A Cyber Security Model Using Gaussian Noise for Text Encryption and Decryption Algorithm
Cybersecurity has become a critical issue in protecting personal information for all internet users, so the need to protect such information through different techniques has become necessary. One of these techniques is cryptography, which is used to protect data transferred over the internet by conv...
Saved in:
| Published in: | JOIV : international journal on informatics visualization Online Vol. 9; no. 5; p. 1871 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
30.09.2025
|
| ISSN: | 2549-9610, 2549-9904 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | Cybersecurity has become a critical issue in protecting personal information for all internet users, so the need to protect such information through different techniques has become necessary. One of these techniques is cryptography, which is used to protect data transferred over the internet by converting readable messages into unreadable messages. This paper introduces an innovative model for encryption and decryption utilizing Gaussian noise incorporation and denoising, exploiting the statistical characteristics of Gaussian distributions as the basis for encryption. The model proposed in this study encodes text through the transformation of characters into their corresponding ASCII values, followed by the addition of Gaussian noise characterized by specific mean (μ) and standard deviation (σ) parameters. The decryption process involves accurately subtracting the identical Gaussian noise, consequently retrieving the original text. The effectiveness of this technique heavily depends on maintaining the confidentiality of the Gaussian noise parameters. The results of our studies showcase specific decryption with a confined computational burden, rendering it suitable for applications with low processing capabilities, together with Internet of Things (IoT) gadgets and embedded systems. A side-by-side comparison of this approach with traditional encryption methods such as AES, RSA, and lightweight block ciphers is conducted, highlighting its advantages and possible application in resource-sensitive contexts. Analysis reveals that while the Gaussian noise-focused approach is straightforward and effective, more cryptographic verification is required to provide a strong defense against more complex cyberattacks. This test opens up the possibility of investigating noise-based fully cryptographic frameworks and their application in establishing consistent communication channels. |
|---|---|
| ISSN: | 2549-9610 2549-9904 |
| DOI: | 10.62527/joiv.9.5.2925 |