Professional Documents
Culture Documents
79-82 79
ISSN 2230-7621MIT Publications
ABSTRACT
Cryptography enables two persons to exchange a message so that unauthorized persons cannot access the original message.
There are many different ways of performing this exchange, but the method hereby proposed a technique of encoding the
text so that the receiver can retrieve the original message. The contents of original message or the plain text are converted
into the cipher text by searching each character in the message and interchanging it with character based on the Fibonacci
number generated. Further, the cipher text is converted into the Unicode symbols. This helps avoid suspicion from the third
party when data is send through an unsecured communication channel. This proposed method is different as compared to
the traditional security methods.
General Terms: Encryption, Decryption, Key.
Intermediate string
Intermediate string
Unicode Symbols
Unicode Symbols
RGB Matrix
RGB Matrix
End
End
Fig. 2: Proposed Encryption Method
two parties. Any type of text data can be treated as a secret REFERENCES
message and is transmitted over the open channel. In a nutshell,
this proposed technique is very simple and easy to implement. [1] Dr. V. Sundaram, Secured Communication through Fibonacci
Numbers and Unicode Symbols International Journal of Scientific
& Engineering Research, Vol. 3, Issue 4, April 2012, pp. 490-494.
VI. FUTURE DIRECTIONS [2] Ahmad Abusukhon, Mohamad Talib, Issa Ottoum, Secure
In future, the proposed work performed on stream cipher can Network Communication Based on Text to Image Encryption
International Journal of Cyber -Security and Digital Forensics
also be performed on block cipher [4]. It will avoid encryption of (IJCSDF), 2012, pp. 263-271.
same plain text repeatedly. It will also save lot of work and time. [3] Syed Khutubuddin Ahmed Khadri, Debabrata Samanta, Mousumi
The work can further be extended for the secured communication Paul, Approach of Message Communication Using Fibonacci
Series: In Cryptology, Engineering and Technology Publications,
on network. It will be useful to avoid the threats on network Vol. 2, No. 2, June 2014, pp. 168-171.
since the message will be send and received in the form of an [4] R aghu M.E., Ravishankar K.C., Application of Classical
image. So, it will be difficult to detect the message that will be Encryption Techniques for Securing Data A Threaded Approach
transmitted over the communication network. International Journal on Cybernetics & Informatics (IJCI), Vol. 4,
No. 2, April 2015, pp. 125-132.