Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.


Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Saudi Arabia
A Noval Security Model for Indic Scripts- A Case Study on Telugu
Bhadri Raju M S V S, Vishnu Vardhan B, Pratap Reddy , Vinaya Babu A
Pages - 303 - 313     |    Revised - 30-09-2009     |    Published - 21-10-2009
Volume - 3   Issue - 4    |    Publication Date - October 2009  Table of Contents
Cipher, frequency distribution, syllable, crypto analysis
Secured communication across the world in the information domain is of at most importance when many languages, several alphabets and various signs (glyphs) found their existence. Data in the form of symbolic (text) representation is the basis for the present work. For any cryptographic Process the two main parameters used are the algorithm and the key. Existing cryptographic systems divide the text into words and each word into characters where character is treated as basic unit. For each character, the corresponding bit stream is generated .The cryptographic system encrypts the bit stream and this bit stream represents a set of characters. The transformation of characters is the basis for the security system. While encrypting our emphasis is to retrieve the characters back from the transformed text. The frequency distribution of characters in the original text is reflected up to some extent in the transformed text. The complexity that is involved in the form of frequency distribution is the parameter that is addressed .But if the underlying language is highly complex then it may be difficult to determine a particular message . In fact the structure and complexity of the underlying language is an extremely important factor when trying to assess an attacker's likelihood of success. The unit of information in a given process can be represented in symbolic notation, which may correspond to a language. In case of Indic scripts the basic unit need not correspond to a character. The concept of syllable, which is the representative of a set of characters with their associative combinatorial units is the basis for the formation of text. Syllable formation inherently embedded with the pre defined rules which will be of a major concern for the cryptographic systems. The commonality among all Indic scripts is associated with syllable and at the same time the differences are found with the combinatorial system. A syllable is a set of character codes of varying size where the complexity is in terms of machine and human understandable characteristics are different. The frequency distribution of these characters in the language differs from one language to other. The transformation of these characters can be treated as a basis for any crypto analysis. The frequency distribution of characters of any script plays an important role in this process. This paper proposes a noval approach for the security of Indic scripts in terms of script complexity as a parameter, with a case study on Telugu.
CITED BY (1)  
1 2. Tarek , B. A. Abdel-latef , A. A. Ahmed and A. M. Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 473 – 481, 2010.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Libsearch 
11 Bielefeld Academic Search Engine (BASE) 
12 Scribd 
13 WorldCat 
14 SlideShare 
16 PdfSR 
17 Free-Books-Online 
1 Antoine Joux. “Algorithmic Cryptanalysis”, CRC Press (2009)
2 Mark Stamp. “Information security Principles and Practice”, JohnWiley & Sons. Inc (2006)
3 Lee K.W., C.E. Teh, Y.L. Tan, “Decrypting English Text Using Enhanced Frequency Analysis” In National Seminar on Science, Technology and Social Sciences 2006 pp. 1-7 (2006)
4 Jakobsen, T., "A fast Method for Cryptanalysis of Subsittution Ciphers". Cryptologia, XIX, 3: 265-274(1995)
5 Majdi Al-qdah & Lin Yi Hui “Simple Encryption/Decryption Application” International Journal of Computer Science and Security, Volume 1 : Issue 1(2007)
6 Bárbara E. Sánchez Rinza, Diana Alejandra Bigurra Zavala, Alonso Corona Chavez, “Deencryption of a text in spanish using probability and statistics” In the Proceedings of the 18th IEEE Conference on Electronics, Communications and Computers,pp 75-77 (2008)
7 Bao-Chyuan Guan; Ray-I Chang; Yung Chung Wei; Chia-Ling Hu; Yu-Lin Chiu, “An encryption scheme for large Chinese texts” , In Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference on Security Technology , Taipei, Taiwan, ROC, pp 564- 568. (2003)
8 M.H. Shirali-Shahreza , M. Shirali-Shahreza, “Steganography in Persian and Arabic Unicode Texts Using Pseudo-Space and Pseudo-Connection Characters”. Theoretical and Applied Information Technology (JATIT). 8, pp 682-687(2008)
9 Pratap Reddy, L.,: “A New Scheme for Information Interchange in Telugu through Computer Networks ” : Doctoral Thesis. JNTU,Hyderabad, India, (2001)
10 H. J. Beker and F. C. Piper.” The Protection of Communication” Cipher Systems(2002)
Associate Professor Bhadri Raju M S V S
- India
Mr. Vishnu Vardhan B
- India
Assistant Professor Pratap Reddy
Jawaharlal Nehru Technological University - India
Mr. Vinaya Babu A
- India