Abstract

The main purpose of the data encryption process is the difficulty of understanding the content of the message with the difficulty of detecting the encryption mechanism. Therefore, in this paper we proposed a new model of encryption based on the idea of encrypting text messages and gray images using amino acid chains. Amino acids are distinguished by being a series of alphabets represented by 20 characters and do not have a specific length. The main idea of this paper is to get an amino acid chain that contained encrypted message. To develop this model, we construct artificial lookup table to encrypt any character of message to amino acid chain, after that applying encryption process. The proposed model applied on different kinds and sizes of messages, which proved the success of the main idea of the research, which is obtaining amino acid chains with encrypted messages. The proposed model appears efficiency in real time of encryption and extraction process compared with known methods. In the end we compared the amino acids that we extract on the process of encrypting with internationally known amino acids and we found a similarity ratio, which proves that the proposed model is effective in terms of increasing ambiguity on the encrypted message.

Highlights

  • Digital media is transferred through the network

  • Two successive amino acids join each other by an amide bridge formed through dehydration reaction between the α amino group of one of them and the α carboxyl group from the other, yielding the peptide bond

  • We proposed a model to encrypt both text and gray images

Read more

Summary

INTRODUCTION

Digital media is transferred through the network. There are a lot of ways that can be used to transfer the digital media such as E-mail, Facebook, and Twitter ...etc. When the data is transferred between two parties that are in the same and secure network, this does not cause a problem because it is a manageable network. The main problems are the opportunity for violation of the data ownership and jugglery data has increased the ease of copying digital data, it could lead to unauthorized copying extensively from it. The data security must be taken into consideration which is one of the most important factors that used during the process of transferring data through the network, [1, 2]. Data security is used to protect the data from stealing or hacking it by unauthorized users

BACKGROUND
Cryptography
Related Work
PROPOSED MODEL
First Phase
RESULTS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call