Intelligent security algorithm for UNICODE data privacy and security in IOT

AbstractInformation security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.

[1]  Muhammad Reza Z'aba,et al.  Key-dependent s-box in lightweight block ciphers , 2014 .

[2]  Dragos Trinca,et al.  Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[3]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[4]  Hristina Mihajloska,et al.  A NEW APPROACH INTO CONSTRUCTING S-BOXES FOR LIGHTWEIGHT BLOCK CIPHERS , 2014 .

[5]  Carlisle M. Adams,et al.  The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.

[6]  Mohammad Shirali-Shahreza,et al.  STEGANOGRAPHY IN PERSIAN AND ARABIC UNICODE TEXTS USING PSEUDO-SPACE AND PSEUDO CONNECTION CHARACTERS , 2008 .

[7]  Nitin Agrawal,et al.  A block based Encryption Model to improve Avalanche Effect for data Security , 2013 .

[8]  J. M. Gnanasekar,et al.  Unicode Text Security Using Dynamic and Key-Dependent 16x16 S-Box , 2016 .

[9]  Mohamed Abdel-Basset,et al.  2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.

[10]  Prasenjit Choudhury,et al.  MULET: A Multilanguage Encryption Technique , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[11]  P. Mroczkowski,et al.  Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers , 2009 .

[12]  Pratosh Bansal,et al.  An improved cryptographic algorithm using UNICODE and universal colors , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).

[13]  José María Sierra,et al.  Genetic Cryptoanalysis of Two Rounds TEA , 2002, International Conference on Computational Science.

[14]  Ajeet Singh A New Approach to Enhance Avalanche Effect in Aes to ImproveComputer Security , 2015 .

[15]  Sajad Shirali-Shahreza,et al.  Persian/Arabic Unicode Text Steganography , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[16]  Mohamed Abdel-Basset,et al.  An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems , 2018, Personal and Ubiquitous Computing.

[17]  Maram Balajee UNICODE and Colors Integration tool for Encryption and Decryption , 2011 .

[18]  Naveen K. Chilamkurti,et al.  Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem , 2018, Future Gener. Comput. Syst..

[19]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .

[20]  Tariq Shah,et al.  Comparative Analysis of S-boxes Based on Graphical SAC , 2010 .

[21]  Mohamed Abdel-Basset,et al.  A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem , 2018, Future Gener. Comput. Syst..

[22]  Yong Wang,et al.  Analyses of SKIPJACK S-Box , 2011 .

[23]  Amritha Thekkumbadan Veetil An Encryption Technique Using Genetic Operators , 2015 .

[24]  Mohamed Abdel-Basset,et al.  Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems , 2018, Future Gener. Comput. Syst..

[25]  Kazys Kazlauskas,et al.  An Algorithm for Key-Dependent S-Box Generation in Block Cipher System , 2015, Informatica.

[26]  Felicisimo V. Wenceslao,et al.  Performance Efficiency of Modified AES Algorithm Using Multiple S-Boxes , 2015 .

[27]  Sharad Jash,et al.  A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions , 2014 .

[28]  Mohamed Abdel-Basset,et al.  Internet of things in smart education environment: Supportive framework in the decision‐making process , 2019, Concurr. Comput. Pract. Exp..

[29]  KokSheik Wong,et al.  UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..

[30]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[31]  M.A. Rahman,et al.  A new approach to sort Unicode Bengali text , 2008, 2008 International Conference on Electrical and Computer Engineering.

[32]  Jayant P. Bhoge,et al.  Avalanche Effect of AES Algorithm , 2014 .

[33]  Mohamed Abdel-Basset,et al.  A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria , 2018, Des. Autom. Embed. Syst..

[34]  Mohamed Abdel-Basset,et al.  A novel method for solving the fully neutrosophic linear programming problems , 2018, Neural Computing and Applications.

[35]  Jogeswar Tripathy,et al.  Odia Offline Typewritten Character Recognition using Template Matching with Unicode Mapping , 2015, 2015 International Symposium on Advanced Computing and Communication (ISACC).

[36]  Mohamed Abdel-Basset,et al.  A comprehensive review of quadratic assignment problem: variants, hybrids and applications , 2018, Journal of Ambient Intelligence and Humanized Computing.

[37]  Pedro Isasi,et al.  Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA , 2004 .

[38]  Rahul Sharma,et al.  Universal Encryption Algorithm using Logical Operations and Bits Shuffling for Unicode , 2015 .

[39]  Balajee Maram,et al.  A Block Cipher Algorithm to Enhance the Avalanche Effect Using Dynamic Key- Dependent S-Box and Genetic Operations , 2018 .

[40]  Iqtadar Hussain,et al.  A novel design for the construction of safe S-boxes based on TDERC sequence , 2015 .