Skip to main content

Analysis of Text Complexity in a Crypto System – A Case Study on Telugu

  • Conference paper
Security Technology (SecTech 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 58))

Included in the following conference series:

Abstract

Global connectivity provided praxis for data transactions. Data or information is available in different forms like text, image, audio, video etc. Security mechanisms are aimed at security algorithms with an assumption that the information is in bit stream. Human perception deals with information other than bit stream. In the transaction process of information, users allow human understandable format of data. A simple case of text data deals with multiple scripts represented in multiple combinations of bit streams. Transformation of basic characteristics that are embodied in the script is an interesting area to be explored in security models. The present work is aimed at analyzing the basic characteristics of a script in the form of frequency distribution of character code points. The proposed model is evaluated on Telugu script as a case study with a comparison on Latin text. The evaluation is limited to 8-bit and 16-bit key sizes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stone, A.: Internationalizing the Internet. J. Internet Computing 3, 11–12 (2003)

    Article  Google Scholar 

  2. Pratap Reddy, L.: A New Scheme for Information Interchange in Telugu through Computer Networks: Doctoral Thesis. JNTU, Hyderabad, India (2001)

    Google Scholar 

  3. Vishnu Vardhan, B.: Analysis of N Gram Model on Telugu Document Classification. Doctoral Thesis. JNTU, Hyderabad, India (2007)

    Google Scholar 

  4. Lee, K.W., Teh, C.E., Tan, Y.L.: Decrypting English Text Using Enhanced Frequency Analysis. In: National Seminar on Science, Technology and Social Sciences (UiTM-STSS 2006), pp. 1–7 (2006)

    Google Scholar 

  5. Jakobsen, T.: A fast Method for Cryptanalysis of Subsittution Ciphers. J. Cryptologia XIX 3, 265–274 (1995)

    Google Scholar 

  6. Bauer, F.L.: Decrypted secrets-Methods and Maxims of Cryptology. Springer, Heidelberg (2007)

    Google Scholar 

  7. Menezes, A.J.P.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)

    Google Scholar 

  8. De Canniere, C., Biryukov, A., Preneel: An Introduction to Block Cipher Cryptanalysis. J. IEEE 94(2) (2006)

    Google Scholar 

  9. Bárbara, E., Rinza, S., Alejandra, D., Zavala, B., Chavez, A.C.: De-encryption of a text in spanish using probability and statistics. In: 18th IEEE International Conference on Electronics, Communications and Computers, pp. 75–77 (2008)

    Google Scholar 

  10. Guan, B.-C., Chang, R.-I., Wei, Y.C., Hu, C.-L., Chiu, Y.-L.: An encryption scheme for large Chinese texts. In: IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, Taipei, Taiwan, pp. 564–568 (2003)

    Google Scholar 

  11. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: Steganography in Persian and Arabic Unicode Texts Using Pseudo-Space and Pseudo-Connection Characters. J. Theoretical and Applied Information Technology (JATIT) 8, 682–687 (2008)

    Google Scholar 

  12. Shirali-Shahreza, M.H., Shirali-Shahreza, M.: A New Approach to Persian/Arabic Text Steganography. In: 5th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006), Honolulu, HI, USA, pp. 310–315 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Raju, M.S.V.S.B., Vardhan, B.V., Naidu, G.A., Reddy, L.P., Babu, A.V. (2009). Analysis of Text Complexity in a Crypto System – A Case Study on Telugu. In: Ślęzak, D., Kim, Th., Fang, WC., Arnett, K.P. (eds) Security Technology. SecTech 2009. Communications in Computer and Information Science, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10847-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10847-1_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10846-4

  • Online ISBN: 978-3-642-10847-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics