SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION

Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its IP address. Unfortunately, an IP address is attacked by hackers; this is where one host claims to have the IP address of another host and thus sends packets to a certain machine causing it to take some sort of action. In order to overcome this problem cryptography is used. In cryptographic application, the data sent are encrypted first at the source machine using an encryption key then the encrypted data are sent to the destination machine. This way the attacker will not have the encryption key which is required to get the original data and thus the hacker is unable to do anything with the session. In this paper, we propose a novel method for data encryption. Our method is based on private key encryption. We call our method Text-To-Image Encryption (TTIE).

[1]  Kamaljit I. Lakhtaria Protecting Computer Network with Encryption Technique: A Study , 2011, UCMA.

[2]  David Pointcheval,et al.  Parallel authentication and public-key encryption , 2003 .

[3]  Claude Castelluccia,et al.  A security framework for privacy-preserving data aggregation in wireless sensor networks , 2011, TOSN.

[4]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[7]  Shaik Rasool,et al.  EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE , 2010 .

[8]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[9]  Ajit Singh,et al.  DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING , 2011 .

[10]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[11]  Padma Bh,et al.  Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .

[12]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[13]  Mihir Bellare,et al.  The Security of Cipher Block Chaining , 1994, CRYPTO.

[14]  E. Ramaraj,et al.  A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking , 2006 .

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Thawatchai Chomsiri A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test , 2008 .