The hush cryptosystem
Paper in proceeding, 2009

In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all. We employ a modified Word Substitution Method known as the Grammatical Substitution Method in our cryptosystem. We also make use of Hidden Markov Models. We test our cryptosystem using a computer program written in the Java Programming Language. Finally, we test the output of our cryptosystem using statistical tests. Copyright 2009 ACM.

Base64

Randomness Degree

Statistical Tests

Word Substitution

Sentence Substitution

Hidden Markov Models

Redundant Data Percentage

Grammatical Substitution

Author

Sari Haj Hussein

Chalmers, Computer Science and Engineering (Chalmers), Software Engineering and Technology (Chalmers)

Proceedings of the 2nd international conference on Security of information and networks

105-110
978-1-60558-412-6 (ISBN)

Subject Categories

Computer and Information Science

DOI

10.1145/1626195.1626224

ISBN

978-1-60558-412-6

More information

Created

10/8/2017