Vector’s method of information encryption based on the author’s template
Abstract
In connection with the rapid increase in the amount of data processed by modern information systems, there is a need for compact and reliable storage of this data. Method of encryption with compression, which allows not only to protect confidential information from malicious use, but also to save storage space for data by the compression was describe in the article. This encryption method differs from other existing methods in that it effectively reduces the size of the data that is stored. This encryption method is based on the author’s template, which is the prototype of the encryption table. Statistical text analysis and matrix primitives were used to build the author’s template. A new method of using plaintext encryption to simultaneously implement compression and encryption with a long key and low hardware computing power, where the key is easily shared, stored and remembered. The method involves splitting the input text into vectors with weights and finding their positions in the author’s template. Application of this method allows not only to protect data from unauthorized access, but also to ensure optimized data storage. Research has shown that the resulting encrypted sequence is 65% smaller than the input text. This approach is especially important in the conditions of the growing amount of data, when efficient storage and transfer of information become key success factors in any information system. The described encryption method can be widely used in many fields, including financial services, medical and scientific fields, where the need for reliable and compact data storage is the most important
References
2. Ma, Z., Bai, G., and Z. Wang (2018) A Hybrid Compression-Encryption Method for Big Data in Cloud Storage. IEEE Access, 6, 29002-29013.
3. Raigoza, J., & Jituri, K. (2016) Evaluating performance of symmetric encryption algorithms. International conference on computational science and computational intelligence, 1378-1379.
4. Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256-272.
5. Saleem, K., Derhab, A., Orgun, M. A., Al-Muhtadi, J., Rodrigues, J. J., Khalil, M. S., & Ali Ahmed, A. (2016). Cost-effective encryption-based autonomous routing protocol for efficient and secure wireless sensor networks. Sensors, 16(4), 460.
Abstract views: 74 PDF Downloads: 75