PixSel: Images as Book Cipher Keys

Authors

  • Mykel Shumay Brandon University
  • Gautam Srivastava Brandon University

Abstract

In this paper we introduce a novel encryption technique, which we call PixSel. This technique uses images in place of literature as the book cipher's key. Conventional book ciphers possess an unwieldy ciphertext enlargement, creating ciphertexts multiple times the length of the plaintext. As well, there is often the issue of a given book not containing the necessary material for the encipherment of some plaintexts. We sought to rectify these nuisances with PixSel, possessing a typical ciphertext enlargement of merely 1% to 20% for text. Using PixSel, there are also no limitations on encipherable data type, given a suitable image.

Author Biographies

Mykel Shumay, Brandon University

Department of Mathematics & Computer Science, Undergraduate Student

Gautam Srivastava, Brandon University

Department of Mathematics & Computer Science, Assistant Professor

References

U. M. Maurer, “Conditionally-perfect secrecy and a provably-secure

randomized cipher,” J. Cryptology, vol. 5, no. 1, pp. 53–66, 1992.

[Online]. Available: http://dx.doi.org/10.1007/BF00191321

C. Wang and S. Ju, “A novel method to implement book cipher,”

JCP, vol. 5, no. 11, pp. 1621–1628, 2010. [Online]. Available:

http://dx.doi.org/10.4304/jcp.5.11.1621-1628

R. Lele, R. Jainani, V. Mikhelkar, A. Nade, and M. V. Meshram, “The

book cipher optimised method to implement encryption and decryption,”

Journal of scientific & technology research, vol. 3, pp. 11–14, 2014.

NASA, “First global topographic model of mercury,” https://www.nasa.gov/feature/first-global-topographic-model-of-mercury, 2016.

“Lorem ipsum,” http://www.lipsum.com/.

W. Shakespeare, “The life and death of julius caesar,” http://shakespeare.mit.edu/julius_caesar/full.html.

L. M. Montgomery, “Anne of green gables,” http://www.freeclassicebooks.com/Lucy%20Maud%20Montgomery/Anne%20Of%20Green%20Gables.pdf.

Downloads

Published

2018-04-27

Issue

Section

Cryptography and Cybersecurity