NEW APPROACH TO BOOK CIPHER: WEB PAGES AS A CRYPTOGRAPHIC KEY

Main Article Content

Farman Khubali Mammadov

Abstract

Research relevance: Since ancient times, people have widely used methods of concealment and coding during information sharing, and ensuring the protection of information is currently relevant. Encryption methods are developing daily in order to ensure the reliable protection of confidential information and the exchange of data on the network. The subject and purpose of the research are to develop an encryption method, which is based on the ideology of book cipher and uses web pages as a cryptographic key, in the organization of a secure exchange of information. The following tasks are solved in the article: The article provides information about book cipher and analyzes modern methods of book cipher, as well as proposes a novel encryption method involving the use of web pages as a cryptographic key. Research methods: In the paper methods of analysis and synthesis are used. Obtained results and conclusions: The possibility of transforming the book cipher is proved, and a novel encryption method involving the use of web pages as a cryptographic key is proposed. The article also provides a comparison between the proposed encryption method involving the use of Internet pages as a cryptographic key with the classic book cipher method.

Article Details

How to Cite
Mammadov , F. K. . (2023). NEW APPROACH TO BOOK CIPHER: WEB PAGES AS A CRYPTOGRAPHIC KEY. Advanced Information Systems, 7(1), 59–65. https://doi.org/10.20998/2522-9052.2023.1.10
Section
Methods of information systems protection
Author Biography

Farman Khubali Mammadov , Military Scientific-Research Institute of the National Defense University, Baku

postgraduate student

References

Barker, E.B., Roginsky, A.L. & Davis, R. (2020), Recommendation for Cryptographic Key Generation, National Institute of Standards and Technology (NIST), Gaithersburg, USA, Special Publication (SP) 800-133, Rev. 2., 36 p., doi: https://doi.org/10.6028/NIST.SP.800-133r2

Elizabeth, D. & Denning, R. (1982), Cryptography and data security, Addison-Wesley Publishing Company, USA and Canada, Inc., 404 p.

Ferguson, N. Schneier, B. & Kohno, T. (2010), Cryptography Engineering: Design Principles and Practical Applications, Wiley Publishing, Indianapolis, Indiana, USA: 353 p.

Churchhouse, R.F. (2004), Codes and Ciphers. Julius Caesar, the Enigma and the internet, Cambridge University Press, Cambridge, UK, 240 p.

Gasimov, V.A. (2009), Informasiya tehlukesizliyinin esaslari [Fundamentals of information security. Textbook], MNS MTS Main Department Publishing Center, Baku, Azerbaijan, 340 p. (in Azerbaijani)

Alqad, Z., Oraiqat, M., Almujafet, H., Al-Saleh, S., Husban, H.Al & Al-Rimawi S. (2019), “A New Approach for Data Cryptography”, International Journal of Computer Science and Mobile Computing, Vol. 8, Is. 9, pp. 30-48.

Shumay, M. & Srivastava, G. (2018), “PixSel: Images as Book Cipher Keys”, Intl Journal of Electronics and Telecommunications, Vol. 64, No. 2, pp. 151–158. doi: https://doi.org/10.24425/119363

Lele, R. Jainani, R., Mikhelkar, V. & Nade A. (2014), “The Book Cipher Optimised Method To Implement Encryption And Decryption”, International journal of scientific & technology research, Volume 3, Issue 1, pp. 11-14.

Ristanovic, D. & Protic, J. (2008), “The Book Cipher Algorithm”, Dr. Dobb’s Journal, October, pp. 48-51, URL: drdobbs.com/security/the-book-cipher-algorithm/210603676

Wang, C. & Ju, S. (2010), “A novel method to implement book cipher”, Journal Of Computers, Vol. 5, No. 11, pp. 1621–1628, doi: http://dx.doi.org/10.4304/jcp.5.11.1621–1628

Wang, C. & Ju, S. (2008), “Book Cipher with Infinite Key Space”, 2008 International Symposium on Information Science and Engineering, Shangai, China: IEEE, pp. 456-459, doi: http://dx.doi.org/10.1109/ISISE.2008.273

Aliguliyev, R.M. & Imamverdiyev, Y.N. (2006), Kriptoqrafiyanın əsasları [Fundamentals of Cryptograpy], Baku, Azerbaijan: Publishing House “Information technologies”, 688 p. (in Azerbaijani)

Dushkin R.B. & Yaxontov, S.I. (2021), “Knijniy shifr [Book Cipher]”, Potential. Mathematics. Physics. Informatics, No. 03, pp. 45–49. (in Russian)

(2022) Book Cipher, URL: https://cryptography.fandom.com/wiki/Book_cipher (16.03.2022).

(2022) How Many Websites Are There? URL: https://websitesetup.org/news/ how-many-websites-are-there/ (28.11.2022).

Huss, N. (2022), How Many Websites Are There in the World? URL: https://siteefy.com/how-many-websites-are-there/ (03.12.2022).

(2022) Total number of Websites, URL: https://www.internetlivestats.com/total-number-of-websites/ (15.12.2022).