Abstract
Authors propose cellular automata (CA) based multilingual encryption algorithm to provide data security. Different components (keyset and encryption key) are required in proposed single attractor cellular automata (SACA) based algorithm to prepare multilingual encrypted dataset. A particular set of keyset and encryption key should be applied on a particular set of multilingual raw dataset to prepare multilingual key mapped dataset. Different syndicate rules should be applied in proposed algorithm using CA based state transition mapping. Data security should be increased due to usage of different syndicate rules. Efficiency of proposed algorithm should be measured using experimental results. Superiority of CA based proposed multilingual encryption algorithm should be measured using comparative analysis with existing algorithms (Blowfish, Twofish, RSA, Triple Data Encryption Standard, Advanced Encryption Standard).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rajendiran, M., Selvam, K., Kumar, N.R., Venkatesh, T.: English encryption technique using multilanguage. Int. J. Eng. Res. Technol. 2(3), 1–5 (2013)
Mishra, P.R., Gupta, I., Gaba, N.: Cryptoanalysis of multilanguage encryption techniques. Math. Comput. 91, 13–21 (2014)
Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302–3312 (2017)
Shaheen, B., Siddiqui F.: Comparison between RSA algorithm and modified RSA algorithm used in cloud computing. In: International Conference on Inventive Computation Technologies, vol. 98, pp. 218–224 (2019)
Kara, O., Manap, C.: A new class of weak keys for blowfish. In: International Workshop on Fast Software Encryption, vol. 4593, pp. 167–180 (2007)
Lee, S.K., Kim, S.Y, Ra, Y.C.: A study on the two fish security processor design using USB interface device. In: International Conference on Hybrid Information Technology, vol. 206, pp. 182–189 (2011)
Thinn, A.A., Thwin, M.M.S.: Modification of AES algorithm by using second key and modified subbytes operation for text encryption. Comput. Sci. Technol. 481, 435–444 (2018)
Choudhury P., Gaddam, R., Parisi, R.B., Dasari, M.B., Vuppala, S.: A new multi-language encryption technique for MANET. In: International conference on Advances in Information and Communication Technologies, vol. 101, pp. 22–28 (2010)
Das, S., Mukherjee, S., Naskar, N.: Characterization of single cycle CA and its application in pattern classification. Electron. Notes Theoret. Comput. Sci. 252, 181–203 (2009)
Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S.: A cost-efficient one time password based authentication in cloud environment using equal length cellular automata. J. Ind. Inf. Integr. 5, 17–25 (2017)
Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S.: On the exploration of equal length cellular automata rules targeting a mapreduce design in cloud. Int. J. Cloud Appl. Comput. 8(2), 1–26 (2018)
Mitra, A., Kundu, A.: Cost optimized approach to random numbers in cellular automata. Adv. Intell. Soft Comput. 166, 609–618 (2012)
Mitra, A., Kundu, A.: Cost optimized set of primes generation with cellular automata for stress testing in distributed computing. Procedia Technol. 10, 365–372 (2013)
Ghosh, A.: Comparison of encryption algorithms: AES, blowfish and Twofish for security of wireless networks. Int. Res. J. Eng. Technol. 7(6), 4656–4659 (2020)
Kumar, A., Jakhar, S., Makkar, S.: Comparative analysis between DES and RSA algorithm’s. Comput. Sci. Softw. Eng. 2(7), 386–391 (2012)
Acknowledgment
The research work is funded by Computer Innovative Research Society, West Bengal, India. Award number is “2020/CIRS/R&D/2020-02-19/CACAMESRDS”.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Banerjee, A., Kundu, A. (2021). Comparative Analysis of Cellular Automata Based Multilingual Encryption Using Syndicate Rules for Data Security. In: Abraham, A., Sasaki, H., Rios, R., Gandhi, N., Singh, U., Ma, K. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2020. Advances in Intelligent Systems and Computing, vol 1372. Springer, Cham. https://doi.org/10.1007/978-3-030-73603-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-73603-3_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73602-6
Online ISBN: 978-3-030-73603-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)