Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Software security has become one of the active areas of research due to various cyber threats and attacks that can be very dangerous. The main goals of software protection are Intellectual property protection, Protection beside function investigation in mobile environments, Protection beside illegal copy and use of software. Software security is dependent on both security code and software protection. Various techniques have been developed to deal with the software threats and attacks. However, the available software protection approaches in the literature do not offer trustworthy security in all the scenarios. In recent years, cryptographic techniques are observed to be very efficient in dealing with a number of software threats and attacks. Code encryption has received much attention in the field of software security. This paper proposes novel software protection code encryption schemes based on the index table. This approach uses three novel and efficient encryption techniques namely quasigroup encryption, quasi group encryption with transformation and KIST approach
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Software Security; Splay Tree; Cryptography; Quasi Group Encryption; Hadamard Transformation and Number Theoretic Transformation

Full Text:

PDF


References


Goldreich, O., 1996. Towards a theory of software protection and simulation by oblivious RAMs. In Proc. of nineteenth annual ACM symposium on Theory of computing., 43(3):431-473.

Fauzi, S.S.M., Nasir, M.H.N.M., Nuraminah, R., Jusoff, K., Azam, N.A.A., Hafiz Ismail, M., The implementation of software process improvement models, (2009) International Review on Computers and Software (IRECOS), 4 (3), pp. 402-407.

Wilander, J. and M. Kamkar, 2003. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. In Proc. of NDSS’03 (Internet Society): Network and Distributed System Security Symp., :149-162.

Collberg, C.S. and C.Thomborson, 2002. Watermarking, tamper-proofing, and obfuscation - tools for software protection. In IEEE Transactions on Software Engineering., 28(8): 735 – 746.

Stytz, M.R. and J.A. Whittaker, 2003. Software Protection: Security’s Last Stand. In IEEE Security Privacy., 1(1): 95-98.

Grangetto, M., E. Magli and G. Olmo, 2006. Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia., 8(5).

Shi, C. and B. Bhargava, 1998. A Fast MPEG Video Encryption Algorithm. In Proc. of the 6th International Multimedia Conference, Bristol, UK., :12-16.

Jones, D., 1988. Applications of splay trees to data compression. Commun. ACM.,: 996-1007.

Sungkyu Cho, Donghwi Shin, Heasuk Jo, Donghyun Choi, Dongho Won, and Seungjoo Kim, “Secure and Efficient Code Encryption Scheme based on Indexed Table”, ETRI Journal, Volume 33, Number 1, February 2011.

Maruti Venkat Kartik Satti, 2007. “Quasi Group based Crypto-System”, A Thesis.

Kościenly, C. 2002. Generating quasi groups for cryptographic applications. Int. J. Appl. Math. Comput. Sci., vol.12, No.4, 559–569.

J. Hoffstein, J. Pipher, J.H. Silverman, An Introduction to Mathematical Cryptography. Springer, 2010.

R.S.Reddy,Encryption of binary and non-binary data using chained Hadamard transforms.arXiv:1012.4452, 2010.

Ulman, L.J. “Computation of the Hadamard Transform and the R-Transform in Ordered Form”, IEEE Transactions on Computers, Volume: C-19, Issue: 4, Page(s): 359 – 360, 1970.

Ce Zhu and Bing Xiong, “Transform-Exempted Calculation of Sum of Absolute Hadamard Transformed Differences”, IEEE Transactions on Circuits and Systems for Video Technology, Volume: 19 , Issue: 8, Page(s): 1183 – 1188, 2009.

V.Godavarty, Using Quasigroups for Generating Pseudorandom Numbers.arXiv:1112.1048, 2011.

B.Goldburg, S.Sridharan, E.Dawson, “Design and cryptanalysis of transform-based analog speech scramblers”, Journal of Selected Areas in Communications 11:735-744, 1993.

S. Kak, Classification of random binary sequences using Walsh-Fourier analysis.IEEE Trans on Electromagnetic Compatibility EMC-13, pp. 74-77, 1971.

R. Wei and Z. Zeng, KIST: A new encryption algorithm based on splay, 2010.

Shang, Y., Lei, S., Shang, Y., Image encryption algorithm based on fractional Fourier transform, (2012) International Review on Computers and Software (IRECOS), 7 (5), pp. 1986-1989.

N.Sasirekha, A.Edwin Robert and Dr.M.Hemalatha, “Novel Obfuscation Obfuscation Algorithms for Software Security”, Proceedings of an International Conference on Networks, Intelligence and Computing Technologies [ICNICT 2011], December 2011. ISBN: 978-81-8424-742-8.

K. Yordanova, Interactive Multimedia E-learning Course for Teachers Education and its Possible Application in Vocational Training, (2007) International Review on Computers and Software (IRECOS), 2 (4), pp. 415 – 420.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2022 Praise Worthy Prize