Cryptography On Indian Languages: Dindayal Mahto Dindayal Mahto MT/IS/1009/10
Cryptography On Indian Languages: Dindayal Mahto Dindayal Mahto MT/IS/1009/10
Presented by
(Internal Guide) Prof. Sandip Dutta (Assco. Prof.) Dept of IT BIT Mesra, Ranchi
(External Guide) Prof.(Dr.) D.A. Khan (Assco. Prof.) Dept of CA NIT Jamshedpur
Objectives
1. Introduction 2. Proposed Methodology 3. Results and Discussions 4. Conclusions 5. Future Scope of Work 6. References
2
Literature Reviews
1. A Multilanguage Encryption Technique by G.P. Kr et al, 2010 Seventh International Conference on Information Technology, 978-0-7695-3984-3/10 2010 IEEE This algorithm that focuses on encryption of plain text over a range of languages supported by Unicode.
11
15
16
17
23
24
The above points can be mapped to the alphanumerical characters in two ways
27
28
30
31
32
34
35
36
Space required to store the original message = 100*8=800 bits Space required to store decoded messages =(45*1+13*3+12*3+16*3+9*4+5*4)=224 Compression Ratio=28%
37
2. Proposed Methodology
Working behaviors of new Algorithm have been discussed in following way:
For Sender
Step 1: Use of Huffman Encoding, Step 2: ECC Encryption on the compressed data,
For Receiver:
Step 3: ECC Decryption Step 4: Huffman Decoding
38
2.1. Encryption
Steps for Encryption 1. This new system will take input through text file, which contains plain Hindi message. 2. Input messages are compressed through compression algorithm. 3. Use of ECC to encrypt the messages 4. Output is generated
39
Take Input from .txt file as Plain Text Processes based on Huffman compression technique Processes based on ECC technique Cipher Text is generated Stop
40
2.2. Decryption
Steps for Decryption 1. In this step, it will take input through text file, which contains cipher messages. 2. Use of ECC to decrypt the messages. 3. then messages are uncompressed through compression algorithm. 4. Output is generated.
41
Take Input from .txt file as Cipher Text Processes based on ECC Decryption technique Processes based on Huffman decompression technique Plain Text is generated Stop
42
43
44
45
46
47
4. Conclusion
This work uses the compression algorithm and asymmetric key for achieving: 1. Space problem 2. Speed issue 3. Secrecy problem
48
49
References
[1] A Multilanguage Encryption Technique, NIT, Durgapur, P. Choudhury, G.P. Kumar, A.K. Murmu, B. Parajuli, 2010 Seventh International Conference on Information Technology, 978-07695-3984-3/10 2010 IEEE DOI 10.1109/ITNG.2010.105 [2] A Method for the Construction of Minimum-Redundancy Codes by David A Huffman, Associate, IRE, Massachusetts Institute of Technology, Cambridge, Mass. [3] Lossless Text Compression using Dictionaries, Umesh S. Bhadade, G.H. Raisoni Institute of Engineering & Management, Jalgaon (MS) India 425001, International Journal of Computer Applications (0975 8887), Volume 13 No.8, January 2011
Dindayal Mahto, MT/IS/1009/10 50
References
[4] Pu, I.M., 2006, Fundamental Data Compression, Elsevier, Britain [5] Efficient Mapping Methods for Elliptic Curve Cryptosystems, O. Srinivasa Rao et. al. / International Journal of Engineering Science and Technology Vol. 2(8), 2010, 3651-3656 [6] Securing Messages in Wireless Channel by using New Method of Compression, A.C. Shakir, J. Min, R.J. of Applied Sc., Eng & Tech, 3(7), 625-632, 2011, ISSN: 2040-7467
51
Thank You
52