Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Noval Security Model for Indic Scripts- A Case Study on Telugu
Bhadri Raju M S V S, Vishnu Vardhan B, Pratap Reddy , Vinaya Babu A
Pages - 303 - 313 | Revised - 30-09-2009 | Published - 21-10-2009
MORE INFORMATION
KEYWORDS
Cipher, frequency distribution, syllable, crypto analysis
ABSTRACT
Secured communication across the world in the information domain is of at most importance when many languages, several alphabets and various signs (glyphs) found their existence. Data in the form of symbolic (text) representation is the basis for the present work. For any cryptographic Process the two main parameters used are the algorithm and the key. Existing cryptographic systems divide the text into words and each word into characters where character is treated as basic unit. For each character, the corresponding bit stream is generated .The cryptographic system encrypts the bit stream and this bit stream represents a set of characters. The transformation of characters is the basis for the security system. While encrypting our emphasis is to retrieve the characters back from the transformed text. The frequency distribution of characters in the original text is reflected up to some extent in the transformed text. The complexity that is involved in the form of frequency distribution is the parameter that is addressed .But if the underlying language is highly complex then it may be difficult to determine a particular message . In fact the structure and complexity of the underlying language is an extremely important factor when trying to assess an attacker's likelihood of success. The unit of information in a given process can be represented in symbolic notation, which may correspond to a language. In case of Indic scripts the basic unit need not correspond to a character. The concept of syllable, which is the representative of a set of characters with their associative combinatorial units is the basis for the formation of text. Syllable formation inherently embedded with the pre defined rules which will be of a major concern for the cryptographic systems. The commonality among all Indic scripts is associated with syllable and at the same time the differences are found with the combinatorial system. A syllable is a set of character codes of varying size where the complexity is in terms of machine and human understandable characteristics are different. The frequency distribution of these characters in the language differs from one language to other. The transformation of these characters can be treated as a basis for any crypto analysis. The frequency distribution of characters of any script plays an important role in this process. This paper proposes a noval approach for the security of Indic scripts in terms of script complexity as a parameter, with a case study on Telugu.
1 | 2. Tarek , B. A. Abdel-latef , A. A. Ahmed and A. M. Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS), 3(6), pp. 473 – 481, 2010. |
Antoine Joux. “Algorithmic Cryptanalysis”, CRC Press (2009) | |
Bao-Chyuan Guan; Ray-I Chang; Yung Chung Wei; Chia-Ling Hu; Yu-Lin Chiu, “An encryption scheme for large Chinese texts” , In Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference on Security Technology , Taipei, Taiwan, ROC, pp 564- 568. (2003) | |
Bárbara E. Sánchez Rinza, Diana Alejandra Bigurra Zavala, Alonso Corona Chavez, “Deencryption of a text in spanish using probability and statistics” In the Proceedings of the 18th IEEE Conference on Electronics, Communications and Computers,pp 75-77 (2008) | |
H. J. Beker and F. C. Piper.” The Protection of Communication” Cipher Systems(2002) | |
Jakobsen, T., "A fast Method for Cryptanalysis of Subsittution Ciphers". Cryptologia, XIX, 3: 265-274(1995) | |
Lee K.W., C.E. Teh, Y.L. Tan, “Decrypting English Text Using Enhanced Frequency Analysis” In National Seminar on Science, Technology and Social Sciences 2006 pp. 1-7 (2006) | |
M.H. Shirali-Shahreza , M. Shirali-Shahreza, “Steganography in Persian and Arabic Unicode Texts Using Pseudo-Space and Pseudo-Connection Characters”. Theoretical and Applied Information Technology (JATIT). 8, pp 682-687(2008) | |
Majdi Al-qdah & Lin Yi Hui “Simple Encryption/Decryption Application” International Journal of Computer Science and Security, Volume 1 : Issue 1(2007) | |
Mark Stamp. “Information security Principles and Practice”, JohnWiley & Sons. Inc (2006) | |
Pratap Reddy, L.,: “A New Scheme for Information Interchange in Telugu through Computer Networks ” : Doctoral Thesis. JNTU,Hyderabad, India, (2001) | |
Associate Professor Bhadri Raju M S V S
- India
msramaraju@gmail.com
Mr. Vishnu Vardhan B
- India
Assistant Professor Pratap Reddy
Jawaharlal Nehru Technological University - India
Mr. Vinaya Babu A
- India
|
|
|
|
View all special issues >> | |
|
|