{"title":"Cryptography Protocol: A Novel Multilingual Adaptive Encryption Technique with Phonetic Based Ciphering","authors":"A. Mansour, M. Fouad","doi":"10.14257/ijsia.2017.11.9.02","DOIUrl":null,"url":null,"abstract":"This paper proposes a novel hybrid encryption algorithm that utilizes the natural language phonetics significantly. The encryption process is based on two major aspects. The first is the phonetic difference between languages and their mapping into Human Machine interface tools such as the computer keyboard. The second aspect is the embedded ciphering process as a mean of private key exchange (PKE). Such a key will be used to determine all the ciphering parameters. The presented encryption protocol is an end-to-end process and the choices of languages and machine interface is completely user dependant. The creation of ciphering parameters such as the indicator, the key, the array and the operation are also user defined. This work explores several examples for each choice using the Arabic language as a model for the phonetic intermediate language. The keyboard character mapping is used based on the location of characters in the multilingual keyboard. Both fixed location mapping and variable location shifting are introduced.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.9.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper proposes a novel hybrid encryption algorithm that utilizes the natural language phonetics significantly. The encryption process is based on two major aspects. The first is the phonetic difference between languages and their mapping into Human Machine interface tools such as the computer keyboard. The second aspect is the embedded ciphering process as a mean of private key exchange (PKE). Such a key will be used to determine all the ciphering parameters. The presented encryption protocol is an end-to-end process and the choices of languages and machine interface is completely user dependant. The creation of ciphering parameters such as the indicator, the key, the array and the operation are also user defined. This work explores several examples for each choice using the Arabic language as a model for the phonetic intermediate language. The keyboard character mapping is used based on the location of characters in the multilingual keyboard. Both fixed location mapping and variable location shifting are introduced.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security