Secure Text Conferencing System Using Multiple Layer Encryptions

Authors

  • Najmadin Wahid Boskany Faculty of Science and Science Education, University of Sulaimani, Kurdistan Region, Iraq. Author

DOI:

https://doi.org/10.17656/jzs.10273

Keywords:

Secure Text Conferencing, Plaintext, Cipher Text, Promiscuous Mode, Windows Sockets, Network Security, Client-Server Networks

Abstract

The coding theory becomes increasingly important over the decades. There are some different works that have been dedicated to the problems of cryptography. In the present paper, the design and implementation of a secure text conferencing system have been proposed and implemented. Also explained how plaintext can be encrypted in three levels before sending it to the destination has been explained. Later, how ciphered text decrypted from destination side to its origin plaintext has been described.

References

-A.Chandra Sekhar, K.R. Sudha, and Prasad Reddy P V G D,” Data Encryption technique using Random number generator”, IEEE, 2007. DOI: https://doi.org/10.1109/GrC.2007.73

-Holger kruse and Amar Mukherjee , “DATA COMPRESSION USING TEXT ENCRYPTION”, 1068-0314, IEEE, 1997. DOI: https://doi.org/10.1109/DCC.1997.582107

-Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms, IEEE, 2005.

-Liakot Ali, Nurul Amziah Md Yunus, Haslina Jaafar, Rahman Wagiran, Evanna Low “Implementation of Triple Data Encryption Algorithm Using VHDL” ICSE2004, Proc. 2004, Kuala Lumpur, Malaysia.

-Subbarao V. Wunnava and Ernesto Rassi;”Data Encryption Performance and Evaluation Schemes”, Proceedings IEEE Southeastcon 2002.

-A; Ammar, A. El Sherbini, I. Ashour, M. Shiple, “Random Data Encryption Algorithm (RDEA)”, Twenty Second National Radio Science Conference (NRSC 2010) March 1517,2005, CaikEgypt. DOI: https://doi.org/10.1109/NRSC.2005.194020

-Zon-Yin Shae1, Dinesh Garg2 , Rajarshi Bhose2, Ritabrata Mukherjee3, Sinem Güven1, Gopal Pingali ”Efficient Internet Chat Services for Help Desk Agents” 2007 IEEE International Conference on Services Computing (SCC 2007). DOI: https://doi.org/10.1109/SCC.2007.54

-Behrouz A. Forouzan, “Data Communication and Networking” fourth edition, ISBN: 978-0-07-296775-3, 2007

-Dr. V.K. Govindan and B.S. Shajee mohan, “AN INTELLIGENT TEXT DATA ENCRYPTION AND COMPRESSION FOR HIGH SPEED AND SECURE DATA TRANSMISSION OVER INTERNET”, 2004.

-Lynn Anderson and Kathy McCarthy, “Text-based Conferencing Features vs. functionality”, ERR-ODL journal, Vol. 6, No. 3, 2005 DOI: https://doi.org/10.19173/irrodl.v6i3.272

-Malhotra, A., Sharma, V., Gandhi, P. And Purohit, N., “UDP based chat application” Journal: 2010 2nd International Conference on Computer Engineering and Technology Year: 2010 Volume: 6 Pages: V6-374-V6-377 Provider: IEEE Publisher: IEEE DOI: 10.1109/ICCET.2010.5486192. DOI: https://doi.org/10.1109/ICCET.2010.5486192

-David C. Uthus, David W. Aha, “Multiparticipant chat analysis: A survey”,NRC/NRL Postdoctoral Fellow, Washington, DC 20375, United States, Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory (Code 5514); Washington, DC 20375, United States, 2013.

-Özcan Özyurt *, Cemal Köse, “Chat mining: Automatically determination of chat conversations”, topic in Turkish text based chat mediums, Karadeniz Technical University, Department of Computer Engineering, Faculty of Engineering, 61080 Trabzon, Turkey, 2010. DOI: https://doi.org/10.1016/j.eswa.2010.06.053

Published

2013-09-04

How to Cite

Secure Text Conferencing System Using Multiple Layer Encryptions. (2013). Journal of Zankoy Sulaimani - Part A, 15(4), 43-48. https://doi.org/10.17656/jzs.10273