CPL - Chalmers Publication Library
| Utbildning | Forskning | Styrkeområden | Om Chalmers | In English In English Ej inloggad.

The hush cryptosystem

Sari Haj Hussein (Institutionen för data- och informationsteknik, Programvaruteknik (Chalmers))
Proceedings of the 2nd international conference on Security of information and networks p. 105-110. (2009)
[Konferensbidrag, refereegranskat]

In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all. We employ a modified Word Substitution Method known as the Grammatical Substitution Method in our cryptosystem. We also make use of Hidden Markov Models. We test our cryptosystem using a computer program written in the Java Programming Language. Finally, we test the output of our cryptosystem using statistical tests. Copyright 2009 ACM.

Nyckelord: Base64, Sentence Substitution, Word Substitution, Grammatical Substitution, Hidden Markov Models, Randomness Degree, Redundant Data Percentage, Statistical Tests

Article number 1626224

Denna post skapades 2010-03-29. Senast ändrad 2016-07-26.
CPL Pubid: 118806


Läs direkt!

Länk till annan sajt (kan kräva inloggning)

Institutioner (Chalmers)

Institutionen för data- och informationsteknik, Programvaruteknik (Chalmers) (2008-2010)


Information Technology

Chalmers infrastruktur