A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm

Nowadays, after the significant development in the Internet, communication and information exchange around the world has become easier and faster than before. One may send an e-mail or perform money transaction (using a credit card) while being at home. The Internet users can also share resources (storage, memory, etc.) or invoke a method on a remote machine. All these activities require securing data while the data are sent through the global network. There are various methods for securing data on the internet and ensuring its privacy; one of these methods is data encryption. This technique is used to protect the data from hackers by scrambling these data into a non-readable form. In this paper, we propose a novel method for data encryption based on the transformation of a text message into a barcode image. In this paper, the proposed Bar Code Encryption Algorithm (BCEA) is tested and analyzed.

[1]  Addepalli V. N. Krishna Time stamp based ECC encryption and decryption , 2014, Int. Arab J. Inf. Technol..

[2]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[3]  Encryption of a Binary String Using Music Notes and Graph theory , 2013 .

[4]  Shaik Rasool,et al.  EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE , 2010 .

[5]  Ahmad Abusukhon,et al.  Analyzing the Efficiency of Text-to-Image Encryption Algorithm , 2012 .

[6]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[7]  Neha Singla,et al.  Image Encryption Using Block-Based Transformation Algorithm , 2014 .

[8]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[9]  Ahmad Abusukhon,et al.  A novel network security algorithm based on private key encryption , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[10]  Soubhik Chakraborty,et al.  A Symmetric Key Algorithm for Cryptography using Music , 2013 .

[11]  Ahmad Abusukhon,et al.  BLOCK CIPHER ENCRYPTION FOR TEXT-TO-IMAGE ALGORITHM , 2013 .

[12]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[13]  Abusukhon Ahmad,et al.  Distributed Text-to-Image Encryption Algorithm , 2014 .

[14]  Anupkumar M Bongale,et al.  Image Encryption based on FEAL Algorithm , 2013 .

[15]  Cheng-Chi Lee,et al.  A n2+n MQV key agreement protocol , 2013, Int. Arab J. Inf. Technol..

[16]  Padma Bh,et al.  Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .

[17]  V. R. Resmy,et al.  Simple and Secure Image Encryption , 2012 .

[18]  Ahmad Abusukhon,et al.  SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION , 2012 .

[19]  M. C. Adhikary,et al.  Image Encryption Using Fibonacci-Lucas Transformation , 2012, ArXiv.

[20]  Qi Li,et al.  A security framework for wireless sensor networks , 2010 .

[21]  Mohammad Reza Najaf Torkaman,et al.  INNOVATIVE APPROACH TO IMPROVE HYBRID CRYPTOGRAPHY BY USINGDNA STEGANOGRAPHY , 2012 .

[22]  Soubhik Chakraborty,et al.  A Novel Method of Hiding Message Using Musical Notes , 2010 .

[23]  Ajit Singh,et al.  DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING , 2011 .