Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure

Main Article Content

Noor Ibraheem
https://orcid.org/0000-0003-4495-0772
Mokhtar Hasan
https://orcid.org/0000-0002-4702-4320

Abstract

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for every single incoming letter. The present work can be applied efficiently for personal information security and network communication security as well, and the time required for ciphering and deciphering a message is less than 0.1 sec.

Article Details

How to Cite
1.
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure. Baghdad Sci.J [Internet]. 2020 Dec. 1 [cited 2024 Mar. 29];17(4):1320. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5656
Section
article

How to Cite

1.
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure. Baghdad Sci.J [Internet]. 2020 Dec. 1 [cited 2024 Mar. 29];17(4):1320. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5656

References

Jain M, Lenka SK, Vasistha SK. Adaptive circular queue image steganography with RSA cryptosystem. Perspectives in Science. 2016 Sep 1;8:417-20. Doi: http://dx.doi.org/10.1016/j.pisc.2016.04.093 2213

Kumar MK, Azam SM, Rasool S. Efficient Digital Encryption Algorithm Based On Matrix Scrambling Technique. IJNSA. 2010; 2(4). Doi: 10.5121/ijnsa.2010.2403

Phull S, Som S. Symmetric cryptography using multiple access circular queues (MACQ). InProceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. 2016 Mar 4 (pp. 1-6). https://doi.org/10.1145/2905055.2905166

Ogla RA. Symmetric-Based Steganography Technique Using Spiral-Searching Method for HSV Color Images. Baghdad Sci. J. 2019;16(4):948-58. DOI: http://dx.doi.org/10.21123/bsj.2019.16.4.0948

Swain G, Lenka SK. A novel steganography technique by mapping words with LSB array. IJSISE. 2015 Jan 1;8(1-2):115-22.

Agarwal P, Agarwal N, Saxena R. Data encryption through fibonacci sequence and unicode characters. MIT International Journal of Computer Science and Information Technology. 2015 Aug;5(2):79-82.

Eric C. Hiding in plain sight, Stegnography and the art of Covert Communication. Wiley, Indianapolis, Indiana, ISBN. 2003;10:0471444499. Available at: https://dl.acm.org/citation.cfm?id=862089

Isaac ER, Isaac JH, Visumathi J. Reverse Circle Cipher for personal and network security. In2013 International Conference on Information Communication and Embedded Systems (ICICES) 2013 Feb 21 (pp. 346-351). IEEE. Available at: https://www.researchgate.net/publication/261054865_Reverse_Circle_Cipher_for_personal_and_network_security

Kallam Ravindra Babu, S.Udaya Kumar, A.Vinaya Babu, “A Survey on Cryptography and Steganography Methods for Information Security”, IJCA, Vol.12, No.2, pp. 0975 – 8887, 2010.

Jabbar KK, Hilal HA, Mohammed RS. Text Cryptography Using Multiple Encryption Algorithms Based on Circular Queue via Cloud Computing Environment. JATIT . 2018 Jun 30;96(12).

Sumayya KA, Abraham JP. Data Security Algorithm Using Circular Queue and Graycode. InProceedings of ICETIT 2019 2020 (pp. 993-1004). Springer, Cham.

Boneh D, Halevi S, Hamburg M, Ostrovsky R. Circular-secure encryption from decision diffie-hellman. InAnnual International Cryptology Conference 2008 Aug 17 (pp. 108-125). Springer, Berlin, Heidelberg. Available at: https://link.springer.com/chapter/10.1007/978-3-540-85174-5_7

Suri PR, Deora SS. A Cipher based on Multiple Circular Arrays. IJCSI. 2013 Sep 1;10(5):165.

Wisam A S, Khalid K J, Luheb K Q. A Proposed Hybrid Text Cryptographic Method Using Circular Queue. IJCET. 2018; 9(7) :1123–1132.

Nichat SP, Sikchi SS. Image encryption using hybrid genetic algorithm. IJARCSSE. 2013 Jan;3(1):427-31.

Ibraheem NA. Finger Identification and Gesture Recognition Using Gaussian Classifier Model. IJAER. 2016 Jan;11(10):6924-31.

Albahar MA, Olawumi O, Haataja K, Toivanen P. Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption. Journal of Information Security. 2018 Feb 12;9(2):168-76. Doi: 10.4236/jis.2018.92012

Mustafa A. Calculation of encryption algorithm combination for video encryption using two layers of AHP. In2016 10th International Conference on Telecommunication Systems Services and Applications (TSSA). 2016 Oct 6 (pp. 1-7). IEEE. DOI: 10.1109/TSSA.2016.7871099

Harini K, Pravallika N, Sashi R K. Enhancement of Data Security using Circular Queue Based Encryption Algorithm. IJITEE. 2019; 8 (12): 65-67.

Similar Articles

You may also start an advanced similarity search for this article.