Home   >   CSC-OpenAccess Library   >    Manuscript Information
Cryptographic Algorithms For Secure Data Communication
Peter Zirra, Gregory Wajiga
Pages - 227 - 243     |    Revised - 01-05-2011     |    Published - 31-05-2011
Volume - 5   Issue - 2    |    Publication Date - May / June 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Cryptographic Algorithm, Asymmetric key, Nonlinear System
ABSTRACT
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
CITED BY (13)  
1 Aishwarya, J., Palanisamy, V., & Kanagaram, K. Comparative Analysis of Extended Version of Four-Square Cipher Using 8 X 8 and 10 X 10 Matrices.
2 Golestani, M. R., Khademi, M., & Moeini, A. A New Approach to Segmentation of On-Line Persian Cursive Words. International Journal of Computer Applications Technology and Research, 3(2), 88-92.
3 Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53.
4 Acevedo, E., Martínez, Á., Acevedo, M., & Martínez, F. (2013). A Novel Text Encryption Algorithm. Advances in Soft Computing Techniques, 91.
5 Singh, D., & Shukla, S. (2014). Cloud’s SaaS Security by Biometric Concept. International Journal of Computer Science and Engineering.
6 Rajanbabu, D. T., & Raj, C. (2014). Multi level encryption and decryption tool for secure administrator login over the network. Indian Journal of Science and Technology, 7(4), 8-14.
7 Kaur, A., & Singh, H. (2014). Security in WLAN-Review of Security and Throughput Tradeoff.
8 Shukla, S., & Kumar, D. (2014). Cloud’s Software-Security as a Service (S-SaaS) via Biometrics.
9 Acharya, K., Sajwan, M., & Bhargava, S. (2014). Analysis of Cryptographic Algorithms for Network Security. International Journal of Computer Applications Technology and Research, 3(2), 130-135.
10 Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., & Sanap, M. (2014). AES Algorithm Using 512 Bit Key Implementation for Secure Communication. International journal of innovative Research in Computer and Communication Engineering, 2(3).
11 Aishwarya, J., Palanisamy, V., & Kanagaram, K. (2014). An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications, 97(21).
12 Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
13 Chuchuen, C., & Chanvarasuth, P. Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Libsearch 
7 Bielefeld Academic Search Engine (BASE) 
8 Scribd 
9 SlideShare 
10 PdfSR 
A. Kahate, Cryptography and Network Security (2nd ed.). New Delhi: Tata McGraw Hill, 2008.
B. Figg. (2004). Cryptography and Network Security. Internet: http:/www.homepages.dsu.edu/figgw/Cryptography%20&%20Network%2 0Security.ppt. [March 16, 2010].
C.K. Laudan, and C.G. Traver. E-Commerce .Business .Technology .Society (2nd ed.). New York: Pearson Education, Inc., 2004.
D. Rudolf. “Development and Analysis of Block Cipher and DES System”. Internet: http://www.cs.usask..ca/~dtr467/400/, 2000, [April 24, 2009]
G.C. Kessler. Handbook on Local Area Networks: An Overview of Cryptography. United Kingdom: Auerbach. Available http://www.garykessler.net/library/crypto.html. 2010, [January 3, 2010].
G.W. Moore. (2001). Cryptography Mini-Tutorial. Lecture notes University of Maryland School of Medicine. Internet: http://www.medparse.com/whatcryp.htm [March 16, 2009].
H. Wang. (2002). Security Architecture for The Teamdee System. An unpublished MSc Thesis submitted to Polytechnic Institution and State University, Virginia, USA.
J. Talbot and D. Welsh. Complexity and Cryptography: An Introduction. New York: Cambridge University Press, 2006
K.M. Alallayah, W.F.M. Abd El-Wahed, and A.H. Alhamani.“Attack Of Against Simplified Data Encryption Standard Cipher System Using Neural Networks”. Journal of Computer Science,2010, 6(1), pp. 29-35.
M. Milenkovic. Operating System: Concepts and Design, New York: McGrew-Hill, Inc., 1992.
M.A. Yusuf. Data Security: Layered Approach Algorithm. An unpublished MSc Thesis submitted to Abubakar Tafawa Balewa University, Bauchi, Nigeria, 2007.
N. Su, R.N. Zobel, and F.O. Iwu. “Simulation in Cryptographic Protocol Design and Analysis.” Proceedings 15th European Simulation Symposium, University of Manchester, UK., 2003.
P.R. Zimmermann. An Introduction to Cryptography. Germany: MIT press. Available: http://www.pgpi.org/doc/pgpintro, 1995, [March 16, 2009].
S.A.M. Diaa, M.A.K. Hatem, and M.H. Mohiy (2010). “Evaluating The Performance of Symmetric Encryption Algorithms” International Journal of Network Security, 2010, 10(3), pp.213-219
T. Jakobsen and L.R. Knudsen. (2001). Attack on Block of Ciphers of Low Algebraic Degree. Journal of Cryptography, New York, 14(3), pp.197-210.
T. Ritter. “Crypto Glossary and Dictionary of Technical Cryptography’. Internet: www.ciphersbyritter.com/GLOSSARY.HTM , 2007, [August 17, 2009]
V. Potdar and E. Chang. “Disguising Text Cryptography Using Image Cryptography,” International Network Conference, United Kingdom: Plymouth, 2004.
W. Stallings. Cryptography and Network Security (4th ed.). Englewood (NJ):Prentice Hall, 1995.
Mr. Peter Zirra
- Nigeria
zirrapeter@yahoo.com
Professor Gregory Wajiga
- Nigeria


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS