Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(403.89KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Cryptographic Algorithms For Secure Data Communication
Peter Zirra, Gregory Wajiga
Pages - 227 - 243     |    Revised - 01-05-2011     |    Published - 31-05-2011
Volume - 5   Issue - 2    |    Publication Date - May / June 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Cryptographic Algorithm, Asymmetric key, Nonlinear System
ABSTRACT
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
CITED BY (13)  
1 Aishwarya, J., Palanisamy, V., & Kanagaram, K. Comparative Analysis of Extended Version of Four-Square Cipher Using 8 X 8 and 10 X 10 Matrices.
2 Golestani, M. R., Khademi, M., & Moeini, A. A New Approach to Segmentation of On-Line Persian Cursive Words. International Journal of Computer Applications Technology and Research, 3(2), 88-92.
3 Zirra, P. B., Wajiga, G. M., & Boukari, S. (2012). Generating Ciphertext Using Systems of Equations: An Asymmetric Key Approach. Int. J. Pure Appl. Sci. Technol, 8(2), 47-53.
4 Acevedo, E., Martínez, Á., Acevedo, M., & Martínez, F. (2013). A Novel Text Encryption Algorithm. Advances in Soft Computing Techniques, 91.
5 Singh, D., & Shukla, S. (2014). Cloud’s SaaS Security by Biometric Concept. International Journal of Computer Science and Engineering.
6 Rajanbabu, D. T., & Raj, C. (2014). Multi level encryption and decryption tool for secure administrator login over the network. Indian Journal of Science and Technology, 7(4), 8-14.
7 Kaur, A., & Singh, H. (2014). Security in WLAN-Review of Security and Throughput Tradeoff.
8 Shukla, S., & Kumar, D. (2014). Cloud’s Software-Security as a Service (S-SaaS) via Biometrics.
9 Acharya, K., Sajwan, M., & Bhargava, S. (2014). Analysis of Cryptographic Algorithms for Network Security. International Journal of Computer Applications Technology and Research, 3(2), 130-135.
10 Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., & Sanap, M. (2014). AES Algorithm Using 512 Bit Key Implementation for Secure Communication. International journal of innovative Research in Computer and Communication Engineering, 2(3).
11 Aishwarya, J., Palanisamy, V., & Kanagaram, K. (2014). An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications, 97(21).
12 Ayokunle, T. B., Ogah, U. S., & Binitie, A. P. (2015). Encryption and Decryption of Messages Using Advanced Encryption Standard and System of Nonlinear Equations. International Journal of Pure and Applied Sciences and Technology, 27(1), 1.
13 Chuchuen, C., & Chanvarasuth, P. Relationship between Phishing Techniques and User Personality Model of Bangkok Internet Users.
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 refSeek 
5 iSEEK 
6 Libsearch 
7 Bielefeld Academic Search Engine (BASE) 
8 Scribd 
9 SlideShare 
10 PdfSR 
1 B. Figg. (2004). Cryptography and Network Security. Internet: http:/www.homepages.dsu.edu/figgw/Cryptography%20&%20Network%2 0Security.ppt. [March 16, 2010].
2 A. Kahate, Cryptography and Network Security (2nd ed.). New Delhi: Tata McGraw Hill, 2008.
3 M. Milenkovic. Operating System: Concepts and Design, New York: McGrew-Hill, Inc., 1992.
4 P.R. Zimmermann. An Introduction to Cryptography. Germany: MIT press. Available: http://www.pgpi.org/doc/pgpintro, 1995, [March 16, 2009].
5 W. Stallings. Cryptography and Network Security (4th ed.). Englewood (NJ):Prentice Hall, 1995.
6 V. Potdar and E. Chang. “Disguising Text Cryptography Using Image Cryptography,” International Network Conference, United Kingdom: Plymouth, 2004.
7 S.A.M. Diaa, M.A.K. Hatem, and M.H. Mohiy (2010). “Evaluating The Performance of Symmetric Encryption Algorithms” International Journal of Network Security, 2010, 10(3), pp.213-219
8 T. Ritter. “Crypto Glossary and Dictionary of Technical Cryptography’. Internet: www.ciphersbyritter.com/GLOSSARY.HTM , 2007, [August 17, 2009]
9 K.M. Alallayah, W.F.M. Abd El-Wahed, and A.H. Alhamani.“Attack Of Against Simplified Data Encryption Standard Cipher System Using Neural Networks”. Journal of Computer Science,2010, 6(1), pp. 29-35.
10 D. Rudolf. “Development and Analysis of Block Cipher and DES System”. Internet: http://www.cs.usask..ca/~dtr467/400/, 2000, [April 24, 2009]
11 H. Wang. (2002). Security Architecture for The Teamdee System. An unpublished MSc Thesis submitted to Polytechnic Institution and State University, Virginia, USA.
12 G.W. Moore. (2001). Cryptography Mini-Tutorial. Lecture notes University of Maryland School of Medicine. Internet: http://www.medparse.com/whatcryp.htm [March 16, 2009].
13 T. Jakobsen and L.R. Knudsen. (2001). Attack on Block of Ciphers of Low Algebraic Degree. Journal of Cryptography, New York, 14(3), pp.197-210.
14 N. Su, R.N. Zobel, and F.O. Iwu. “Simulation in Cryptographic Protocol Design and Analysis.” Proceedings 15th European Simulation Symposium, University of Manchester, UK., 2003.
15 C.K. Laudan, and C.G. Traver. E-Commerce .Business .Technology .Society (2nd ed.). New York: Pearson Education, Inc., 2004.
16 G.C. Kessler. Handbook on Local Area Networks: An Overview of Cryptography. United Kingdom: Auerbach. Available http://www.garykessler.net/library/crypto.html. 2010, [January 3, 2010].
17 M.A. Yusuf. Data Security: Layered Approach Algorithm. An unpublished MSc Thesis submitted to Abubakar Tafawa Balewa University, Bauchi, Nigeria, 2007.
18 J. Talbot and D. Welsh. Complexity and Cryptography: An Introduction. New York: Cambridge University Press, 2006
Mr. Peter Zirra
- Nigeria
zirrapeter@yahoo.com
Professor Gregory Wajiga
- Nigeria