Abstract:
In cryptographic application, the data sent to a remote host are encrypted first at the source machine using an encryption key then the encrypted data are sent to the des...Show MoreMetadata
Abstract:
In cryptographic application, the data sent to a remote host are encrypted first at the source machine using an encryption key then the encrypted data are sent to the destination machine. This way the attacker will not have the encryption key which is required to get the original data and thus the hacker will be unable to do anything with the session. In this paper, we propose a novel method for data encryption and our method is based on the transformation of a text file into an image file on both client and server machines. We analyze our algorithm by calculating the number of all possible key permutations.
Published in: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
Date of Conference: 26-28 June 2012
Date Added to IEEE Xplore: 23 July 2012
ISBN Information: