Open Access   Article Go Back

A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script

T. Madhavi Kumari1 , A. Vinaya Babu2

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-6 , Page no. 91-96, Jun-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i6.9196

Online published on Jun 30, 2021

Copyright © T. Madhavi Kumari, A. Vinaya Babu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. Madhavi Kumari, A. Vinaya Babu, “A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.6, pp.91-96, 2021.

MLA Style Citation: T. Madhavi Kumari, A. Vinaya Babu "A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script." International Journal of Computer Sciences and Engineering 9.6 (2021): 91-96.

APA Style Citation: T. Madhavi Kumari, A. Vinaya Babu, (2021). A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script. International Journal of Computer Sciences and Engineering, 9(6), 91-96.

BibTex Style Citation:
@article{Kumari_2021,
author = {T. Madhavi Kumari, A. Vinaya Babu},
title = {A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2021},
volume = {9},
Issue = {6},
month = {6},
year = {2021},
issn = {2347-2693},
pages = {91-96},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5354},
doi = {https://doi.org/10.26438/ijcse/v9i6.9196}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i6.9196}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5354
TI - A Novel Hybrid Symmetric Key Encryption Algorithm for Telegu Script
T2 - International Journal of Computer Sciences and Engineering
AU - T. Madhavi Kumari, A. Vinaya Babu
PY - 2021
DA - 2021/06/30
PB - IJCSE, Indore, INDIA
SP - 91-96
IS - 6
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
266 269 downloads 146 downloads
  
  
           

Abstract

Technology is the key to innovation in all aspects of this modern age. In any technology, data becomes the most important asset to protect. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across the platform. Encrypting the message using natural languages reduces encryption time and improves performance. Telugu is the oldest Dravidian language spoken in South India. The message to be encoded is translated into Telugu, after which this translated text is converted into a randomly generated combination of 2-bit English alphabets. This is a hybrid algorithm because the intermediate node is encrypted using the standard advanced encryption algorithm to improve the privacy of the text. Because Telugu encryption method uses three phases, namely translation, mapping, and encryption, this makes the data much more secure than existing algorithms like Blowfish and Data Encryption Standard (DES), and the person trying to decrypt must have knowledge of the Telugu language, as well as mapping details to see the original data and This algorithm shows a stronger avalanche effect of 96.5%, which is greater than Blowfish and DES. Evaluation of the proposed algorithm shows that it runs faster and has relatively less encryption time, less memory requirements.

Key-Words / Index Term

Cryptography, Security, Telugu language, Encryption, AES

References

[1] Geetha R, Padmavathy T, Thilagam T, Lallithasree A. Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. Wireless Personal Communications.17:1-6, Dec. 2019.
[2] Chaudhary S, Dave M, Sanghi A, Manocha J. An elucidation on steganography and cryptography.InProceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies 4 (pp. 1-6).Mar 2016.
[3] Odeh A, Elleithy K, Faezipour M. A Reliable and Fast Real-Time Hardware Engine for Text Steganography. IEEE LISAT 2014 Long Island Systems, Applications and Technology. 1-6:2014.
[4] Reddy PC, Babu AS. A Novel Approach To Analysis District Level Long Scale Seasonal Forecasting Of Monsoon Rainfall In Andhra Pradesh And Telangana. International Journal of Advanced Research in Computer Science.1;8(9).Nov2017.
[5] Sucharitha Y, Vijayalata Y, Prasad VK. Analysis of Early Detection of Emerging Patterns from Social Media Networks: A Data Mining Techniques Perspective. InSoft Computing and Signal Processing.pp. 15-25,2019. Springer, Singapore.
[6] Al-Haidari F, Gutub A, Al-Kahsah K, Hamodi J. Improving security and capacity for arabic text steganography using ‘Kashida’extensions. In2009 IEEE/ACS International Conference on Computer Systems and Applications.10 (pp. 396-399). May2009.IEEE.
[7] Alkhudaydi M, Gutub A. Securing Data via Cryptography and Arabic Text Steganography. SN Computer Science.2(1):1-8, Feb. 2021.
[8] Gutub A, Alaseri K. Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arabian Journal for Science and Engineering.4:1-26, Jul 2019.
[9] Baker SI, Al-Hamami AH. Novel algorithm in symmetric encryption (NASE): Based on feistel cipher. In2017 International Conference on New Trends in Computing Sciences (ICTCS) 11 (pp. 191-196) Oct. 2017.IEEE.
[10] Gupta A, Semwal S, Johari R. METHS: Mapping from English language to Hindi language for secure commercial transactions. In2016 International Conference on Computing, Communication and Automation (ICCCA) 29, pp. 112-116, Apr. 2016.IEEE.
[11] Vidhya PM, Paul V. A method for text steganography using Malayalam text.Procedia Computer Science.Jan 1;46:524-31.2015.
[12] Khairullah M. A novel steganography method using transliteration of Bengali text.Journal of King Saud University-Computer and Information Sciences.Jul 1;31(3):348-66.2019.
[13] Taha A, Hammad AS, Selim MM. A high capacity algorithm for information hiding in Arabic text.Journal of King Saud University-Computer and Information Sciences.2018 Jul 25.
[14] Hamzah AA, Khattab S, Bayomi H. A linguistic steganography framework using Arabic calligraphy.Journal of King Saud University-Computer and Information Sciences.2019 May 3.
[15] Roy S, Venkateswaran P. A text based steganography technique with Indian root. Procedia Technology. Jan 1;10:167-71.2013.
[16] Bharati PV, Prasad KJ. Cryptic transmission of Telugu Text. In2016 International Conference on Information Communication and Embedded Systems (ICICES) Feb 25 (pp. 1-6). 2016. IEEE.
[17] Changder S, Ghosh D, Debnath NC. Linguistic approach for text steganography through Indian text.In2010 2nd international conference on computer technology and development Nov 2 (pp. 318-322).2010.IEEE.
[18] Rao GS, Imanuddin M, Harikumar B. Script Identification of Telugu, English and Hindi Document Image. Int. J. Adv. Eng. Global Technol. 2(2):443-52, 2014.
[19] Das MS, Reddy CR, Rahul K, Govardhan A. Multilingual Optical Character Recognition System for Printed English and Telugu Base Characters. International Journal of Science and Advanced Technology (ISSN 2221-8386).Jun;1(4):106-11.2011.
[20] Shalini M, Indira B. Automatic Character Recognition of Indian Languages–A brief Survey. International Journal of Innovative Science, Engineering & Technology, Apr;1(2):131-8.. 2014.
[21] Shaker Reddy PC, Sureshbabu A. An Enhanced Multiple Linear Regression Model for Seasonal Rainfall Prediction. International Journal of Sensors Wireless Communications and Control.Aug 1;10(4):473-83.2020.