{"title":"A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol","authors":"Abdelrahman Altigani, Bazara I. A. Barry","doi":"10.1109/ICCEEE.2013.6633920","DOIUrl":null,"url":null,"abstract":"The key idea behind this study is to propose a new approach that provides an additional layer of protection to transmitted messages over a communication network. The approach combines the well known symmetric encryption algorithm (AES) and the steganography protocol Word Shift Coding Protocol. The AES is used to equip the “secret” data with initial confidentiality layer; then the encrypted data are represented in binary, and hidden in a textual carrier. As will be discussed in the paper, the resulting model has a far better impact on the confidentiality of the transmitted message and overall computational security of the system.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEEE.2013.6633920","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17
Abstract
The key idea behind this study is to propose a new approach that provides an additional layer of protection to transmitted messages over a communication network. The approach combines the well known symmetric encryption algorithm (AES) and the steganography protocol Word Shift Coding Protocol. The AES is used to equip the “secret” data with initial confidentiality layer; then the encrypted data are represented in binary, and hidden in a textual carrier. As will be discussed in the paper, the resulting model has a far better impact on the confidentiality of the transmitted message and overall computational security of the system.