透過您的圖書館登入
IP:18.220.16.184
  • 期刊

Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem

並列摘要


The purpose of cryptography is to ensure information is made in such a way that an unintended individual will not have access to it or does not understand what it means when intercepted on a communication network. Some people try to defeat this purpose by using an extra ordinary means to harm the algorithmic construct of the system. The effort required for this purpose depends on the complexity of the algorithm and the number of cryptographic-ciphers used. Given that effort required to cryptanalyze ciphertext when one-algorithmic transformation was made is x-effort, then the effort required when n-algorithmic transformation was done is nx-effort. This paper implements multilevel encryption algorithm using two cryptosystem; RSA and Substitution cryptosystem with one transformation per each. It presents an algorithmic paradigm which can be implemented using any programming language. It simplifies the stages used for both encryption and decryption, presenting each stage in a sequential order.

參考文獻


Adebayo, O.S.,Waziri, V.O.,Ojeniyi, J.A.,Bashir, S.A.,Mishra, A.(2012).Information security on the communication network in Nigeria based on digital signature.International Journal of Computer Science & Information Security (IJCSIS).10(11),57-63.
Adio, A.T.,Adekoya, A.F.,Oluwafemi, O.E.(2011).Multi-level cryptographic functions for the functionalities of open database system.Computer Technology and Application.2(9),730-735.
Akl, S.G.,Taylor, P.D.(1982).Cryptographic solution to a multilevel security problem.Advances in Cryptology: Proceedings of Crypto 82.(Advances in Cryptology: Proceedings of Crypto 82).:
Bruce, S.(1996).Applied Cryptography. Protocols, Algorithms, and Source Code in C.New York, NY:Wiley.
Chaitanya, S.,Urgaonkar, B.,Sivasubramaniam, A.(2006).Multi-level crypto disk: secondary storage with improved performance vs security trade-offs.Technical Report CSE-09-006.(Technical Report CSE-09-006).,::Department of Computer Science and Engineering, The Pennsylvania State University.

延伸閱讀