CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Multi-Cipher Single Message Encryption Algorithm

by Mohammad Hjouj Btoush, Khalaf F. Khatatneh, Qutaiba A. Al-talaq
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 8
Year of Publication: 2013
Authors: Mohammad Hjouj Btoush, Khalaf F. Khatatneh, Qutaiba A. Al-talaq
10.5120/12758-5886

Mohammad Hjouj Btoush, Khalaf F. Khatatneh, Qutaiba A. Al-talaq . Multi-Cipher Single Message Encryption Algorithm. International Journal of Computer Applications. 73, 8 ( July 2013), 2-4. DOI=10.5120/12758-5886

@article{ 10.5120/12758-5886,
author = { Mohammad Hjouj Btoush, Khalaf F. Khatatneh, Qutaiba A. Al-talaq },
title = { Multi-Cipher Single Message Encryption Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 8 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 2-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number8/12758-5886/ },
doi = { 10.5120/12758-5886 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:29.166836+05:30
%A Mohammad Hjouj Btoush
%A Khalaf F. Khatatneh
%A Qutaiba A. Al-talaq
%T Multi-Cipher Single Message Encryption Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 8
%P 2-4
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Different types of data are produced, stored, transmitted or exchanged, and in most of the cases the privacy of the data is a requirement; this issue enforces the inventing of a secure way to send the data using the encryption. These days most of the encryption algorithms based on the idea of (Public - Private Key), so that the process of encryption uses a key known to everyone and the decryption process uses a different private key, such as the RSA. The problem in these algorithms is the giving of the same cipher-text each time you encrypt a particular text using a specific key, which makes it easier to discover the original text by relating the encrypted text to a well-known decrypted text. The main purpose of this research is to build a reliable, an efficient, and a more secure algorithm for encryption. This algorithm gives multiple ciphers for a specific message using the same key and produces the original message once we decrypt these ciphers; this will make the process of hacking by relating the cipher to the text so difficult. This research paper will compare different algorithms with the new algorithm, and will demonstrate the implementation of an application that shows each one of these algorithms including the new one using a well-known programming language.

References
  1. http://www. freesoft. org/CIE/Topics/57. htm
  2. T. G. Gao, and Z. Q. Chen. (2008). "Image encryption based on a new total shuffling algorithm, Chaos, Solitons and Fractals," vol. 38, no. 1, pp. 213-20.
  3. Brendan M. Palfreyman (2009). Note, Lessons from the British and American Approaches to Compelled Decryption, 75 BROOK. L. REV. 345, 349-50 (describing historical uses of cryptography and the development of cryptography over time).
  4. Shiguo Lian, Dimitris Kanellopoulos and Giancarlo Ruffo (2009). "Recent Advances in Multimedia Information System Security," International Journal of Computing and Informatics, Vol. 33, No. 1, pp. 3-24.
  5. Menezes, A. , P. Van Oorschot and S. Vanstone (1996). Handbook of Applied Cryptography, CRC Press, pp. 4-15, 516.
  6. Fred Cohen (1995). "A Short History of Cryptography" Guy E. Blelloch (2000).
  7. Goldwasser S. and Bellare M. , A. (2001), "Lecture Notes on Cryptography", Cambridge, Massachusetts.
  8. Carter B. and Magoc T. , S. (2007), "Classical Ciphers and Cryptanalysis", Technical Report (2007).
  9. Meyer P. , (1997), "An Introduction to the Use of Encryption", http://www. hermetic. ch/crypto/intro. htm
  10. Adleman L. , Rivest R. , Shamir A. , and Williamson M. , (2000), "Public Key Cryptography (PKC) History", http://www. livinginternet. com/i/is_crypt_pkc_inv. htm
  11. Lenstra K. A. , (2001), "Unbelievable Security Matching AES security using public key systems", 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption RSA DES AES Symmetric Asymmetric