A SECURED EMBEDDED SCHEME BASED ON MULTI-CRYPTOGRAPHIC PROTOCOLS
DOI:
https://doi.org/10.51406/jnset.v15i2.1671Keywords:
Cryptography, MLES and polyalphabetic substitutionAbstract
Transmission of information via unsecured channel requires confidentiality, authorization and authentication as part of major factors that must be put into consideration. This work proposes a scheme that can take care of these major factors at once. The method involves a multi-level approach that comprises of a key exchange protocol, a message authentication code, a key derivation function and a symmetric encryption known as polyalphabetic substitution that makes use of a 94x94 Vigenere table. The four cryptographic techniques are combined to form an encryption protocol, coined MLES for a message to be securely transmitted. In order to test the functionality of MLES scheme, it was implemented using Java 1.8.0 and tested on a text data. The result shows a feasible protocol that can secure a message in steganography.
References
Hankerson, D., Menezes A.J., Vanstone S 2004. Guide to Elliptic Curve Cryptography Springer-VL-rlag New York, Incorporated. Pp. 1-311.
Martinez V.G., Encinas L.H. 2013. Implementing ECC with Java Standard Edition 7”. International Journal of Computer Science and Artificial Intelligence. Vol. 3, Issue 4, pp. 134-142.
Reddy, S., Sowjanya, P., Praveena P., Shalini L. 2012. Poly-alphabetic Symmetric Key Algorithm Using Randomized Prime Numbers. International Journal of Scientific and Research Publications 2 (9): 1-3.
Bundesamt fur Sicherheit in der Informationstechnik. 2012. Technical Guideline Elliptic Curve Cryptography. http://www.bsi.bund.de/cae/servlet/contentblob/471398/publicationFile/3061/BSI-TR-03111_pdf.pdf.
Malik M.Y. 2010. Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor” 12th International Conference on Advanced Communications Technology ISBN 978-89-5519-146. 2: 1464-1468.
Kester Q. A. 2012. “A cryptosystem Based on Vigenère cipher with varying key” International Journal of Advanced Research in Computer Engineering & Technology. 1 (10): 108-113.