Digital Right Management Model based on Cryptography for Text Contents

نویسنده

  • Pushpendra Kumar Verma
چکیده

Generally, DRM (Digital Rights Management) system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, all digital contents are temporarily disclosed with perfect condition via decryption process. This paper describes the fundamental idea of a novel DRM method which is composed of an incomplete cryptography and user identification mechanism to control the quality of digital contents. This research paper proposes an improved scheme to encrypt the plain text message for its security. All the conventional encryption techniques are very weak and brute force attack and traditional cryptanalysis can be used to easily determine the plain text from encrypted text. In this work of encryption technique, a new concept of conventional ceaser cipher algorithm with hill cipher algorithm is used to make encryption technique more secure and stronger than the earlier concept. The plain text is encrypted in such a way that it becomes difficult to decrypt it. The proposed system is divided into two phases. In first phase, the plain text message is converted to first encrypted text using a new substitution approach which uses polyalphabetic cipher technique. The encryption is done using variable length key which depends on the string length. In the second phase, the hill cipher technique is applied on the first encrypted text to produce new encrypted text or cipher text. At the receiver end, if the receiver has appropriate decryption key, he can generate the text message similar to the original message. DRM is a form of cryptography, the process of protecting information from unauthorized use by transforming it so that only the authorized receiver can read it. The sender – in this context, the information vendor or provider – encrypts the digital object via a “key” of some kind. The recipient – the information user – may decrypt it for use with a copy of the same key, usually automatically. The information is protected from “attackers” – unauthorized users, or uses – who lack the key. Encryption Standard (AES). Features of data are depends on its types. Therefore same encryption technique cannot be used used for all types of data. Images have large data size and also has real time constrain problem hence similar method cannot be used to protect images as well as text from unauthorized access. However with few variations in method AES can be used to protect image as well as text. In this project I have implemented encryption and decryption for text and image using AES. Index Terms – Key Based Interval Splitting (KSAC), Advanced Encryption Standard (AES).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

مدیریت کلید در سیستم‌های مدیریت حقوق دیجیتال در حالت برون‌خطی

By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Convertible Drm System Based on Identity-based Encryption

With the rapid growth of the Internet, acquiring digital contents over the Internet has become commonplace. Most traditional items can be translated into digital form. That is to say the digital contents can be distributed easily and rapidly to users over the Internet. Unfortunately, situations of piracy are common and become more serious, since the digital contents can be copied and distribute...

متن کامل

A Vector Approach to Cryptography Implementation

The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptographic applications. Embedded microprocessors have been equipped with bulky and power-consuming coprocessors designed to suit particular data sizes. However, flexible cryptographic platforms are more desirable than device...

متن کامل

A New Digital Rights Management Solution Based on White-Box Cryptography

Digital rights management is an important technique to protect digital contents from abuse. Usually it is confronted with severe challenges because of the untrusted environment its application executed in. This condition is formally described as white-box attack model. White-box cryptography aims at protecting software implementation of cryptographic algorithms from white-box attack, hence can ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016