Billions of emails are sent all over the world. Many a times these emails contain sensitive information.
The email system providers do provide security for the emails sent. But if the authentication is compromised then
the whole Pandora of sensitive information will be out in the open. So, the paper provides a system called as the
‘Advance Cipher Technique (ACT)’ to secure the contents of the emails before it is sent over the email. The paper
proposes to secure the email contents by using substitution and permutation, with the fronts provided by the email
systems acting as the keys.
A Survey on Different Data Hiding Techniques in Encrypted Images
This document provides a survey of different data hiding techniques, with a focus on reversible data hiding in encrypted images. It begins with an introduction to data hiding and its importance for data security. Then it reviews various data hiding techniques, including those that hide data in audio signals, video sequences, and DNA sequences. It also discusses reversible data hiding techniques for encrypted images. The document concludes with a table that compares different data hiding techniques and highlights their advantages, such as increased hiding capacity and difficulty for attackers to detect hidden data. The survey finds that reversible data hiding techniques for encrypted images can achieve high-quality decrypted images with independent extraction and decryption.
This document presents a new mathematical model for encrypting data using fingerprint data. It works as follows:
1. A fingerprint image is used to generate an encryption key by determining the number of black pixels. This key will be unique for each user.
2. The key is used to generate a very large number to represent each letter or character. Different digits of this number represent different letters.
3. The plaintext is converted to this numerical representation to generate the ciphertext. Additional functions may be applied to further encrypt the ciphertext.
4. To decrypt, the receiver applies the inverse functions and uses the key to determine the letter associated with each number to recover the plaintext. The model is intended to provide highly
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
The document describes a proposed e-learning system that uses cryptography and data mining techniques to provide security and personalized recommendations. Elliptic curve cryptography is used to authenticate users and encrypt data for security. A decision tree algorithm classifies learner information and course content to recommend additional courses tailored to each learner's interests and behavior. The system aims to address security and privacy issues in e-learning while enhancing the learning experience through targeted content filtering and recommendations.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
This document provides a survey of different data hiding techniques, with a focus on reversible data hiding in encrypted images. It begins with an introduction to data hiding and its importance for data security. Then it reviews various data hiding techniques, including those that hide data in audio signals, video sequences, and DNA sequences. It also discusses reversible data hiding techniques for encrypted images. The document concludes with a table that compares different data hiding techniques and highlights their advantages, such as increased hiding capacity and difficulty for attackers to detect hidden data. The survey finds that reversible data hiding techniques for encrypted images can achieve high-quality decrypted images with independent extraction and decryption.
This document presents a new mathematical model for encrypting data using fingerprint data. It works as follows:
1. A fingerprint image is used to generate an encryption key by determining the number of black pixels. This key will be unique for each user.
2. The key is used to generate a very large number to represent each letter or character. Different digits of this number represent different letters.
3. The plaintext is converted to this numerical representation to generate the ciphertext. Additional functions may be applied to further encrypt the ciphertext.
4. To decrypt, the receiver applies the inverse functions and uses the key to determine the letter associated with each number to recover the plaintext. The model is intended to provide highly
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...IRJET Journal
The document describes a proposed e-learning system that uses cryptography and data mining techniques to provide security and personalized recommendations. Elliptic curve cryptography is used to authenticate users and encrypt data for security. A decision tree algorithm classifies learner information and course content to recommend additional courses tailored to each learner's interests and behavior. The system aims to address security and privacy issues in e-learning while enhancing the learning experience through targeted content filtering and recommendations.
KNOWLEDGE-BASED AUTHENTICATION USING TWITTER CAN WE USE LUNCH MENUS AS PASSWO...IJNSA Journal
This document proposes using Twitter direct messages to collect lunch menus as dynamic questions and answers for knowledge-based authentication. A user study was conducted where university students answered daily lunch questions on Twitter over 6 weeks. These responses were stored as question/answer pairs and used to authenticate login attempts. Authentication was most effective when questions covered the previous week, balancing security and memory. The study showed this approach could ease authentication burdens compared to static passwords or hardware tokens, while achieving convenience and cost-effectiveness.
This document summarizes public key cryptography and asymmetric encryption algorithms. It discusses how public key cryptography uses two different but mathematically related keys, a public key for encryption and a private key for decryption. The public key can be shared openly, while the private key is kept secret by the recipient. It also describes how asymmetric algorithms are slower than symmetric algorithms but allow anyone to encrypt messages for a recipient using their public key, with only the recipient able to decrypt it with their private key. Examples of asymmetric algorithms discussed include RSA.
The document discusses methods for statistical spelling correction based on decision theory. It defines the spelling correction problem and previous approaches. It then presents two new methods: 1) Evaluating the error rate per sentence using Bayes optimal and approximate algorithms based on dynamic programming. 2) Evaluating the error rate per word also using Bayes optimal and approximate algorithms like the BCJR algorithm. The goal is to minimize error rates with computational efficiency for real-world applications.
This document provides an introduction and overview of text analytics for SMS spam filtering classification. It discusses the classification of spam and ham SMS, describes the company Sky Bits Technology which focuses on analytics solutions, and performs Porter's Five Forces and SWOT analyses of the analytics industry and company. It also covers basic concepts in text mining such as preprocessing, transformation, feature selection, and classification methods. The objective is to develop a text classification model using R Studio to automatically categorize SMS as spam or ham.
New approach in symmetric block cipher security using a new cubical techniqueijcsit
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is
called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really
appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.
The document proposes a coding method as an alternative to encryption for providing security. It builds a coding table based on ASCII that assigns codes to common words, characters, and symbols in a way that eliminates frequency analysis. The method encodes text by looking up words and characters in the table and adding an encoded word count at the end for verification. This coding approach aims to provide security while saving time and effort compared to encryption methods.
Analysis review on feature-based and word-rule based techniques in text stega...journalBEEI
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation of the techniques used in text steganography. This paper aims to identify the main techniques of text steganography, which are feature-based, and word-rule based, to recognize the various techniques used with them. As a result, the primary technique used in the text steganography was feature-based technique due to its simplicity and secured. Meanwhile, the common parameter metrics utilized in text steganography were security, capacity, robustness, and embedding time. Future efforts are suggested to focus on the methods used in text steganography.
Ternary Tree Based Approach For Accessing the Resources by Overlapping Member...IJECEIAES
In cloud computing, immediate access of resources is important due to cost incurred to customer by pay per use model of cloud computing. Usually resource is protected by using cryptography technique. The resource may be shared by multiple members in group. There can be overlapping members to access the multiple resources. Group key management is important to form the group key to access the resource. Group key formation time is crucial for immediate access of protected resource in cloud computing. Thus ternary tree based approach is proposed to form the key for overlapping members accessing resources. Membership event such as join and leave also considered. Through the analysis, it is found that computational overhead is reduced by 23% if ternary key trees are combined than independent ternary key trees. It is also observed that combined ternary key tree outperforms the combined binary key tree approach for group key formation by considering overlapping members. Security requirement analysis of group membership for key formation is also provided in the paper.
Review on feature-based method performance in text steganographyjournalBEEI
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the solution to protect the information that is able to hide the hidden message that is unrecognized by human or machine vision. This paper concerns about one of the categories in steganography on medium of text called text steganography that specifically focus on feature-based method. This paper reviews some of previous research effort in last decade to discover the performance of technique in the development the feature-based on text steganography method. Then, ths paper also concern to discover some related performance that influences the technique and several issues in the development the feature-based on text steganography method.
Privacy Protectin Models and Defamation caused by k-anonymityHiroshi Nakagawa
Introduction of Privacy Protection Mathematical Models are the topics of this slide. The Models explained are 1) Private Information Retrieval, 2) IR with Homomorphic Encryption, 3) k-anonymity, 4) l-diversity, and finally 5) Defamation caused by k-Anonymity
This document proposes an efficient multi-keyword ranked search (EMRS) scheme over encrypted mobile cloud data through blind storage. The EMRS enables search users to perform multi-keyword searches over encrypted documents stored on a cloud server and receive ranked search results based on relevance. It utilizes techniques like relevance scoring, secure k-nearest neighbor computation, and blind storage to provide search functionality while preserving security and privacy. The scheme is analyzed to demonstrate that it achieves confidentiality of documents and index, trapdoor privacy, trapdoor unlinkability, and conceals access patterns, addressing key security requirements. Experimental results show the EMRS provides improved efficiency and functionality compared to existing proposals.
Anonymization techniques are used to ensure the privacy preservation of the data owners, especially for personal and sensitive data. While in most cases, data reside inside the database management system; most of the proposed anonymization techniques operate on and anonymize isolated datasets stored outside the DBMS. Hence, most of the desired functionalities of the DBMS are lost, e.g., consistency, recoverability, and efficient querying. In this paper, we address the challenges involved in enforcing the data privacy inside the DBMS. We implement the k-anonymity algorithm as a relational operator that interacts with other query operators to apply the privacy requirements while querying the data. We study anonymizing a single table, multiple tables, and complex queries that involve multiple predicates. We propose several algorithms to implement the anonymization operator that allow efficient non-blocking and pipelined execution of the query plan. We introduce the concept of k-anonymity view as an abstraction to treat k-anonymity (possibly, with multiple k preferences) as a relational view over the base table(s). For non-static datasets, we introduce the materialized k-anonymity views to ensure preserving the privacy under incremental updates. A prototype system is realized based on PostgreSQL with extended SQL and new relational operators to support anonymity views. The prototype system demonstrates how anonymity views integrate with other privacy- preserving components, e.g., limited retention, limited disclosure, and privacy policy management. Our experiments, on both synthetic and real datasets, illustrate the performance gain from the anonymity views as well as the proposed query optimization techniques under various scenarios.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
This document summarizes a research paper that proposes a method for detecting suspicious emails using decision trees. The method extracts keywords and indicators from emails to classify them as suspicious, not suspicious, or possibly suspicious. An ID3 decision tree algorithm is used to analyze patterns in a training set of pre-classified emails and generate rules to classify new emails. The tree is built by recursively partitioning attributes based on their information gain. The resulting decision tree and rules can then be used to detect suspicious emails, which could help identify potential criminal activities or security threats.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
This document discusses a text-based fuzzy clustering algorithm to filter spam emails. It begins with an introduction discussing how most classification approaches are for structured data but large amounts of unstructured data are transmitted online. It then discusses spam emails being a major problem and filtering being an important approach. The paper aims to use a fuzzy clustering approach called Fuzzy C-Means to classify emails. It describes the training and testing modules, which extract features from emails to create vector space models and then applies the fuzzy clustering algorithm to determine if emails are spam or not spam. Evaluation results show the precision and accuracy of the approach on different datasets, with the author concluding the vector space model with fuzzy C-Means works well for both small and large datasets.
Text Based Fuzzy Clustering Algorithm to Filter Spam E-mailijsrd.com
This document summarizes a research paper that proposes using a text-based fuzzy clustering algorithm to filter spam emails. Specifically, it uses a fuzzy c-means algorithm on a vector space model of emails. The vector space model represents emails as vectors of weighted terms. The fuzzy c-means algorithm allows emails to belong to more than one cluster (spam or not spam) with varying membership degrees. The paper evaluates the proposed system on a testing dataset, calculating precision and accuracy metrics. Results show the approach works well for both small and large datasets, with larger training datasets yielding higher accuracy.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
This document presents a proposed email server that uses 3DES encryption for secure email communication. The existing email systems are vulnerable without proper security measures. The proposed system encrypts email contents and the user inbox using 3DES encryption. It implements IMAP, SMTP, and SSL protocols for email transfer and communication between the client and server. The system consists of modules for user registration, login using one-time passwords, email composition, encryption of composed emails using 3DES before transmission, decryption of received emails, and a contact list. The system aims to provide a secure email solution by encrypting all communication and preventing unauthorized access to email contents even if the account is compromised.
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
As people have become more social and electronically attached, the concern for information sharing over the internet still persist. As known many powerful cryptographical approaches have been proposed in the past which are practically impossible to break, yet there exists a major concern of total encryption and decryption time taken as a whole. It is a known fact that in encrypting a large chunk of data, traditional asymmetric key algorithm may be slower to symmetric key algorithm by 1000 times or more. Hence this paper proposes a hierarchical structure in which the parties are first authenticated, then exchange keys by asymmetric key algorithm, then do actual encryption and decryption by the symmetric key algorithm. This will be useful to improve the security in cloud applications.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
Bt0088 cryptography and network security1Techglyphs
The document discusses various topics related to cryptography and network security including:
1. The need for network security to prevent damage to organizations from hostile software or intruders.
2. Security attacks are any actions that compromise information security, while vulnerabilities are weaknesses that can be exploited by threats to cause harm.
3. The difference between substitution and transposition techniques for encryption, where substitution exchanges letters and transposition rearranges them.
4. Caesar cipher encryption of a sample plaintext using a key of 3.
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
Security has been an issue from the inception of computer systems and experts have related security issues with usability. Secured systems must be usable to maintain intended security. Password Authentication Systems have either been usable and not secure, or secure and not usable. Increasing either tends to complicate the other.
Text passwords are widely used but suffer from poor usability, reducing its security. Graphical Passwords, while usable, does not seem to have the security necessary to replace text passwords. Attempts using text or graphics only have mixed results. A combination password is proposed as a potential solution to the problem.
This paper explores combination as a means of solving this password problem. We implemented three password systems: Text only, Graphics only and a Combination of Text and Graphics. Remote evaluations were conducted with 105 computer science students. Results from our evaluations, though not conclusive, suggest promise for combination passwords.
This document proposes a method for preventing cheating of messages based on block cipher using a digital envelope. It begins with an introduction to the need for data security during storage and transmission. It then discusses the AES encryption algorithm and related work involving encryption for wireless devices. The proposed method uses AES key expansion techniques to generate multiple keys for encryption and decryption of messages using a digital envelope, packing the encrypted message and key into a single packet. It claims this prevents attackers from accessing sensitive data. Future work could expand this to image encryption and decryption applications.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper proposes a novel encryption algorithm that is a hybrid of transposition and substitution methods. The algorithm encrypts messages without using an external key, as the key is derived from characteristics of the original message itself. This solves the problem of securely exchanging keys. Both transposition and substitution have limitations individually, so the hybrid approach results in a more secure cipher. The encryption process involves converting characters to ASCII codes, grouping characters, and reversing the order within groups. Decryption reverses these steps to retrieve the original plaintext. The algorithm aims to provide strong security without relying on external keys.
This document provides an introduction and table of contents to cryptography. It discusses the main goals of cryptography which are confidentiality, data integrity, authentication, and non-repudiation. It then defines key vocabulary terms used in cryptography such as plaintext, ciphertext, encryption, decryption, stream ciphers, block ciphers, and cryptosystems. Finally, it provides a brief high-level history of cryptography mentioning examples from 400 BC Spartan sky tale cipher to Julius Caesar's substitution cipher.
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...IJNSA Journal
Electronic mail, commonly known as email, is a crucial technology that enables streamlined operations and communications in corporate environments. Empowering swift and dependable transactions, email is a driving force behind heightened productivity and organizational effectiveness. However, its versatility also renders it susceptible to misuse by cybercriminals engaging in activities such as hacking, spoofing, phishing, email bombing, whaling, and spamming. As a result, effective and efficient data analysis is important in avoiding and detecting cyber-attacks and crime on times. To overcome the above challenges, a novel approach named Aquila Optimization (AO) is used in this paper to find the best set of hyperparameters of the Stacked Auto Encoder (SAE) classifier. The purpose of increasing the hyperparameters of the SAE using the AO is to obtain a higher text classification accuracy. Then the optimized SAE classifies the selected features into different classes. The experimental results showed that the proposed AO-SAE model outperforms the existing models such as Logistic Regression (LR) and Long Short-Term Model based Gated Current Unit (LSTM based GRU) in terms of Accuracy.
Data Security Through Crypto-Stegano Systemsrinzindorjej
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
This document summarizes security issues with email and attempts to solve them. It discusses how email relies on the insecure SMTP protocol and how encryption methods like PKI and PGP have issues. Future developments aim to replace SMTP with more secure protocols like XMPP and create easy-to-use encryption solutions like Dark Mail and Confimail to encourage widespread encryption use. Government surveillance of communications and law enforcement access to data pose ongoing challenges to email privacy.
AN EMPIRICAL ANALYSIS OF EMAIL FORENSICS TOOLSIJNSA Journal
Emails are the most common service on the Internet for communication and sending documents. Email is used not only from computers but also from many other electronic devices such as tablets; smartphones, etc. Emails can also be used for criminal activities. Email forensic refers to the study of email detail and content as evidence to identify the actual sender and recipient of a message, date/time of transmission, detailed record of email transaction, intent of the sender, etc. Email forensics involves investigation of metadata, keyword, searching, port scanning and generating report based on investigators need. Many tools are available for any investigation that involves email forensics. Investigators should be very careful of not violating user’s privacy. To this end, investigators should run keyword searches to reveal only the relevant emails. Therefore, knowledge of the features of the tool and the search features is necessary for the tool selection. In this research, we experimentally compare the performance of several email forensics tools. Our aim is to help the investigators with the tool selection task. We evaluate the tools in terms of their keyword search, report generation, and other features such as, email format, size of the file accepted, whether they work online or offline, format of the reports, etc. We use Enron email dataset for our experiment.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Similar to Advance Cipher Technique to Secure Email Contents (20)
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This document discusses the importance of leadership in leading an organization towards improvement and development. It states that leadership is responsible for providing a clear vision and strategy to successfully achieve that vision. Effective leadership can impact the success of an organization by controlling its direction and motivating employees. Leadership is different from traditional management in that it guides employees towards organizational goals through open communication and motivation, rather than simply directing work. The paper concludes that only leadership can lead an organization to change according to its evolving environment, while management may simply follow old rules. Leadership is key to adapting to new market needs and trends.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
The document summarizes research on a nano composite polymer gel electrolyte containing SiO2 nanoparticles. Key points:
1. Polyvinylidene fluoride-co-hexafluoropropylene polymer was used as the base polymer mixed with propylene carbonate, magnesium perchlorate, and SiO2 nanoparticles to synthesize the nano composite polymer gel electrolyte.
2. The electrolyte was characterized using XRD, SEM, and FTIR which confirmed the homogeneous dispersion of SiO2 nanoparticles and increased amorphous nature of the electrolyte, enhancing its ion conductivity.
3. XRD showed decreased crystallinity and disappearance of polymer peaks upon addition of SiO2. SEM revealed
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Advance Cipher Technique to Secure Email Contents
1. Volume 1, Issue 1 (2018)
Article No. 1
PP 1-6
1
www.viva-technology.org/New/IJRI
Advance Cipher Technique to Secure Email Contents
Tatwadarshi P. Nagarhalli1
1
(Computer Engineering Department, VIVA Institute of Technology, India)
Abstract: Billions of emails are sent all over the world. Many a times these emails contain sensitive information.
The email system providers do provide security for the emails sent. But if the authentication is compromised then
the whole Pandora of sensitive information will be out in the open. So, the paper provides a system called as the
‘Advance Cipher Technique (ACT)’ to secure the contents of the emails before it is sent over the email. The paper
proposes to secure the email contents by using substitution and permutation, with the fronts provided by the email
systems acting as the keys.
Keywords – Advance Cipher Technique, Email Security, Data Security, Substitution Cipher, Permutation.
1. INTRODUCTION
There are a total of about 7.5 Billion human souls in on the planet as on 30th June, 2017. Of this, about
3.9 Billion people use internet. That is, around 51.7% of the human population on earth use internet for some
purpose or the other [1]. The purpose might be anything, form shopping to reading reviews to communication to
socializing.
One of the important tasks for which the internet is used is communication through emails. Electronic
Mails or emails are used universally by individuals, business or governments [2].
According to one estimate in 2015 2.6 Billion users were using emails for communication. And, this
number is set to grow to 2.9 Billion by 2019 [3]. Also, about 205 Billion emails were sent/received, which is said
to grow to about 246 Billion by 2019 [3]. Even the defence forces use emails for communication among
themselves. Often these email services used by the defence forces are exclusive and secure. But there have been
instances where the defence emails have also been leaked [4]. So securing the emails are of utmost importance.
The paper proposes a new why in which data can be secured with fonts as a key, before it is sent over an
unsecured channels like emails.
2. SECURITY SYSTEM
There are two ways in which data can be secured cryptography and steganography. In cryptography the
data which is to be secure is converted to some unreadable form with the help of some mathematical formulas [5].
Whereas, in steganography the data which is to be secured is embedded into some other medium like text, image,
video and audio [6].
In cryptography the data to be secured also called as the plain text is converted to an unreadable from
called as the cipher text with the help of a key, this process is called as the encryption. And at the receiver side
the original message can be extracted from this cipher text with the help of a key. Fig. 1 shows the general process
of encryption and decryption.
2. Volume 1, Issue 1 (2018)
Article No. 1
PP 1-6
2
www.viva-technology.org/New/IJRI
Fig. 1 Encryption and Decryption [7]
There are essentially two ways in which the plain text can be converted into cipher text. These two ways
are stream cipher technique and block cipher technique. Fig. 2 shows the type of cryptography algorithms.
Fig. 2 Types of Cryptography Algorithms
The stream cipher transforms the plain text to cipher text one symbol at a time. Whereas the block cipher
converts a group of symbols in the plain text to cipher text at a time [8]. Fig. 3 shows the block diagram of stream
cipher. And, Fig. 4 shows the block diagram of Block cipher.
Fig. 3 Steam Cipher
3. Volume 1, Issue 1 (2018)
Article No. 1
PP 1-6
3
www.viva-technology.org/New/IJRI
Fig. 4 Block Cipher
3. RELATED WORKS
As Tianlin Li et. al. [2] demonstrate, most of the email systems try to provide as much security as they
can. In general, email systems like the Gmail secure the email data using the S/MIME. S/MIME stands for
Secure/Multipurpose Internet Mail Extensions. S/MIME provides the following security services Authentication,
Message integrity, Non-repudiation of origin (using digital signatures), Privacy and Data security (using
encryption) [9].
The S/MIME does provide a credible amount of security. But the problems remains that what if the
account passwords gets leaked or hacked, in such cases it is impossible to secure the email content. So, a system
or a mechanism is required which can secure the data before it is sent via the email systems.
There have been systems which have been proposed to secure the email data. Apeksha Nemavarkar and
Rajesh Kumar Chakrawarti [10] provide a multi-step email verification system. Whereas B. Suresh Kumar and
V. P. Jagathy Raj [11] provide a system which encrypts the data according to the identity of the user. Paper [11]
does work on the data level of the email contents but paper [10] propose a system which performs verification of
the user and not on the data.
There have also been system which propose to secure the email data with the help of steganography like
a system proposed by B. Veera Jyothi et. al. [12]. On the other hand Salvatore J. Stolfo et. al. [13] propose to
secure the emails by studying the behavioural patterns and allowing the email to be read by only those who confirm
with the behavioural patterns of the verified user.
Yogendra Kumar Jain and Pramod B. Gosavi [14] provide a system to not only encrypt the data but also
to tries to compress the data. The cipher text key is defined from the receiver user id and the character is converted
to cipher text with different key, also the key incremented every time by one. Even though the paper tries to ensure
the security of the email data the key is easily identifiable.
M. Ferris [15] on the other hand talks about the security infrastructure that is required to secure an email
system. The author does not talk about the contingency plan if the emails are compromised.
A. Malatras et. al. [16] reviews the outstanding privacy and security risks in email communications and
describes a set of countermeasures, based on combinations of existing standards, which are capable of effectively
mitigating the identified risks. Also, based on the analysis the authors propose a set of technical recommendations
for email providers that needs to be followed to enhance security, whilst preserving the compatibility of the
ecosystem.
W. Bai et. al. [17] observed that for the sake of usability many a times the security is compromised. So,
they propose a system which tilt the trade-off between usability and security in favour of security. The paper talks
about securing the email system and not much has been discussed about security of the data.
W. Bai et. al. [18] conduct a survey to find if people feel secure about the steps taken by the email system
to secure their data. The survey finds out that most people so feel secure but as the authors put it, there has to be
even more that could be done to secure the email contents.
So, in the current paper a system has been to secure the email data with the help of an Advance Cipher
Technique with the help of the fonts available for email communication.
4. Volume 1, Issue 1 (2018)
Article No. 1
PP 1-6
4
www.viva-technology.org/New/IJRI
4. PROPOSED SYSTEM
The paper proposes Advanced Cipher Technique using modified stream cipher system and fonts for
securing email contents. For the sake of convenience Gmail has been used as email system on which the proposed
system has been implemented.
The Gmail currently provides eleven fonts to choose from. These fonts include Sans Serif, Serif, Fixed
Width, Wide, Narrow, Comic Sans MS, Garamond, Georgia, Tahoma, Trebuchet MS and Verdana. In the
proposed system these font acts as a key to identifying the deciphering of the cipher text.
In the proposed system a message which is to be secured is grouped together containing five words each.
For example for a secret message “India is on the verge of attacking XYZ nation”; the message contains 9 words,
so two groups are formed. First group contains the words “India is on the verge”” and the second group contains
the words “of attacking XYZ nation”. The reason for grouping the complete sentence or paragraph into a groups
of words containing five words is that the proposed system works at five words at a time.
In the proposed system encryption and decryption takes in two phases. During encryption in the first
phase substitution cipher is applied and in the second phase permutation is carried out. Whereas permutation is
carried out first phase for decryption.
For encryption, in the first phase once the group has been formed each word is encrypted to get a cipher
text. The plain text is converted into cipher text with the help of substitution cipher. The key for this substitution
cipher is different for each word in a group and is also different for each font.
The formula can be given as
C = E(Ki)
Where Ki for Gmail would be K1 to K11 (The number of Fonts)
Table 1 gives the Advance Cipher Technique – Substitution Box (ACT-S Box), with the keys for each
fonts. For enhancing the security the ACT-S Box can changed from time to time as well.
Table 1: ACT-S Box (Substitution) Keys for different font
K1 K2 K3 K4 K5 K6 K7 K8 K9 K10 K11
First
Word
n n-2 n-4 n+6 n+1 n+7 n+5 n+0 n+2 n-2 n+9
Second
Word
n+2 n+3 n n+4 n+9 n-1 n+7 n-3 n+5 n-5 n-3
Third
Word
n+5 n+1 n+2 n+5 n-1 n-9 n-6 n n+1 n-1 n-1
Fourth
Word
n+1 n-6 n-2 n-5 n-3 n-5 n+9 n-4 n+9 n-9 n-8
Fifth
Word
n+8 n-4 n-3 n-7 n+2 n+3 n+6 n-6 n+7 n-7 n+1
Where ‘n’ is the length of that particular word.
After the plain text is converted to cipher text with the help of the ACT-S Box, permutation is carried out
as the second phase for encryption. Different set of permutation has been proposed for different fonts according
to the ACT-P Box. So, the fonts carry the key as to how the substitution and permutation is to be carried out.
Table 2 provides an outline for permutation of the data. The table gives the Advance Cipher Technique
– Permutation Box (ACT-P Box). The result received after applying ACT-S Box undergoes permutation with the
help of the ACT-P Box. As with the ACT-S even the ACT-P Box can be updated from time to time to enhance
the security of the system and keep the cracker guessing about the keys of the system.
Table 2: ACT-P Box (Permutation) for different fonts
First Word
shifted to
position -
Second Word
shifted to
position -
Third Word
shifted to
position -
Fourth Word
shifted to
position -
Fifth Word
shifted to
position -
Sans Serif, 4 3 1 5 2
Serif 2 4 5 3 1
Fixed Width 3 5 4 2 1
Wide 5 3 1 2 4
Narrow 5 4 2 1 3
Comic Sans
MS
2 5 1 3 4
Garamond 3 1 4 5 2
5. Volume 1, Issue 1 (2018)
Article No. 1
PP 1-6
5
www.viva-technology.org/New/IJRI
Georgia 4 5 2 1 3
Tahoma 5 3 4 2 1
Trebuchet MS 2 1 4 5 3
Verdana 4 5 1 5 2
For example:
If the secret message to be secured is “India is on attack mode”.
1. If the font ‘Sans Serif’ the cipher text would be
a. By using ACT-S Box we will get
nsinf mw vu haahjr yapq
b. Applying ACT-P Box on the above cipher text for the font Sans Serif we will get
vu yapq mw nsinf haahjr, this is the cipher text.
2. If the font ‘Fixed Width’ the cipher text would be
a. By using ACT-S Box we will get
joejb ku sr dwwdfn npef
b. Applying ACT-P Box on the above cipher text for the font Sans Serif we will get
npef dwwdfn joejb sr ku
So, it can be seen that with the change in the usage of font the cipher text undergoes a major change.
Once the cipher text is formed it can be sent to the intended receiver in the font selected for encryption. Only the
intended receiver who knows that the fonts act as a key and has the ACT system will be able to decrypt the
message.
5. ANALYSIS AND ADVANTAGES
The proposed system has many advantages
1. A simple way to secure email content.
2. The system provide two layers of security. The first one is with the help of the ACT-S Box and the second layer
is the permutation by using ACT-P Box.
3. With the change in the font the whole cipher text get changed. So, even the same message will produce a total
of eleven different cipher text while using different Gmail fonts.
4. In the same secret message different keys are used to create cipher text. This enhances security. Also,
scrambling of the words with the help of ACT-P Box makes it that much more difficult for the eves dropper to
decode the message.
5. Keys are not sent at all through unsecured channels. This also enhances security.
6. For more security the ACT-S Box keys and ACT-P Box permutation positions can be changed from time to
time.
7. Also, the implementation of temporal changes in the ACT-S Box and ACT-P Box will make the job of the
cracker very, very difficult.
6. CONCLUSION
The paper identifies that even though email system provide security if the authentication step of the email
systems is compromised the email content becomes available to all. This is undesirable. So, the paper provides a
simple yet effective way in which the email contents or the data can be secured.
The paper proposes an Advance Cipher Technique, where the fonts provided by the email systems, like
Gmail, act as a key. The system provides two layers of security to secure the email contents. The first one is with
the help of the ACT-S Box and the second layer is the permutation by using ACT-P Box.
By providing different keys for different words for the same font and scrambling of the encoded word
6. Volume 1, Issue 1 (2018)
Article No. 1
PP 1-6
6
www.viva-technology.org/New/IJRI
provides with an enhance security. Also, implementing temporal changes in ACT-S and ACT-P Boxes will further
enhance the security. The proposed system can be seamlessly integrated into an email system for easy usage.
REFERENCES
[1] http://www.internetworldstats.com/stats.htm. Last Accessed on 10th
September, 2017.
[2] T. Li, Mehta, and A. P. Yang, “Security Analysis of Email Systems”, IEEE 4th International Conference on Cyber Security and
Cloud Computing, 2017, pp. 91-96.
[3] The Radicati Group, Inc., “Email Statistics Report, 2015-2019”, http://www.radicati.com/wp/wp-content/uploads/2015/02/Email-
Statistics-Report-2015-2019-Executive-Summary.pdf.
[4] http://www.thejournal.ie/irish-defence-forces-hacking-team-2206527-Jul2015/, Last Accessed on 10th
September, 2017.
[5] M. Pavan, S. Naganjaneyulu and C. Nagaraju, “A Survey on LSB Based Steganography Methods”, International Journal of
Engineering and Computer Science, Vol.2, Issue 8, August 2013.
[6] T. P. Nagarhalli and A. M. Save, “A Cross Lingual Approach for Hiding Hindi Text”, IEEE International Conference on
Innovations in information Embedded and Communication Systems (ICIIECS), 2017, pp. 415-419.
[7] N. Queen, “Principles of modern cryptography”, http://www.queen.clara.net/pgp/art6.html, Last Accessed on 10th September,
2017.
[8] C. P. Pfleeger and S. L. Pfleeger, Security in Computing (Fourth Edition, Pearson Education, 2017).
[9] https://en.wikipedia.org/wiki/S/MIME, Last Accessed on 10th September, 2017.
[10] A. Nemavarkar and R. K. Chakrawarti, “A uniform approach for multilevel email security using image authentication,
compression, OTP & cryptography”, IEEE International Conference on Computer, Communication and Control (IC4), 2015.
[11] B. S. Kumar and V. P. J. Raj, “A Secure Email System Based on Identity Based Encryption”, IJWCNT, vol. 1, no. 1, August-
September 2012.
[12] B. V. Jyothi, S. M. Verma and C. U. Shanker, Implementation and Analysis of Email Messages Encryption and Image
Steganography Schemes for Image Authentication and Verification, IJCA Auguest, 2014.
[13] S. J. Stolfo, Chia-Wei Hu, Wei-Jen Li, S. Hershkop, K. Wang and O. Nimeskern, “Combining Behavior Models to Secure Email
Systems”, DARPA contract F, pp. 30602-00-1-0603.
[14] Y. K. Jain and P. B. Gosavi, “Email Security Using Encrption and Compression”, IEEE International Conference on
Computational Intelligence for Modelling Control & Automation, 2008.
[15] M. Ferris, “New Email Security Infrastructure”, IEEE ACM SIGSAC New Security Paradigms Workshop, 1994. Proceedings.,
1994.
[16] A. Malatras, I. Coisel and I. Sanchez, “Technical recommendations for improving security of email communications”, IEEE 39th
International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija,
2016, pp. 1381-1386.
[17] W. Bai, D. Kim, M. Namara, Y. Qian, P. G. Kelley and M. L. Mazurek, “Balancing Security and Usability in Encrypted
Email”, IEEE Internet Computing, vol. 21, no. 3, May-June 2017, pp. 30-38.
[18] W. Bai, D. Kim, N. Moses, Y. Qian, P. Gage Kelly and M. Mazurek, “Most of us trust our email provider”: Balancing security and
usability in encrypted email, in IEEE Internet Computing, vol. PP, no. 99, pp. 1-1.