Search or add a thesis

Advanced Search (Beta)
Home > O Ptimization of B Lock E Ncryption B Ased S Peech C Oder a Gainst T Ransmission C Hannel N Oise

O Ptimization of B Lock E Ncryption B Ased S Peech C Oder a Gainst T Ransmission C Hannel N Oise

Thesis Info

Access Option

External Link

Author

Saeed, Manzar

Program

PhD

Institute

University of Engineering and Technology

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2009

Thesis Completion Status

Completed

Subject

Applied Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/handle/123456789/201

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676726789518

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Compression of data has become a worldwide phenomenon during the past few decades for rea- son of achieving savings in band-width (BW) and hence makes it cost effective. The widespread practice of encryption of data has generated interest for many decades and it mainly aims at pro- tection of data. Combining these two apparently contrary processes (in terms of BW) is quite challenging. Whereas the research on concurrent data compression and data protection (encryp- tion) is still on, the methodology adopted by the author is unique and quite new. The most impor- tant aim of data compression technique is the need for curtailing the data storage and communi- cation expenses. The source message (long) is converted to a codeword (small). The key objec- tive of data encryption is to guard the integrity of data if it is intercepted by an eavesdropper. The plaintext is transformed in to ciphertext using an encryption key or keys. Combining the processes of compression and encryption together must be done in this order, that is, compres- sion followed by encryption because all compression techniques heavily rely on the redundancies inherently part of a regular text or speech. The speech compression has been achieved using Lempel-Ziv 78 algorithm and a new algorithm for encryption/decryption, named ―The Random- One, abbreviated as TR-1‖ is developed during this study and is thoroughly tested. The results obtained are quite encouraging. Firstly, contrary to the use of conventional methods the algo- rithm developed in this study does not use exclusive-OR (XOR) operation in Permutation (P) and Distribution (D) boxes for producing ciphertext from the plaintext. In this scheme pseudo ran- dom number (PRN) is used only to deceive the intruder by adding more confusion (meaning compared to the confusion due to the use of some tested algorithms used in this research). In fact only the sender of information and the intended recipient (not intruders) should be aware of the 44 bit positions filled by the PRN in a 128 word. The intended recipient discards these during deciphering process at the right time (these are disposed of before performing the inverse map- ping in the P-Box). Secondly, protection against attacks is further ensured by using two supple- mentary keys, one for the P-Box, and another for the D-box. In addition the routine key-set of the N selected algorithms further enhances the security. In a small set-up, the distribution of key-set can be mutually agreed upon by the users; but in a large set-up, the distribution of these sets can be accomplished using standard key distribution techniques. Moreover, the proposed algorithm- - also differs from the other methods currently in use due to deployment of a ―sentinel marker”; which is not adopted by other algorithms and this proposal is purely the brain child of the author. The sentinel marker is part of the secret key which is pre-decided and predetermined by the sender and the intended recipient of the information. Twenty bits (out of a total of 128) are used for the sentinel marker which amounts to 2^20 = 1,048,576 possibilities combined with 2^44 = 17.6 trillion possibilities of the ciphertext produced by the PRN. The job for the cryptanalyst to break this cipher becomes formidable and a fool-proof security of data is ensured.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ہوئے جد دے یار بیگانے

ہوئے جد دے یار بیگانے
بنے دشمن کل زمانے

اساں ترس گئے یار ملن نوں
تیری کیوں نہیں ڈھکدی خانے

کتے پھلاں اتے تتلی
کتے شمع تے پروانے

عشق کیتا زور زلیخا
ونڈ دتے مال خزانے

گئے تارے منہ لکا کے
چن چڑھیا جد آسمانے

سنگ جس دی عمراں گزری
اجے غیر ہیں اس دے بھانے

کرو رحمت یا محمدؐ
تیرے امتی سب دیوانے

بھانویں ہائی زلیخا جھوٹی
گئے یوسف بندی خانے

کیوں نیوں اجیہا لایا
مینوں دنیا دیندی طعنے

کئی بے گناہ وچ جیلاں
کئی بے گناہ وچ تھانے

اوہدی پلکاں وانگر سوئیاں
جیویں چڑھیا تیر کمانے

اوہ بے پرواہ کہاوے
جیہڑا مالک کل جہانے

تفسیرِ ماجدی کے منتخب آیات کی روشنی میں یہودیت کے متعلق مولانا عبد الماجد دریابادی کی آراء کا تحقیقی و تجزیاتی مطالعہ

There is no doubt in the fact that Judaism is the oldest Abrahamic religion among all. Judaism is not only the oldest religion, but it provides a foundation for the coming two Abrahamic religions as well i.e. Christianity and Islam. There have already been rigorous discussions in the existing literature regarding the beliefs and history of Judaism. Scholars have also shed light on the beliefs of various sects of Jews. ‘Tafseeri-Majdi’ is one such contribution to the literature. The present study focuses on the work of Majdi and discusses various famous theories, stories, and personalities presented in his ‘Tafseer’. The present study attempts to shed light on the life of Abdul Majid Daryabadi, the methodology adopted in his ‘Tafseer’, and analysis of his approaches and discussions about Judaism.

A Cross-Cultural Ethnobotanical Comparison of Plants Use Among Saraiki, Pukhtoon and Punjabi Communities in Southwest Pakistan

The present project is confined to study the cross cultural ethnobotanical utilization of medicinal plants among three ethnic communities Saraiki, Pukhtoon, and Punjabi in Southwest Pakistan. This is the first ever independent investigation in this region to document the traditional knowledge of plant usage among selected communities. Ethnobotanical information was documented through semi structured and open-ended interviews using questionnaire and group discussions. In total of 329 informants of varied age groups, education level, gender, and experience were interviewed. The data was quantitatively analyzed using various indices i,e Relative frequency of citation (RFC), Informant consensus factor (ICF), Disease consensus index (DCI), Cultural significance index (CSI), Use value (UV), Relative importance (RI), Fidelity level (FL%), Jaccard index (JI), Cultural importance index (CI), and Sorensen''s similarity index (QS). About 229 medicinal plant species belonging to 83 families were reported for ethnomedicinal uses. In total of eight (8) categories regarding the use of medicinal plants were 56 plant species were reported for the gastropathic disorder, 73 species for wound healing, 66 species for Respiratory tract disorder, 68 species for traditional food and herbal drinks, 72 species for Insect repellent plants, 60 species for ethnoveterinary uses, 40 species for diabetes and 74 species as edible wild fruits discussed in this project. In addition to this, Ferula oopoda species was selected for detailed phytochemical analysis. This study reports that South West Pakistan has rich traditional knowledge of medicinal plant uses. Traditional knowledge is prevailing in the region, more common in the elders than the younger generation. Most of the plant species used for multiple purposes as several plant species are used for more than one diseases. The study encompasses the need to conserve traditional knowledge and carry out a future pharmacological investigation to appraise important mineral, nutrients, antioxidant potentials and toxic effect of these species. This study will serve as baseline data for future drug discovery development in particular and primary healthcare for locals.