Skip to main content
Log in

Intelligent security algorithm for UNICODE data privacy and security in IOT

  • Special Issue Paper
  • Published:
Service Oriented Computing and Applications Aims and scope Submit manuscript

Abstract

Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Stallings W (2004) Network security essentials (applications and standards). Pearson Education, London, pp 2–80

    Google Scholar 

  2. Pfleeger CP, Pfleeger SL (2004) Security in computing. Pearson Education, London, pp 642–666

    MATH  Google Scholar 

  3. Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society

  4. Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application

  5. Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation

  6. Adams C, Tavares S (1990) The structured design of cryptographically good S-boxes. J Cryptol 3(1):27–41

    Article  MathSciNet  MATH  Google Scholar 

  7. Hussain I, Shah T, Mahmood H, Afzal M (2010) Comparative analysis of S-boxes based on graphical SAC. Int J Comput Appl 2(5):1–7

    Google Scholar 

  8. Ahmed N (2015) Testing an S-box for cryptographic use. Int J Comput Electr Eng 8:1–5

    Google Scholar 

  9. Mroczkowski P (2009) Generating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphers. J Telecommun Inf Technol 2:74–79

    Google Scholar 

  10. Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397

  11. Shirali-Shahreza H, Shirali-Shahreza M (2008) Steganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection characters. J Theor Appl Inf Technol 4(8):682–687

    Google Scholar 

  12. Por LY, Wong K, Chee KO (2012) UniSpaCh: a text-based data hiding method using Unicode space characters. J Syst Softw 85:1075–1082

    Article  Google Scholar 

  13. Kazlauskas K, Vaicekauskas G, Smaliukas R (2015) An algorithm for key-dependent S-box generation in block cipher system. Informatica 26(1):51–65. https://doi.org/10.15388/informatica.2015.38

    Article  Google Scholar 

  14. Kazlauskas K, Kazlauskas J (2009) Key-dependent S-box generation in AES block cipher system. Informatica 20(1):23–34

    MathSciNet  MATH  Google Scholar 

  15. Aldabbagh SSM, Al Shaikhli IFT, Zaba MR (2014) Key-dependent S-box in lightweight block ciphers. J Theor Appl Inf Technol 62(2):554

    Google Scholar 

  16. Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952

  17. Hussain Alkhaldi A et al (2015) A novel design for the construction of safe S-boxes based on TDERC sequence. Alexandria Eng J. https://doi.org/10.1016/j.aej.2015.01.003

    Google Scholar 

  18. Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011)

  19. Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085

  20. Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version)

  21. Ramanujam S, Karuppiah M (2011) Designing an algorithm with high avalanche effect. IJCSNS Int J Comput Sci Netw Secur 11(1):106

    Google Scholar 

  22. Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153

  23. Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562

  24. Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343

  25. Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646

  26. Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE

  27. Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6

  28. Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616

  29. Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602

  30. Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630

  31. Shirali-Shahreza M, Shirali-Shahreza S (2008) Persian/Arabic unicode text steganography. In: The 4th international conference on information assurance and security, 978-0-7695-3324-7/08 $25.00 © 2008 IEEE. https://doi.org/10.1109/ias.2008.12

  32. Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE

  33. Kumar GP, Murmu AK, Parajuli B, Choudhury P (2010) MULET: a multilanguage encryption technique. In: 2010 7th international conference on information technology, 978-0-7695-3984-3/10 $26.00 © 2010 IEEE. https://doi.org/10.1109/itng.2010.105

  34. Tandon A, Sharma R, Sodhiya S, Durai Raj Vincent PM (2015) Universal encryption algorithm using logical operations and bits shuffling for unicode. Indian J Sci Technol. https://doi.org/10.17485/ijst/2015/v8i15/33437

    Google Scholar 

  35. Balajee Maram K, Gnanasekar JM (2016) UNICODE text security using dynamic and key-dependent 16X16 S-Box. Austr J Basic Appl Sci 10(1):26–36

    Google Scholar 

  36. Abdel-Basset M, El-Shahat D, Mirjalili S (2018) A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem. Future Gener Comput Syst 85:129–145

    Article  Google Scholar 

  37. Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16

  38. Abdel-Basset M, Manogaran G, Fakhry AE, El-Henawy I (2018) 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6266-0

    Google Scholar 

  39. Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22

  40. Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11

  41. Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst

  42. Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24

  43. Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst

  44. Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515

  45. Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balajee Maram.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maram, B., Gnanasekar, J.M., Manogaran, G. et al. Intelligent security algorithm for UNICODE data privacy and security in IOT. SOCA 13, 3–15 (2019). https://doi.org/10.1007/s11761-018-0249-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11761-018-0249-x

Keywords

Navigation