You are on page 1of 4

MIT International Journal of Computer Science and Information Technology, Vol. 5, No. 2, August 2015, pp.

79-82 79
ISSN 2230-7621MIT Publications

Data Encryption through Fibonacci Sequence


and Unicode Characters

Prachi Agarwal Navita Agarwal Richa Saxena


Assistant Professor Assistant Professor Assistant Professor
Department of CS&E Department of CS&E Department of CS&E
MIT, Moradabad, U.P., India MIT, Moradabad, U.P., India MIT, Moradabad, U.P., India
E-mail: reachtoprachi@gmail.com E-mail: nvgrwl06@gmail.com E-mail: richasaxena2006@gmail.com

ABSTRACT
Cryptography enables two persons to exchange a message so that unauthorized persons cannot access the original message.
There are many different ways of performing this exchange, but the method hereby proposed a technique of encoding the
text so that the receiver can retrieve the original message. The contents of original message or the plain text are converted
into the cipher text by searching each character in the message and interchanging it with character based on the Fibonacci
number generated. Further, the cipher text is converted into the Unicode symbols. This helps avoid suspicion from the third
party when data is send through an unsecured communication channel. This proposed method is different as compared to
the traditional security methods.
General Terms: Encryption, Decryption, Key.

or the contents of the plaintext inconceivable. Hash algorithms


I. INTRODUCTION
are generally used to allow a digital fingerprint of a files content
In current scenario, the major security companies and systems to ensure that no modifications are done on the file by an intruder
expend cryptography to channelize information around the or virus.
Internet. Some of the encryption process is extremely advanced;
however, even simple encryption techniques can help preserve A. Drawbacks of Existing Methods
the concealment of any information.
Transmission time for written documents coded with
The three types of cryptographic strategies generally used to public key cryptography is comparatively slower than the
achieve the cryptographic goals are: secret key or symmetric symmetric cryptography.
cryptography, public-key or asymmetric cryptography and
The size of the key should also be significantly larger
message digests or the hash functions. The former unencrypted
compared to the symmetric cryptography to accomplish
data is the plain text and is encrypted into cipher text, which is
the same degree of protection.
used to further be decrypted into usable plaintext.
Asymmetric cryptography is quite sensitive to impersona-
Secret key cryptography uses the same key for encryption as
tion attacks.
well as decryption of data. The primary issue with symmetric
key algorithms is the agreement of the sender and the receiver The cipher text obtained from the plain text is further converted
on a common key. In public-key cryptography, there are two into Unicode symbols. These symbols are transferred to the
keys- one for encryption and the other for decryption. It is known receiver in a text file over an unsecured communication channel.
as asymmetric since the users need both keys to complete the The Unicode encoding standard [1] allows encoding of all the
process. In Hash functions fixed-length hash value is calculated characters used for all written language of the world. Unicode
based on the plain text that makes the recovery of both the length encodings are called UTF-n where UTF is the Unicode
MIT International Journal of Computer Science and Information Technology, Vol. 5, No. 2, August 2015, pp. 79-82 80
ISSN 2230-7621MIT Publications

Transformation Format and n is the count defining the number


of bits used for encoding. Unicode assigns each character a
unique symbol and value, irrespective of the platform, program Key 1 Key 2
and language used for encryption.

II. RELATED WORKS Plain Cipher Unicode Symbols


A. Joseph Raphael et al. proposed a technique to encode the text Text Text in Text Files
message or the plain text so that the receiver of that message (or
the cipher text) can only find the originally sent message. The
plain text was converted to cipher text with the help of Fibonacci
number. In this, each character of the message was replaced with Unsecured Channel
another character. Now, the intermediate cipher text generated
was converted to Unicode symbols. These symbols were stored
in a text file and then were transmitted to the recipient. So,
Plain Cipher Unicode Symbols
the proposed method firstly converted plain text to cipher text
and then that cipher text was further converted to the Unicode
Text Text in Text Files
symbols.
Ahmad Abusukhon et al. [2] proposed a new method for data Key2 Key 1
encryption. The method was based on the secret key encryption.
The text was firstly encrypted into an image and then that matrix
of pixels was scrambled to make it difficult for the intruders to Fig. 1: Encryption and Decryption Process
guess the original text message. In this paper, a secure way was
proposed so that the attacker would not have the encryption
IV. PROPOSED METHODOLOGY
key required to get the original data from the cipher text. Thus
the hacker was unable to do any modification with the original In this paper a method is proposed in which the original message
plain text. called plain text is converted to cipher text using the generated
Fibonacci numbers. Firstly, we extract each character from
III. KEY-BASED ENCRYPTION AND DECRYPTION the original message and the replace it with another character.
PROCESS Traditional methods differ from this method because it provides
Cryptography is a standard to provide secure information by a unique way of selecting a character and replace the original
controlling access to resources. So, encryption of data before character with it. Now, the obtained intermediate cipher text is
sending it and its successful decyrption at the receipent end is converted into Unicode symbols which are further transmitted
a major issue. to the receiver. As we encrypt the message in two levels, it is
concealed from others and decryption process becomes more
A. Encryption Method difficult for any intruders. Hence, the conversion has two phases;
Encryption is the encoding of the contents of the original data firstly conversion of plain text to cipher text and then conversion
in such a way that conceals its contents from intuders. The plain of cipher text to Unicode symbols.
text is converted to the cipher text using a security key. It is done
by obtaining corresponding ASCII values [3] of each character. A. Encryption Process
These decimal values are then converted into hexadecimal values
(i) Text To Text Encryption
to obtain its equivalent Unicode symbols. These symbols are
then saved in a text file. By using Fibonacci series and Unicode Symbols. In this module
we encrypt the plain text into Unicode symbols with the help of
B. Decryption Method intermediary string obtained using Fibonacci series.
Decryption of the image is done in the reverse process of (ii) Text To Image Encryption
encryption with the use of the two keys. The recipient of the
In this module, text to image encryption and image shuffling is
message (the text file) extracts each symbol and then maps it to
find its equivalent hexadecimal value. After that, the obtained done. Encryption of the Unicode symbols into an image is done.
value is converted to a decimal value to determine the original Here three numbers are assigned representing each Unicode
plain text using the key. If anyone does not have knowledge symbol. This is done by using logic where the three numbers
of the key, there will be no suspicion of the existence of any represent the RGB values which forms a pixel and a matrix. And
confidential message in these decimal numbers. then we shuffle the matrix to obtain an image in .png format.
MIT International Journal of Computer Science and Information Technology, Vol. 5, No. 2, August 2015, pp. 79-82 81
ISSN 2230-7621MIT Publications

matrix and then corresponding decimal values are extracted.


Start
Start

Enter the plain textwith


security key Enter the plain textwith
security key
key
Conversion of plain text to intermediatestring
key
(using Fibonacci series) Conversion of plain text to intermediatestring
(using Fibonacci series)

Intermediate string
Intermediate string

Conversion of intermediate string into Unicode


symbols (conversion to hexadecimal no.) Conversion of intermediate string into Unicode
symbols (conversion to hexadecimal no.)

Unicode Symbols
Unicode Symbols

RGB matrixgenerated from Unicode symbols


RGB matrixgenerated from Unicode symbols

RGB Matrix
RGB Matrix

Shuffling the matrix &getting the image


Shuffling the matrix &getting the image

Text to image Encryption completed


Text to image Encryption completed

End
End
Fig. 2: Proposed Encryption Method

Fig. 3: Proposed Decryption Method


B. Decryption Process
In this module, after the receival of the encrypted message the V. CONCLUSION
reverse of encryption process is done. Firstly, image to text
This paper proposes a method of hiding data, developing its
decryption is done and after that text to text decryption is done
authenticity, and avoiding its unauthorized usage. Furthermore,
to recover the original plain text with the help of the two keys.
this paper presents a technique that can transfer huge quantities of
Thus, the unicode symbols in text file format is converted to
secret information. It also permit secure communication between
MIT International Journal of Computer Science and Information Technology, Vol. 5, No. 2, August 2015, pp. 79-82 82
ISSN 2230-7621MIT Publications

two parties. Any type of text data can be treated as a secret REFERENCES
message and is transmitted over the open channel. In a nutshell,
this proposed technique is very simple and easy to implement. [1] Dr. V. Sundaram, Secured Communication through Fibonacci
Numbers and Unicode Symbols International Journal of Scientific
& Engineering Research, Vol. 3, Issue 4, April 2012, pp. 490-494.
VI. FUTURE DIRECTIONS [2] Ahmad Abusukhon, Mohamad Talib, Issa Ottoum, Secure
In future, the proposed work performed on stream cipher can Network Communication Based on Text to Image Encryption
International Journal of Cyber -Security and Digital Forensics
also be performed on block cipher [4]. It will avoid encryption of (IJCSDF), 2012, pp. 263-271.
same plain text repeatedly. It will also save lot of work and time. [3] Syed Khutubuddin Ahmed Khadri, Debabrata Samanta, Mousumi
The work can further be extended for the secured communication Paul, Approach of Message Communication Using Fibonacci
Series: In Cryptology, Engineering and Technology Publications,
on network. It will be useful to avoid the threats on network Vol. 2, No. 2, June 2014, pp. 168-171.
since the message will be send and received in the form of an [4] R aghu M.E., Ravishankar K.C., Application of Classical
image. So, it will be difficult to detect the message that will be Encryption Techniques for Securing Data A Threaded Approach
transmitted over the communication network. International Journal on Cybernetics & Informatics (IJCI), Vol. 4,
No. 2, April 2015, pp. 125-132.

You might also like