Abstract:
The essence of securing information in the network environment is a major issue. Cryptographic algorithms are developed for such important task. They offer confidentiality, authentication, integrity, and non-repudiation.
Recently, a threat from law enforcement specifies that there should be à à à à à ¢ key recoveryà à à à à ¢ for encryption in case serious matters occur: the à à à à à ¢ key recoveryà à à à à ¢ process assists the authorized person to recover the encrypted message. Though the process is useful for the government duty, it violates the human right of privacy. Among varieties of cryptographic algorithms proposed so à à à à à ¢ chaffing and winnowingà à à à à ¢ algorithm offers a way to get around the à à à à à ¢ key recoveryà à à à à ¢ process. The algorithm does not employ encryption.
However, the algorithm produces large ciphertext and lacks of confidentiality. It is not applicable to the real network implementation where the size of transmitted data grows over the years. This study applies preprocessing input transformation to the algorithm to increase the security level and minimize the size of the ciphertext.