Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Securing Informative Text using Color Visual Cryptography

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Anand Bali, Saud Ansari, Kalim Khan, Wasif Shaikh
10.5120/ijca2016908418

Anand Bali, Saud Ansari, Kalim Khan and Wasif Shaikh. Article: Securing Informative Text using Color Visual Cryptography. International Journal of Computer Applications 136(5):30-33, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Anand Bali and Saud Ansari and Kalim Khan and Wasif Shaikh},
	title = {Article: Securing Informative Text using Color Visual Cryptography},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {136},
	number = {5},
	pages = {30-33},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

The rising threats to information security are increasing at an alarming rate. The most powerful and universal approach to counter such threats is encryption. Conventional encryption techniques use substitution and transposition. Substitution technique change plaintext into cipher text. In all conventional substitution techniques characters, numbers and special symbols are replaced with other characters, numbers and special symbols. In this project, an innovative substitution method is proposed to generate a better cipher than the existing substitution algorithms. This method re-emphasizes on the substitution of characters, numbers and special symbols/characters with color blocks. This project is based on Play Color Cipher. The crypt-analysis is done on this will prove that the cipher is strong.

References

  1. Maram Balajee, ” UNICODE and Colors Integration tool for Encryption and Decryption”, International Journal on Computer Science and Engineering (IJCSE) Vol. 3 No. 3 Mar 2011.
  2. William Stallings, “Cryptography and Network Security, Principles and practice”, 5th edition, 2008.
  3. R.L.Rivest, Shamir and Adleman, “A Method of Obtaining Digital Signatures and Public Key Cyryptosystems Laboratory for Computer Science”, MIT Cambridge, 1978.
  4. B.A.Forouzan, “Cryptography and Network Security", 4th edition, 2008.
  5. Johan Hastad, “On using RSA with low exponent in a public key network”, Advances in Cryptology- CRYPTO ‟85, LNCS 218, pp. 403-408 1986.
  6. Nguyen, H. Number Theory and the RSA Public Key Cryptosystem. http://cdn.bitbucket.org/mvngu/numtheory
  7. National Bureau of Standards “Data Encryption Standard” FIPS-PUB, 46, Washington, D.C., Jan 1977. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf Accessed on 25/01/2016
  8. Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger, 2011, Biclique Cryptanalysis of the Full AES
  9. Debdeep Mukhopadhyay, IIT Kharagpur, http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/FormalCrypto/slides/Introduction.pdf Accessed on 25/01/2016
  10. Prof. K. RavindraBabu, Dr.S.Udaya Kumar, Dr.A.VinayaBabu and Dr.Thirupathi Reddy, “A block cipher generation using color substitution”,International Journal of Computer Applications Volume 1 – No. 28, 2010.
  11. Devyani Patil, Vishakha Nayak, Akshaya Sanghavi, Aparna Bannore, “Cryptography based on Color Substitution”, International Journal of Computer Application Volume 91 – No.16, April 2014.

Keywords

Cryptography, security, encryption, decryption, substitution, Play Color Cipher