Data Security of Encrypted Data Using Hash-Based Message Authentication Code (HMAC) and T9-Based Data Conversion
Main Article Content
Abstract
The researcher has recently been working on the authenticity of information particularly with the use of cryptographic hash functions such as MD5 and Secure Hash Algorithm (SHA). After critically analyzing the Hash-based Message Authentication Code (HMAC) algorithm, the researcher finds out that it can still be improved and strengthened by adding the T9 conversion, which also adds more complexity and security to the system. T9 keypad-based conversion is used in converting the data and this pre-converted data would then pass through the process of encryption using HMAC encryption algorithm. This work focuses on following the cryptosystem design, and includes the study of the activity process and procedures, as well as the method of the proposed system. Cryptography key, plaintext, message security, cipher, message authentication code, and hash function are the major activities that go with the cryptosystems. The study uses the incremental model approach to generate and illustrate the system functions and architecture of this project. The resulting system is a new algorithm developed using hypertext preprocessor (PHP) in a form of Library PHP file by the researcher for securing the integrity and authenticity of the data. It provides high security of text data with the use of authentication process integrated with the new researcher-developed T9 encryption decryption process.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
References
Abo-Elsoud, M., Taki, E., Ali E., & Saif, S. M. (2013). Text and biomedical images disguising using advanced encryption standard. International Journal of Engineering Research & Technology, 2 (12), 3580 – 3582.
Aman, J. M. & Ali, B.Y. (2008). Image encryption using block-based transformation algorithm. IAENG International Journal of Computer Science, 35 (1), 15 - 23.
Bruen , A.A. & Forcinito , M. (2005). Cryptography, information theory, and error-correction: a handbook for the 21st Century. Wiley-Interscience, ISBN: 978-0- 471-65317-2, John Wiley & Sons, Inc.
Cuppens, F., Garcia-Alfaro, J., Heywood, N. Z., & Fong, W. L. (2014). Foundations and practice of security. Springer, Montreal, QC, Canada.
Chandra, N. (2015). What is message confidentication, integrity, authentication and non- repudiation?. Blogger Templates. Retrieved from http://nishichandra.blogspot. com/2015/09/message-confidentiality-integrity-authentication-nonrepudiation-entity-identification.html.
Delfs, H. & Knebl, H. (2015). Introduction to cryptography: principles and applications 3rd Edition. Springer, Verlag Berlin Heidelberg.
Dietrich , S. & Dhamija , R. (2007). Financial cryptography and data security. Retrieved from http://www.springer.com/gp/book/9783540773658.
Dixit, J.B. (2007). Computer programming. 2nd Edition, Laxmi Publications (P) LTD, 113, Golden House, Daryaganj, New Delhi.
El-Bendary, M. A. M. (2015). Developing security tools of WSN and WBAN networks applications. Springer, Tokyo Heidelberg New York Dordrecht London.
Forouzan, B. A. (2007). Data communications and networking. 4th Edition. McGraw- Hill Forouzan Networking Series.
Gurvinder, S.S., Vinay, V. & Kumar, R. (2013).Comparing popular symmetric key algorithms using various performance metrics. International Journal of Advance Research in Computer Science and Management Studies, 1(7), 394 - 399.
Hamid, J, Revett, K. & Palmer-Brown, D. (2008). Global E-Security. 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008, Proceedings.
Hans, D. & Helmut, K. (2007). Introduction to cryptography: principles and applications. 2nd Edition. Springer ISBN: 9783540492436, Hasan Mirjalili EPFL, Switzerland.
Jahankhani, H., Revett, K. & Palmer-Brown, D. (2008). Global E-security. Retrieved from https://downloaddigitaldevelopingdesign8.files.
Jawahar, N. (2014). Overview of system analysis and design. System analysis and design information systems components. Retrieved from https://eternal sunshineoftheismind. wordpress.com/2013/02/06/system-analysis-and-design-information-systems components.
Kessler, G.C. (2006). Types of cryptographic algorithms. An overview of cryptography. Retrieve from http://www.garykessler.net/library/crypto.html.
Kumar, R. (2004). J2EE security for servlets, EJBs and web services: applying theory and web services. Prentice Hall Press, Upper Saddle River, NJ, USA.
Mahapatra, A. & Rajballav, D. (2007). Data encryption and decryption by using hill cipher technique and self repetitive matrix. Retrieved from https://pdfs. semanticscholar.org/0580/7cd29b50cfbe160a0f299c79eb7e5e60026c.pdf.
Menezes, A. J., van Oorschot, P.C. & Vanstone, S.A. (2014). Overview of cryptography. Retrieved from http://cacr.uwaterloo.ca/hac/.
Miller , B. & Ranum , D. (2013). Problem solving with algorithms and data structures release 3.0. Retrieved from https://www.cs.auckland.ac.nz/courses/compsci 105ssc/resources/ProblemSolvingwithAlgorithmsandDataStructures.pdf
Pediapress GmbH. (2011). Computer science: an overview. Mainz, PediaPress GmbH, Boppstrasse 64, Mainz, Germany.
Ponemon, L. (2012). Encryption in the cloud. Encryption in the cloud: who is responsible for data protection in the cloud? Retrieved from https://www.ponemon.org/ local/upload/file/Encryption_in_the_Cloud%20FINAL_6_2.pdf.
Pressman, R. (2010). Software Engineering: A Practitioner's Approach. Boston: McGraw Hill, 41–42. ISBN 9780073375977.
Rouse, M. (2010). Hash-based-Message-Authentication-Code-HMAC. Retrieved from from http://searchsecurity.techtarget.com/definition/Hash-based-Message-Authentication-Code-HMAC
Shahd, ARH. (2013). Image Integrity based on HMAC Structure. International Journal of Computer Science and Information Security Publication, 11 (8), 19 - 24.
Vishwanath, U. (2012). Development of data encryption algorithms for secure communication using public images. The University of Toledo Digital Repository. Retrieved from http://utdr.utoledo.edu/cgi/viewcontent.cgi? article=1478&context=theses-dissertations.