A Novel Data Place Encryption Algorithm

Encryption based researches mainly focuses on data encryption which are constrained either by different forms or formats of data. This paper proposes a method to encrypt any form of data such as image, text and sound. Thus keeping in view that in every form or format of data, elements of data can be represented by numbers at different places. In matrix as well as array of data, every data elements are arranged at places, these places can also be used for encryption instead of encrypting data element's value. This paper proposes an algorithm called data place encryption algorithm (DPEA) which is dependent on two keys to encrypt data places by swapping elements of data. Keys are used for "swapping sequence" generation. These keys are again encrypted using either RSA or any of the various proposed modified RSA algorithms so that data can only be decoded by private key of receiver. As this algorithm uses swapping method, the decoding and encoding algorithms are same. Plain text is generated when cipher text is swapped again using DPEA algorithm. In this paper a method inspired by frequency hopping spread spectrum (FHSS) technique is proposed to reduce chosen/plain text attacks.

[1]  K. Prasadh,et al.  Audio encryption using higher dimensional chaotic map , 2009 .

[2]  Wang Kejun,et al.  Logistic-map chaotic spread spectrum sequences under linear transformation , 2000, Proceedings of the 3rd World Congress on Intelligent Control and Automation (Cat. No.00EX393).

[3]  Xing-Yuan Wang,et al.  New chaotic encryption algorithm based on chaotic sequence and plain text , 2014, IET Inf. Secur..

[4]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[5]  Kate Smith-Miles,et al.  On chaotic simulated annealing , 1998, IEEE Trans. Neural Networks.

[6]  Michael W. Hoffman,et al.  Fully programmable, scalable chaos-based PN sequence generation , 2000 .

[7]  A. Ben Hamza,et al.  Image watermarking scheme using nonnegative matrix factorization and wavelet transform , 2009, Expert Syst. Appl..

[8]  Atul Kumar Dwivedi,et al.  A Novel Algorithm For Speech Based Authentication Of Digital Images Using DWT . , 2014 .

[9]  M. Jessa,et al.  The period of sequences generated by tent-like maps , 2002 .

[10]  G. A. Vijayalakshmi Pai,et al.  Swarm intelligence based key generation for text encryption in cellular networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).