Intelligent security algorithm for UNICODE data privacy and security in IOT

Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptog...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Service oriented computing and applications Jg. 13; H. 1; S. 3 - 15
Hauptverfasser: Maram, Balajee, Gnanasekar, J. M., Manogaran, Gunasekaran, Balaanand, M.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: London Springer London 14.03.2019
Springer Nature B.V
Schlagworte:
ISSN:1863-2386, 1863-2394
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.
AbstractList Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE text, audio, video, image, etc. Different algorithms have been proposed by various researchers for handling text security. The existing cryptographic algorithms are working on ASCII text. Multilingual data communication is so prevalent in the digital era. In the digital era, many symmetric cryptographic algorithms have been introduced using S-boxes. S-box is a vital component for some cluster of cryptographic algorithms. Some cryptographic algorithms depend on the static S-box, which yields insecurity to the digital data. The existing S-box concept handles ASCII text only. This research paper presents the Substitution box (S-box) that is dynamic and key-dependent. Dynamic and key-dependent S-box wraps the data with high security. This S-box works with UNICODE text which includes UTF-16. It was tested for UNICODE text using python language. It concludes that the novel S-box is suitable for handling UNICODE text and shows better performance.
Author Maram, Balajee
Balaanand, M.
Gnanasekar, J. M.
Manogaran, Gunasekaran
Author_xml – sequence: 1
  givenname: Balajee
  orcidid: 0000-0002-9509-6943
  surname: Maram
  fullname: Maram, Balajee
  email: balajee.m@gmrit.org
  organization: Department of CSE, GMR Institute of Technology
– sequence: 2
  givenname: J. M.
  surname: Gnanasekar
  fullname: Gnanasekar, J. M.
  organization: Department of Computer Science and Engineering, Sri Venkateswara College of Engineering
– sequence: 3
  givenname: Gunasekaran
  surname: Manogaran
  fullname: Manogaran, Gunasekaran
  organization: University of California
– sequence: 4
  givenname: M.
  surname: Balaanand
  fullname: Balaanand, M.
  organization: Department of CSE, V.R.S. College of Engineering and Technology
BookMark eNp9kE9PAjEQxRuDiYh8AG-beF7tdP-0PRpE3EjkAuem2-3ikqWLbTHw7S1ZI4mJzmXm8H4zb941GpjOaIRuAd8DxvTBAdAcYgwsxiTl8eECDYHlSUwSng5-ZpZfobFzGxwqIZTldIheC-N12zZrbXzktNrbxh8j2a67MLxvo7qz0eqtmCyeplElvYx2tvmUKkhMddY3JioWyxt0WcvW6fF3H6HV83Q5eYnni1kxeZzHKoHcx5XSUmWScsoqXWU505DUFGclJWkiSUk40Krkqc4Y4JTrMlMMaFZzTSlAppMRuuv37mz3sdfOi023tyacFAT46Vmap0EFvUrZzjmraxGsb6U9CsDiFJvoYxMhNnGKTRwCQ38xqvHSN53xVjbtvyTpSReumLW2Z09_Q19174LG
CitedBy_id crossref_primary_10_1002_cae_22220
crossref_primary_10_3233_JIFS_219123
crossref_primary_10_1007_s10776_021_00521_y
crossref_primary_10_1007_s12553_019_00300_z
crossref_primary_10_1080_09720529_2021_1968573
crossref_primary_10_1007_s10586_020_03114_1
crossref_primary_10_1155_2022_4247651
crossref_primary_10_1007_s11042_019_7243_y
crossref_primary_10_3233_WOR_203421
crossref_primary_10_3233_WOR_203422
crossref_primary_10_3233_WOR_203424
crossref_primary_10_3233_WOR_203425
crossref_primary_10_3233_WOR_203426
crossref_primary_10_3233_WOR_203427
crossref_primary_10_1007_s00034_019_01197_9
crossref_primary_10_3846_transport_2020_13038
crossref_primary_10_1007_s11761_018_0251_3
crossref_primary_10_1142_S0219649222400238
crossref_primary_10_3233_JIFS_219032
crossref_primary_10_1002_dac_4274
crossref_primary_10_1007_s10772_021_09826_y
crossref_primary_10_1007_s11042_018_7126_7
crossref_primary_10_1007_s12083_019_00797_1
crossref_primary_10_1007_s11042_019_7359_0
crossref_primary_10_1111_exsy_13206
crossref_primary_10_1007_s12553_018_00293_1
crossref_primary_10_1002_ett_4051
crossref_primary_10_1007_s11042_019_7585_5
crossref_primary_10_1016_j_comcom_2019_11_048
crossref_primary_10_1007_s12652_021_02921_7
crossref_primary_10_1007_s11042_019_08089_9
crossref_primary_10_1049_iet_its_2019_0833
crossref_primary_10_1007_s11042_019_07805_9
crossref_primary_10_1016_j_compeleceng_2021_107527
crossref_primary_10_2166_ws_2022_241
crossref_primary_10_1007_s11042_019_7421_y
crossref_primary_10_1007_s11042_019_7487_6
crossref_primary_10_1007_s13369_021_05607_6
crossref_primary_10_3233_WOR_203417
crossref_primary_10_1007_s11042_019_07854_0
crossref_primary_10_1007_s11277_019_06590_w
crossref_primary_10_3233_WOR_203418
crossref_primary_10_1007_s11276_023_03247_2
crossref_primary_10_1155_2022_2308825
crossref_primary_10_1007_s11761_020_00287_w
crossref_primary_10_1007_s00500_021_05920_0
Cites_doi 10.1007/BF00203967
10.1109/ISACC.2015.7377325
10.15388/Informatica.2015.38
10.1109/WOCN.2012.6335543
10.1007/s00779-018-1132-7
10.1016/j.aej.2015.01.003
10.1109/ias.2008.12
10.17485/ijst/2015/v8i15/33437
10.1007/s10617-018-9203-6
10.1016/j.jss.2011.12.023
10.1007/s11042-018-6266-0
10.1109/itng.2010.105
10.1007/3-540-47789-6_108
10.15388/Informatica.2009.235
10.1016/j.future.2018.03.020
10.1109/ITNG.2006.120
ContentType Journal Article
Copyright Springer-Verlag London Ltd., part of Springer Nature 2018
Copyright Springer Nature B.V. 2019
Copyright_xml – notice: Springer-Verlag London Ltd., part of Springer Nature 2018
– notice: Copyright Springer Nature B.V. 2019
DBID AAYXX
CITATION
JQ2
DOI 10.1007/s11761-018-0249-x
DatabaseName CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1863-2394
EndPage 15
ExternalDocumentID 10_1007_s11761_018_0249_x
GroupedDBID -59
-5G
-BR
-EM
-~C
.VR
06D
0R~
123
203
2J2
2JN
2JY
2KG
2KM
2LR
2~H
30V
4.4
406
408
409
40E
5VS
67Z
6NX
875
8TC
8UJ
95-
95.
95~
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABWNU
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHYZX
AIGIU
AIIXL
AILAN
AITGF
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
AXYYD
AYJHY
B-.
BA0
BGNMA
CS3
CSCUP
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FNLPD
FRRFC
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
LLZTM
M4Y
MA-
NPVJJ
NQJWS
NU0
O93
O9J
OAM
P2P
P9O
PF0
PT4
QOS
R89
R9I
ROL
RPX
RSV
S16
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
YLTOR
Z45
Z7X
Z83
Z88
ZMTXR
~A9
-Y2
2VQ
AAPKM
AARHV
AAYXX
ABBRH
ABDBE
ABFSG
ABJCF
ABRTQ
ABULA
ACBXY
ACSTC
AEBTG
AEZWR
AFDZB
AFFHD
AFGCZ
AFHIU
AFKRA
AFOHR
AHPBZ
AHSBF
AHWEU
AIAKS
AIXLP
AJBLW
ARAPS
ATHPR
AYFIA
BDATZ
BENPR
BGLVJ
CAG
CCPQU
CITATION
COF
FINBP
FSGXE
H13
HCIFZ
HZ~
K7-
M7S
O9-
PHGZM
PHGZT
PQGLB
PTHSS
S1Z
JQ2
ID FETCH-LOGICAL-c316t-dceac5a7978ded568e13f705b7243a2b2917db94e581049eb5c8175f9e77115e3
IEDL.DBID RSV
ISICitedReferencesCount 59
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000461352200002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1863-2386
IngestDate Thu Sep 25 00:53:00 EDT 2025
Sat Nov 29 01:50:26 EST 2025
Tue Nov 18 21:02:34 EST 2025
Fri Feb 21 02:28:45 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Hamming distance
Balanced output
UNICODE
S-box
Avalanche effect
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-dceac5a7978ded568e13f705b7243a2b2917db94e581049eb5c8175f9e77115e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-9509-6943
PQID 2191863764
PQPubID 2044172
PageCount 13
ParticipantIDs proquest_journals_2191863764
crossref_primary_10_1007_s11761_018_0249_x
crossref_citationtrail_10_1007_s11761_018_0249_x
springer_journals_10_1007_s11761_018_0249_x
PublicationCentury 2000
PublicationDate 20190314
PublicationDateYYYYMMDD 2019-03-14
PublicationDate_xml – month: 3
  year: 2019
  text: 20190314
  day: 14
PublicationDecade 2010
PublicationPlace London
PublicationPlace_xml – name: London
– name: Heidelberg
PublicationTitle Service oriented computing and applications
PublicationTitleAbbrev SOCA
PublicationYear 2019
Publisher Springer London
Springer Nature B.V
Publisher_xml – name: Springer London
– name: Springer Nature B.V
References Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085
AhmedNTesting an S-box for cryptographic useInt J Comput Electr Eng2015815
KazlauskasKVaicekauskasGSmaliukasRAn algorithm for key-dependent S-box generation in block cipher systemInformatica2015261516510.15388/Informatica.2015.38
PorLYWongKCheeKOUniSpaCh: a text-based data hiding method using Unicode space charactersJ Syst Softw2012851075108210.1016/j.jss.2011.12.023
Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011)
PfleegerCPPfleegerSLSecurity in computing2004LondonPearson Education6426660278.94030
Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153
Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515
HussainIShahTMahmoodHAfzalMComparative analysis of S-boxes based on graphical SACInt J Comput Appl20102517
Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version)
Kumar GP, Murmu AK, Parajuli B, Choudhury P (2010) MULET: a multilanguage encryption technique. In: 2010 7th international conference on information technology, 978-0-7695-3984-3/10 $26.00 © 2010 IEEE. https://doi.org/10.1109/itng.2010.105
Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952
Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16
KazlauskasKKazlauskasJKey-dependent S-box generation in AES block cipher systemInformatica2009201233413582391178.68227
StallingsWNetwork security essentials (applications and standards)2004LondonPearson Education280
Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society
Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343
Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22
Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst
Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application
Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6
Shirali-ShahrezaHShirali-ShahrezaMSteganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection charactersJ Theor Appl Inf Technol200848682687
Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562
Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397
MroczkowskiPGenerating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphersJ Telecommun Inf Technol200927479
Hussain AlkhaldiAA novel design for the construction of safe S-boxes based on TDERC sequenceAlexandria Eng J2015
TandonASharmaRSodhiyaSDurai Raj VincentPMUniversal encryption algorithm using logical operations and bits shuffling for unicodeIndian J Sci Technol2015
AldabbaghSSMAl ShaikhliIFTZabaMRKey-dependent S-box in lightweight block ciphersJ Theor Appl Inf Technol2014622554
Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst
AdamsCTavaresSThe structured design of cryptographically good S-boxesJ Cryptol1990312741108697510.1007/BF002039670711.94016
Shirali-Shahreza M, Shirali-Shahreza S (2008) Persian/Arabic unicode text steganography. In: The 4th international conference on information assurance and security, 978-0-7695-3324-7/08 $25.00 © 2008 IEEE. https://doi.org/10.1109/ias.2008.12
Abdel-BassetMEl-ShahatDMirjaliliSA hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problemFuture Gener Comput Syst20188512914510.1016/j.future.2018.03.020
Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630
Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11
Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602
Abdel-BassetMManogaranGFakhryAEEl-HenawyI2-Levels of clustering strategy to detect and locate copy-move forgery in digital imagesMultimed Tools Appl2018
Balajee MaramKGnanasekarJMUNICODE text security using dynamic and key-dependent 16X16 S-BoxAustr J Basic Appl Sci20161012636
Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646
Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE
Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation
Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE
Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE
RamanujamSKaruppiahMDesigning an algorithm with high avalanche effectIJCSNS Int J Comput Sci Netw Secur2011111106
Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24
Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616
W Stallings (249_CR1) 2004
249_CR39
249_CR16
LY Por (249_CR12) 2012; 85
249_CR19
249_CR18
A Tandon (249_CR34) 2015
P Mroczkowski (249_CR9) 2009; 2
249_CR37
249_CR31
H Shirali-Shahreza (249_CR11) 2008; 4
249_CR30
249_CR33
249_CR10
SSM Aldabbagh (249_CR15) 2014; 62
249_CR32
M Abdel-Basset (249_CR36) 2018; 85
S Ramanujam (249_CR21) 2011; 11
C Adams (249_CR6) 1990; 3
249_CR5
249_CR4
I Hussain (249_CR7) 2010; 2
249_CR3
N Ahmed (249_CR8) 2015; 8
M Abdel-Basset (249_CR38) 2018
249_CR28
249_CR27
CP Pfleeger (249_CR2) 2004
249_CR29
249_CR24
K Kazlauskas (249_CR14) 2009; 20
249_CR23
249_CR45
249_CR26
249_CR25
249_CR20
249_CR42
249_CR41
249_CR22
249_CR44
249_CR43
K Kazlauskas (249_CR13) 2015; 26
249_CR40
A Hussain Alkhaldi (249_CR17) 2015
K Balajee Maram (249_CR35) 2016; 10
References_xml – reference: Patidar G, Agrawal N, Tarmakar S (2013) A block based encryption model to improve avalanche effect for data security. Int J Sci Res Publ 3(1). ISSN 2250-3153
– reference: Balajee Maram K, Gnanasekar JM (2015) Light weight cryptographic algorithm to improve avalanche effect for data security using prime numbers and bit level operations. Int J Appl Eng Res 10(21):41977–41983. ISSN 0973-4562
– reference: Abdel M, Manogaran G, Mohamed M, Smarandache F (46) A novel method for solving the fully neutrosophic linear programming problems. Neural Comput Appl 1–11
– reference: Bhoge JP, Chatur PN (2014) avalanche effect of aes algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5(3):3101–3103. ISSN 0975-9646
– reference: HussainIShahTMahmoodHAfzalMComparative analysis of S-boxes based on graphical SACInt J Comput Appl20102517
– reference: PfleegerCPPfleegerSLSecurity in computing2004LondonPearson Education6426660278.94030
– reference: Hussain AlkhaldiAA novel design for the construction of safe S-boxes based on TDERC sequenceAlexandria Eng J2015
– reference: Rahman MA, Sattar MA (2008) A new approach to sort unicode Bengali text, 978-1-4244-2015-5/08/$25.00 © 2008 IEEE, pp 628–630
– reference: MroczkowskiPGenerating pseudorandom S-boxes—a method of improving the security of cryptosystems based on block ciphersJ Telecommun Inf Technol200927479
– reference: Suryavanshi H, Bansal P (2012) An improved cryptographic algorithm using UNICODE and Universal Colors, 978-1-4673-1989-8/12/$31.00 ©2012 IEEE
– reference: Hernández JC, Isasi P, Ribagorda A (2002) An application of genetic algorithms to the cryptoanalysis of one round TEA. In: Proceedings of the symposium on artificial intelligence and its application
– reference: Abdel M, Manogaran G, Mohamed M, Chilamkurti N (2018) Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem. Future Gener Comput Syst
– reference: Dutta S, Das T, Jash S, Patra D, Paul P (2014) A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Int J Adv Comput Sci Technol 3(5). ISSN 2320–2602
– reference: Abdel-Basset M, Manogaran G, Gamal A, Smarandache F (2018) A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria. Des Autom Embed Syst 1–22
– reference: Balajee M (2011) UNICODE and colors integration tool for encryption and decryption. Int J Comput Sci Eng (IJCSE) 3–3. ISSN 0975-3397
– reference: PorLYWongKCheeKOUniSpaCh: a text-based data hiding method using Unicode space charactersJ Syst Softw2012851075108210.1016/j.jss.2011.12.023
– reference: Naik PG, Naik GR Symmetric key encryption using genetic algorithm. Sinhgad Inst Manag Comput Appl (SIM CA). ISBN: 978 -81-927230-0-6
– reference: Wenceslao FV Jr (2015) Performance efficiency of modified AES algorithm using multiple S-boxes. Int J New Comput Archit Appl (IJNCAA) 5(1): 1–9. The Society of Digital Information and Wireless Communications. ISSN 2220-9085
– reference: Abdel-BassetMEl-ShahatDMirjaliliSA hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problemFuture Gener Comput Syst20188512914510.1016/j.future.2018.03.020
– reference: Basset M, Manogaran G, Mohamed M, Rushdy E (2018) Internet of things in smart education environment: supportive framework in the decision-making process. Concurr Comput Pract Exp e4515
– reference: AdamsCTavaresSThe structured design of cryptographically good S-boxesJ Cryptol1990312741108697510.1007/BF002039670711.94016
– reference: Kumar GP, Murmu AK, Parajuli B, Choudhury P (2010) MULET: a multilanguage encryption technique. In: 2010 7th international conference on information technology, 978-0-7695-3984-3/10 $26.00 © 2010 IEEE. https://doi.org/10.1109/itng.2010.105
– reference: Balajee MaramKGnanasekarJMUNICODE text security using dynamic and key-dependent 16X16 S-BoxAustr J Basic Appl Sci20161012636
– reference: KazlauskasKKazlauskasJKey-dependent S-box generation in AES block cipher systemInformatica2009201233413582391178.68227
– reference: RamanujamSKaruppiahMDesigning an algorithm with high avalanche effectIJCSNS Int J Comput Sci Netw Secur2011111106
– reference: TandonASharmaRSodhiyaSDurai Raj VincentPMUniversal encryption algorithm using logical operations and bits shuffling for unicodeIndian J Sci Technol2015
– reference: Singh A A new approach to enhance avalanche effect in AES to improve computer security. Inf Technol Softw Eng 5(1). ISSN 2165-7866 JITSE
– reference: Shirali-ShahrezaHShirali-ShahrezaMSteganography in Persian and Arabic unicode texts using pseudo-space and pseudo-connection charactersJ Theor Appl Inf Technol200848682687
– reference: Veetil AT (2015) An encryption technique using genetic operators. Int J Sci Technol Res 4(07). ISSN 2277-8616
– reference: Hussain I, Shah T, Gondal MA, Wang Y (2011) Analyses of SKIPJACK S-box. World Appl Sci J 13(11):2385–2388. ISSN 1818-4952
– reference: Panda SR, Tripath J (2015) Odia offline typewritten character recognition using template matching with unicode mapping. In: 2015 international symposium on advanced computing and communication (ISACC), 978-1-4673-6708-0/15/$31.00 © 2015 IEEE
– reference: Abdel-Basset M, Manogaran G, Abdel-Fatah L, Mirjalili S (2018) An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems. Pers Ubiquitous Comput 1–16
– reference: StallingsWNetwork security essentials (applications and standards)2004LondonPearson Education280
– reference: Abdel M, Manogaran G, Rashad H, Zaied ANH (2018) A comprehensive review of quadratic assignment problem: variants, hybrids and applications. J Ambient Intel Humaniz Comput 1–24
– reference: Hernández JC, Sierra JM, Isasi P, Ribargorda A (2003) Finding efficient distinguishers for cryptographic mappings, with an application to the block cipher TEA. In Proceedings of the congress on evolutionary computation
– reference: Balajee Maram, Gnanasekar JM (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10), 399–418. ISSN 1311-8080 (printed version); ISSN 1314-3395 (on-line version)
– reference: Khan Pathan P, Verma B Hyper secure cryptographic algorithm to improve avalanche effect for data security. Int J Comput Technol Electron Eng (IJCTEE) 1(2). ISSN 2249-6343
– reference: Trinca D (2006) Sequential and parallel cascaded convolution encryption with local propagation: toward future directions in cryptography. In: Proceedings of the 3rd international conference on information technology-new generations. (ITNG’06), 0-7695-2497- 4/. IEEE Computer Society
– reference: Abdel-BassetMManogaranGFakhryAEEl-HenawyI2-Levels of clustering strategy to detect and locate copy-move forgery in digital imagesMultimed Tools Appl2018
– reference: Abdel M, Mohamed M (2018) Internet of things (IoT) and its impact on supply chain: a framework for building smart, secure and efficient systems. Future Gener Comput Syst
– reference: Shirali-Shahreza M, Shirali-Shahreza S (2008) Persian/Arabic unicode text steganography. In: The 4th international conference on information assurance and security, 978-0-7695-3324-7/08 $25.00 © 2008 IEEE. https://doi.org/10.1109/ias.2008.12
– reference: AhmedNTesting an S-box for cryptographic useInt J Comput Electr Eng2015815
– reference: KazlauskasKVaicekauskasGSmaliukasRAn algorithm for key-dependent S-box generation in block cipher systemInformatica2015261516510.15388/Informatica.2015.38
– reference: Mihajloska H, Gligoroski D (2011) A new approach into constructing S-boxes for lightweight block ciphers. In: 8th conference on informatics and information technology with international participation (CIIT 2011)
– reference: AldabbaghSSMAl ShaikhliIFTZabaMRKey-dependent S-box in lightweight block ciphersJ Theor Appl Inf Technol2014622554
– volume: 62
  start-page: 554
  issue: 2
  year: 2014
  ident: 249_CR15
  publication-title: J Theor Appl Inf Technol
– volume: 3
  start-page: 27
  issue: 1
  year: 1990
  ident: 249_CR6
  publication-title: J Cryptol
  doi: 10.1007/BF00203967
– ident: 249_CR27
– ident: 249_CR19
– ident: 249_CR23
– ident: 249_CR44
– ident: 249_CR25
– ident: 249_CR32
  doi: 10.1109/ISACC.2015.7377325
– volume: 26
  start-page: 51
  issue: 1
  year: 2015
  ident: 249_CR13
  publication-title: Informatica
  doi: 10.15388/Informatica.2015.38
– volume: 10
  start-page: 26
  issue: 1
  year: 2016
  ident: 249_CR35
  publication-title: Austr J Basic Appl Sci
– ident: 249_CR45
  doi: 10.1109/WOCN.2012.6335543
– start-page: 642
  volume-title: Security in computing
  year: 2004
  ident: 249_CR2
– volume: 8
  start-page: 1
  year: 2015
  ident: 249_CR8
  publication-title: Int J Comput Electr Eng
– ident: 249_CR37
  doi: 10.1007/s00779-018-1132-7
– ident: 249_CR40
– year: 2015
  ident: 249_CR17
  publication-title: Alexandria Eng J
  doi: 10.1016/j.aej.2015.01.003
– ident: 249_CR42
– ident: 249_CR31
  doi: 10.1109/ias.2008.12
– ident: 249_CR29
– ident: 249_CR30
– year: 2015
  ident: 249_CR34
  publication-title: Indian J Sci Technol
  doi: 10.17485/ijst/2015/v8i15/33437
– ident: 249_CR39
  doi: 10.1007/s10617-018-9203-6
– volume: 4
  start-page: 682
  issue: 8
  year: 2008
  ident: 249_CR11
  publication-title: J Theor Appl Inf Technol
– ident: 249_CR24
– volume: 85
  start-page: 1075
  year: 2012
  ident: 249_CR12
  publication-title: J Syst Softw
  doi: 10.1016/j.jss.2011.12.023
– year: 2018
  ident: 249_CR38
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-018-6266-0
– ident: 249_CR22
– ident: 249_CR33
  doi: 10.1109/itng.2010.105
– ident: 249_CR4
  doi: 10.1007/3-540-47789-6_108
– volume: 20
  start-page: 23
  issue: 1
  year: 2009
  ident: 249_CR14
  publication-title: Informatica
  doi: 10.15388/Informatica.2009.235
– ident: 249_CR28
– ident: 249_CR18
– ident: 249_CR26
– ident: 249_CR43
– ident: 249_CR20
– volume: 85
  start-page: 129
  year: 2018
  ident: 249_CR36
  publication-title: Future Gener Comput Syst
  doi: 10.1016/j.future.2018.03.020
– start-page: 2
  volume-title: Network security essentials (applications and standards)
  year: 2004
  ident: 249_CR1
– volume: 2
  start-page: 74
  year: 2009
  ident: 249_CR9
  publication-title: J Telecommun Inf Technol
– ident: 249_CR5
– volume: 2
  start-page: 1
  issue: 5
  year: 2010
  ident: 249_CR7
  publication-title: Int J Comput Appl
– ident: 249_CR10
– volume: 11
  start-page: 106
  issue: 1
  year: 2011
  ident: 249_CR21
  publication-title: IJCSNS Int J Comput Sci Netw Secur
– ident: 249_CR16
– ident: 249_CR41
– ident: 249_CR3
  doi: 10.1109/ITNG.2006.120
SSID ssj0000327867
Score 2.3762946
Snippet Information security algorithms provide praxis for security to the different forms of data. Data are transmitted in different forms like ASCII text, UNICODE...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3
SubjectTerms Algorithms
Audio data
Computer Appl. in Administrative Data Processing
Computer Science
Computer Systems Organization and Communication Networks
Cryptography
Cybersecurity
Digital data
e-Commerce/e-business
Image transmission
IT in Business
Management of Computing and Information Systems
Programming languages
Scientific papers
Software Engineering/Programming and Operating Systems
Software reviews
Special Issue Paper
Text editing
Video transmission
Title Intelligent security algorithm for UNICODE data privacy and security in IOT
URI https://link.springer.com/article/10.1007/s11761-018-0249-x
https://www.proquest.com/docview/2191863764
Volume 13
WOSCitedRecordID wos000461352200002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1863-2394
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000327867
  issn: 1863-2386
  databaseCode: RSV
  dateStart: 20070401
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwEA-iPvji_MTplDz4pASapm3SR5kbDmUTnbK30nxUB7OTtQ7_fC9du6KooG-FXo9wl9z9fk1yh9ApjY3UiWREUc6I58mEAIiVRDKYIEy4kidFndkb3u-L0Si8Le9xZ9Vp92pLsojU9WU3CpQbqK8gtswdAeC4BtlO2NV4d_-4_LHiMJeLonMsFQEjkJKCajfzOy2f81ENMr_sixbpptv410C30GaJLvHFYjpsoxWT7qBG1bkBlwt5F133lpU4c5yVLexwPHmawsPzCwYki4EZtgeXHWzPkGIYwTxWIJLqWn6c4t5guIceup1h-4qUbRWIYjTIiVYQbP2YA3_URvuBMJQl3PEldz0Wu9IFBqdl6BlfAFcLjfSVAJCRhIZzwI-G7aPVdJqaA4R9YbjjUQ2KladVIA23hMgEJpahdHkTOZVxI1XWHLetLyZRXS3ZGisCY0XWWNF7E50tP3ldFNz4TbhVeSwq114WQQy2nueB10TnlYfq1z8qO_yT9BHaAOwU2uNo1Guh1Xz2Zo7Ruprn42x2UkzJDxwQ2sE
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fS8MwEA6igr44f-J0ah58UgJrkzbpo8yNjc1NdMreSpOmOpidrHX453vp2hVFBX0r9HqES3L3fc3lDqFzK9AyjCQlyuKUMCYjAiBWEklhgVBhSx5ldWZ7vN8Xo5F3m9_jTops9-JIMvPU5WU3Cyg3UF9BTJk7AsBxjUHAMnl8d_ePyx8rdWpzkXWOtYRLCYQktzjN_E7L53hUgswv56JZuGlV_jXQbbSVo0t8tVgOO2hFx7uoUnRuwPlG3kPdzrISZ4qTvIUdDiZPU3h4fsGAZDEww8bguolNDimGEcwDBSJxWMqPY9wZDPfRQ6s5bLRJ3laBKGq5KQkVOFsn4MAfQx06rtAWjXjdkdxmNLClDQwulB7TjgCu5mnpKAEgI_I054AfNT1Aq_E01ocIO0LzOrNCUKxYqFypuSFE2tWB9KTNq6heGNdXec1x0_pi4pfVko2xfDCWb4zlv1fRxfKT10XBjd-Ea8WM-fneS3zwwWbmucuq6LKYofL1j8qO_iR9hjbaw5ue3-v0u8doE3CUZ1LTLFZDq-nsTZ-gdTVPx8nsNFueH2XF3aU
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFA6iIr44rzidmgeflODapE36KLvg2JiCU3wrzaU6mN3Y6vDne9K1K4oK4luhpyGcnCTf15N8B6FzJzJSx5IS5XBKGJMxARAriaQQIFS4kseZzmyP9_vi6Sm4y-uczorT7kVKcnGnwao0JenVRMdX5cU3B-g30GBBrOQdARC5xmzNIEvX7x-XP1nq1OUiqyLrCJ8S2J78IrP5XSuf96YScH7JkWZbT7vy705vo60cdeLrRZjsoBWT7KJKUdEB5xN8D3U7S4XOFM_y0nY4Gj2P4eHlFQPCxcAYG7fNFrZnSzH0Zh4pMEl0aT9McOd2sI8e2q1B44bk5RaIoo6fEq1gEfYiDrxSG-35wjg05nVPcpfRyJUuMDstA2Y8ARwuMNJTAsBHHBjOAVcaeoBWk3FiDhH2hOF15mhoWDGtfGm4JUrGN5EMpMurqF44OlS5FrktiTEKSxVl66wQnBVaZ4XvVXSx_GSyEOL4zbhWjF6Yz8lZCGuzjQLusyq6LEarfP1jY0d_sj5DG3fNdtjr9LvHaBPgVWBPrDmshlbT6Zs5Qetqng5n09MsUj8Ah-rmiQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Intelligent+security+algorithm+for+UNICODE+data+privacy+and+security+in+IOT&rft.jtitle=Service+oriented+computing+and+applications&rft.au=Balajee+Maram&rft.au=Gnanasekar%2C+J+M&rft.au=Gunasekaran+Manogaran&rft.au=Balaanand%2C+M&rft.date=2019-03-14&rft.pub=Springer+Nature+B.V&rft.issn=1863-2386&rft.eissn=1863-2394&rft.volume=13&rft.issue=1&rft.spage=3&rft.epage=15&rft_id=info:doi/10.1007%2Fs11761-018-0249-x&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1863-2386&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1863-2386&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1863-2386&client=summon