A SECURED EMBEDDED SCHEME BASED ON MULTI-CRYPTOGRAPHIC PROTOCOLS

Authors

  • S A ONASHOGA
  • O OYELEKE
  • O A OJESANMI
  • A A AGBOOLA

DOI:

https://doi.org/10.51406/jnset.v15i2.1671

Keywords:

Cryptography, MLES and polyalphabetic substitution

Abstract

Transmission of information via unsecured channel requires confidentiality, authorization and authentication as part of major factors that must be put into consideration. This work proposes a scheme that can take care of these major factors at once. The method involves a multi-level approach that comprises of a key exchange protocol, a message authentication code, a key derivation function and a symmetric encryption known as polyalphabetic substitution that makes use of a 94x94 Vigenere table. The four cryptographic techniques are combined to form an encryption protocol, coined MLES for a message to be securely transmitted. In order to test the functionality of MLES scheme, it was implemented using Java 1.8.0 and tested on a text data. The result shows a feasible protocol that can secure a message in steganography.

References

Asafe, Y.N., Aigbokhan E. E., Okiki F. M. 2014. Cryptography System for Online Communication Using Polyalphabetic Substitution Method. International Journal of Advanced Networking and Applications 6: 2151-2157.

Hankerson, D., Menezes A.J., Vanstone S 2004. Guide to Elliptic Curve Cryptography Springer-VL-rlag New York, Incorporated. Pp. 1-311.

Martinez V.G., Encinas L.H. 2013. Implementing ECC with Java Standard Edition 7”. International Journal of Computer Science and Artificial Intelligence. Vol. 3, Issue 4, pp. 134-142.

Reddy, S., Sowjanya, P., Praveena P., Shalini L. 2012. Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers. International Journal of Scientific and Research Publications 2 (9): 1-3.

Bundesamt fur Sicherheit in der Informationstechnik. 2012. Technical Guideline Elliptic Curve Cryptography. http://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/3061/BSI-TR-03111_pdf.pdf.

Malik M.Y. 2010. Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor” 12th International Conference on Advanced Communications Technology ISBN 978-89-5519-146. 2: 1464-1468.

Kester Q. A. 2012. “A cryptosystem Based on Vigenère cipher with varying key” International Journal of Advanced Research in Computer Engineering & Technology. 1 (10): 108-113.

Downloads

Published

2017-11-22

Issue

Section

Articles