Cryptographic method based on Catalan objects and enumerative chess problem
-
Muzafer Saračević
, Selver Pepić und Fadil Novalić
Abstract
This chapter presents an analysis of the properties of Catalan numbers in the form of their objects and the possibility of application in data encryption. We present a new encryption method of text and image based on enumerative chess problem using Catalan-key. The proposed method consists of four phases: conversion, generation, selection, and inversion. The basic step is to convert text (or image) to binary notation and split binary sequence into blocks. Then, the next step is determining the start in the chessboard space and generating the Catalan-key. The third phase is a bit selection on the chessboard path based on the Catalan-key (object). The last step is the inversion of the selected bits. The proposed method was implemented in the JavaNetBeans environment. The NIST statistical tests were performed for the Catalan-keys (objects) generation through several aspects, where good results were obtained. In terms of DDoS attacks, we provided time and storage complexity of finding Catalan-keys, from which we can conclude that such a process is extremely burdensome for the hardware resources.
Abstract
This chapter presents an analysis of the properties of Catalan numbers in the form of their objects and the possibility of application in data encryption. We present a new encryption method of text and image based on enumerative chess problem using Catalan-key. The proposed method consists of four phases: conversion, generation, selection, and inversion. The basic step is to convert text (or image) to binary notation and split binary sequence into blocks. Then, the next step is determining the start in the chessboard space and generating the Catalan-key. The third phase is a bit selection on the chessboard path based on the Catalan-key (object). The last step is the inversion of the selected bits. The proposed method was implemented in the JavaNetBeans environment. The NIST statistical tests were performed for the Catalan-keys (objects) generation through several aspects, where good results were obtained. In terms of DDoS attacks, we provided time and storage complexity of finding Catalan-keys, from which we can conclude that such a process is extremely burdensome for the hardware resources.
Kapitel in diesem Buch
- Frontmatter I
- Preface V
- Acknowledgments VII
- About the Editors IX
- Contents XI
- List of contributors XIII
- Impact evaluation of DDoS and Malware attack using IoT devices 1
- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection 29
- Cryptographic method based on Catalan objects and enumerative chess problem 51
- Distributed denial-of-service attacks and mitigation in wireless sensor networks 67
- New techniques for DDoS attacks mitigation in resource-constrained networks 83
- Detection and behavioral analysis of botnets using honeynets and classification techniques 131
- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks 159
- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain 173
- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks 189
- Utilization of puzzles for protection against DDoS attacks 203
- Index 217
Kapitel in diesem Buch
- Frontmatter I
- Preface V
- Acknowledgments VII
- About the Editors IX
- Contents XI
- List of contributors XIII
- Impact evaluation of DDoS and Malware attack using IoT devices 1
- Understanding and implementation of machine learning using support vector machine for efficient DDoS attack detection 29
- Cryptographic method based on Catalan objects and enumerative chess problem 51
- Distributed denial-of-service attacks and mitigation in wireless sensor networks 67
- New techniques for DDoS attacks mitigation in resource-constrained networks 83
- Detection and behavioral analysis of botnets using honeynets and classification techniques 131
- Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks 159
- Probability, queuing, and statistical perspective in the distributed denial-of-service attacks domain 173
- Frequently used machine learning algorithm for detecting the distributed denial-of-service (DDoS) attacks 189
- Utilization of puzzles for protection against DDoS attacks 203
- Index 217