2016.7518877.
Changder, S., Ghosh, D., & Debnath, N. C. (2010). Linguistic approach for text steganography through Indian text. In International conference on computer technology and development. https://doi.org/10.1109/icctd.2010.5645862.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Geetha, R., Padmavathy, T., Thilagam, T. et al. Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. Wireless Pers Commun 112, 21–36 (2020). https://doi.org/10.1007/s11277-019-07013-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-07013-6