• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 2, Pages: 133-145

Original Article

Design and Implementation of Intelligent Key Cryptography using Time and Tamil Unicode

Received Date:22 September 2022, Accepted Date:18 December 2022, Published Date:16 January 2023

Abstract

Objectives: To propose a new novel and unique cryptosystem with interfaces for the designed cryptosystem and to implement and test the new designed methodologies. Methods: The Tamil Unicode is used to convert the Plain text (Sender’s message) to Intelligent Key Cryptography system (IKC) Intermediary code. This intermediary code is converted to IKC cipher text by transpositioning characters with integer digit values of Time in positive direction. IKC decryption of cipher text (received message) to Intermediary code is done using Tamil Unicode and then this is converted to plain text by trans-positioning characters with integer digit values of Time in negative direction. The IKC algorithm developed thus address the discrepancies for the existing algorithms based on the literary survey done. Findings: In the proposed IKC algorithm, the key and key space are generated dynamically from the system Time and the system font Tamil Unicode; thus, reducing the key maintenance problems of the existing algorithms. In current cryptography algorithms, work is based on the assumption that the key value never comes to zero. But all the algorithms are mathematical calculations which will return to zero at an infinite point. This drawback is overcome in IKC algorithm by taking the Time the real infinity. The value of the time once passed will never return. The entire algorithm works in a secure shell developed using C++ and has proved to satisfy the needs of the objective of a robust cryptosystem. Comparative analysis shows that IKC works better compared to the existing system. Novelty: The IKC algorithm displays as: (i) keys are generated dynamically, (ii) cipher once formed is never repeated, even if the same plaintext is enciphered again, and (iii) it satisfies NIST policies.

Keywords: IKC Encryption; IKC Decryption; AIRKGS; Dynamic key; Postquantum cryptography

References

  1. Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017;549(7671):188–194. Available from: https://doi.org/10.1038/nature23461
  2. Rojasree V, Jayanthi JG. Research Intuitions of Block Cipher Techniques. International Journal of Management. 2021;XI:14–20. Available from: https://app.box.com/s/dmfcsme24cnmabuf4zxt9ctu8m2tmcju
  3. Rojasree V, Jayanthi JG. Research Intuitions of Asymmetric Cryptography System. Turkish Journal of Computer and Mathematics Education. 2021;12(3). Available from: https://doi.org/10.17762/turcomat.v12i3.2016
  4. Rojasree V, Jayanthi JG. Research Intuitions of Hashing Crypto System”. International Journal of Engineering Research & Technology. 2020;9. Available from: https://www.academia.edu/44786307/IJERT_Research_Intuitions_of_Hashing_Crypto_System
  5. Rojasree V, Jayanthi JG. Performance Analysis of intelligent Key Cryptography (IKC) System. Mathematical Statistician and Engineering Applications. 2022;71:67–78. Available from: https://philstat.org.ph/index.php/MSEA/article/view/455

Copyright

© 2023 Rojasree & Jayanthi. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.