• DocumentCode
    2286809
  • Title

    Chain Rule Protection over the Internet Using PUGGAD Algorithm

  • Author

    Suttuchaya, V. ; Bhattarakosol, Pattarasinee

  • Author_Institution
    Dept. of Math., Chulalongkorn Univ., Bangkok
  • fYear
    2008
  • fDate
    20-22 Dec. 2008
  • Firstpage
    492
  • Lastpage
    496
  • Abstract
    Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.
  • Keywords
    Internet; cryptography; Internet; PUGGAD Algorithm; block size; chain rule protection; ciphertext; encryption process; one-time pad; pad/functional key algorithm for general encrypt/decrypt; perfect cipher method; plaintexts; Computer hacking; Computer security; Data mining; Data security; Internet; Mathematics; Protection; Public key; Public key cryptography; Random number generation; One-time pad; cryptography; decryption; encryption; perfect secrecy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Electrical Engineering, 2008. ICCEE 2008. International Conference on
  • Conference_Location
    Phuket
  • Print_ISBN
    978-0-7695-3504-3
  • Type

    conf

  • DOI
    10.1109/ICCEE.2008.153
  • Filename
    4741034