A Symmetric Key Algorithm for Cryptography using Music
نویسندگان
چکیده
Music and its attributes have been used in cryptography from early days. Today music is vastly used in information hiding with the use of Steganography techniques. This paper proposes an alternative to steganography by designing an algorithm for the encryption of text message into music and its attributes. The proposed algorithm converts the plain text message into a musical piece by replacing the text characters of the message by mathematically generated musical notes. The sequence of musical notes generated for the particular character sequence of plain text message mimic a musical pattern. This musical pattern is sent to the receiver as a music file. The seed value for encryption/decryption key is sent using the asymmetric algorithm RSA, where the key maps the letters corresponding to a musical note. The encryption key used is an n x n matrix and it will be generated using the seed value for the key on both sender and receiver ends.
منابع مشابه
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملHiding Messages using Musical Notes: A Fuzzy Logic Approach
“Music can be used as a communicable language”. Musical symbols and musical notes have been used as codes and ciphers from early days. The art of encrypting messages using music is termed as Musical cryptography and it uses predefined set of notes and set of rules for composing musical pieces which in turn are musical cryptograms. Traditional algorithms applied to musical cryptography used simp...
متن کاملAnalysis and Review of Encryption and Decryption for Secure Communication
The Process of Encryption and Decryption is performed by using Symmetric key cryptography and public key cryptography for Secure Communication. In this paper, we studied that how the process of Encryption and Decryption is perform in case of Symmetric key and public key cryptography using AES and DES algorithms and modified RSA algorithm.
متن کاملHybrid encryption/decryption technique using new public key and symmetric key algorithm
This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user’s privacy, authentication and accuracy....
متن کاملSymmetric Key Management: A new approach
Many cryptographic algorithms (e.g., AES, HMAC) require the establishment of shared keying material in advance. The Federal key agreement schemes document is based on ANSI X9.42 agreement of symmetric keys using discrete logarithm cryptography, ANSI X9.44 key agreement and key transport using factoringbased cryptography and ANSI X9.63 key agreement and key transport using elliptic curve cryptog...
متن کامل