CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Text Encryption with Huffman Compression

by Nigam Sangwan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 6
Year of Publication: 2012
Authors: Nigam Sangwan
10.5120/8572-2307

Nigam Sangwan . Text Encryption with Huffman Compression. International Journal of Computer Applications. 54, 6 ( September 2012), 29-32. DOI=10.5120/8572-2307

@article{ 10.5120/8572-2307,
author = { Nigam Sangwan },
title = { Text Encryption with Huffman Compression },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 6 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number6/8572-2307/ },
doi = { 10.5120/8572-2307 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:01.456045+05:30
%A Nigam Sangwan
%T Text Encryption with Huffman Compression
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 6
%P 29-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Communication between a sender and receiver needs security. It can be done in any form, like plain text or binary data. Changing the information to some unidentifiable form, can save it from assailants. For example, plain text can be coded using schemes so that a stranger cannot apprehend it. Cryptography is a subject or field which deals with the secret transmission of messages/ data between two parties. Cryptography is the practice and study of hiding information. It enables you to store delicate information and transmit it across insecure networks so that it cannot be read by anyone except the authorized recipient. Applications of cryptography include ATM cards, computer passwords, and electronic commerce etc. Messages, which are being sent between two parties, should be of small size so that they occupy less space. Data compression involves encoding of information using fewer bits than the original representation. Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Symmetric key cryptography algorithms [6] are fast and mostly used type of encryption. Many types of data compression techniques do exist. Huffman Compression [5] is a lossless data compression technique and can be considered as the most efficient algorithm. In this paper, a combination of new Symmetric key algorithm and existing Huffman compression algorithm has been proposed. Proposed method works on text data. Algorithms have been provided in the paper itself.

References
  1. Ayushi, a Symmetric Key Cryptographic Algorithm, International Journal of Computer Applications (0975 - 8887), Volume 1 – No. 15.
  2. S. R. Kodituwakku, U. S. Amarasinghe, Comparison of Lossless Data Compression Algorithms for Text Data, Indian Journal of Computer Science and Engineering, Vol 1 No 4 416-425.
  3. Mohamed F. Mansour, EFFICIENT HUFFMAN DECODING WITH TABLE LOOKUP, IEEE 2007.
  4. An article on "Huffman Codes", available at http://www. columbia. edu/~cs2035/courses/csor4231. F11/huff. pdf
  5. Articles on "Huffman Coding", available at http://en. wikipedia. org/wiki/Huffman_coding, http://en. wikipedia. org/wiki/Data_compression
  6. An article on "Symmetric Algorithm", available at http://www. encryptionanddecryption. com/algorithms/symmetric_algorithms. html
  7. Cryptography and Network Security, Principles and Practices by William Stallings.
  8. Security in Computing by Charles P. Pfleeger, Shari Lawrence Pfleeger.
  9. Pushpa R. Suri1 and Madhu Goel, "Ternary Tree and Memory-Efficient Huffman Decoding Algorithm", IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Huffman Compression Cryptography Symmetric key