{"title":"基于PUGGAD算法的互联网链式规则保护","authors":"V. Suttichaya, P. Bhattarakosol","doi":"10.1109/ICCEE.2008.153","DOIUrl":null,"url":null,"abstract":"Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Chain Rule Protection over the Internet Using PUGGAD Algorithm\",\"authors\":\"V. Suttichaya, P. Bhattarakosol\",\"doi\":\"10.1109/ICCEE.2008.153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.\",\"PeriodicalId\":365473,\"journal\":{\"name\":\"2008 International Conference on Computer and Electrical Engineering\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Computer and Electrical Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEE.2008.153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Computer and Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEE.2008.153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Chain Rule Protection over the Internet Using PUGGAD Algorithm
Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.