DESIGN AND IMPLEMENTATION OF A MATHEMATICAL ENCRYPTION MODEL FOR THE CENTRAL KURDISH FONT BASED ON UNICODE

Authors

  • Ziyad H. Abid Al Jabbar Technical College of Administration, Duhok Polytechnic University, Duhok, Kurdistan Region, Iraq
  • Zeravan A. Ali Technical College of Administration, Duhok Polytechnic University, Duhok, Kurdistan Region, Iraq
  • Hanan A. Taher Technical College of Administration, Duhok Polytechnic University, Duhok, Kurdistan Region, Iraq

DOI:

https://doi.org/10.25271/sjuoz.2023.11.2.1126

Keywords:

Kurdish language, Unicode, Central Kurdish Font, Encryption, Decryption, Offset Value, Caesar Method

Abstract

This research focuses on the development of encryption algorithms for the Kurdish language, specifically tailored to the Kurdish alphabet. With the rapid growth and digital advancements in the Kurdistan Region of Iraq, there is a pressing need for accurate encryption methods that can be applied to Kurdish texts in administration and digital governance. To address this need, a mathematical encryption model is proposed, leveraging the Kurdish central font supported by Microsoft Windows to ensure compatibility between sender and receiver. The model utilizes the Unicode representation of Kurdish letters to calculate offset and mod values accurately. The effectiveness of the proposed model is validated through its implementation using the Caesar cipher method. Computation tasks are performed using Excel, while the encryption system is designed and programmed in C#. Extensive testing of the system with diverse key values demonstrates its high accuracy, achieving a high success rate in encrypting Kurdish texts. This research contributes significantly to the field of encryption for the Kurdish language, providing a scientific framework for further advancements in this area.

References

Ahmed, O. H., Ahmed, A. M., Ahmed, S. H. J. I. J. o. E., & Science, C. (2015). Improving playfair algorithm to support user verification and all the languages in the world including kurdish language. 4(8), 14058-14062.

AL-Nasrawi, D. A., Hashem, H. A., & Odhaib, M. A. J. E. C. S. J. (2014). Unicode text editor for ancient Egyptian hieroglyphs writing system. 38(2), 48-55.

AL-Shakarchy, N. D., AL-Shahad, H. F., & AL-Nasrawi, D. A. (2018). Cryptographic system based on Unicode. Paper presented at the Journal of Physics: Conference Series.

Aleqabie, H. J., Al-Nasrawi, D., Al-Shakarchy, N., Alshahad, H., & Abd, E. (2019). New Cryptographic System of Romanized Arabic Text Based on Modified Playfiar. Journal of Engineering and Applied Sciences, 14. doi:10.36478/jeasci.2019.1331.1338

Alkhudaydi, M., & Gutub, A. J. S. C. S. (2021). Securing data via cryptography and Arabic text steganography. 2, 1-18.

Ghauri, F. (2021). DIGITAL SECURITY VERSUS PRIVATE INFORMATION.

Hawezi, R. S., Azeez, M. Y., & Qadir, A. A. (2019). Spell checking algorithm for agglutinative languages “Central Kurdish as an example”. Paper presented at the 2019 International Engineering Conference (IEC).

Kako, N. A. (2018). Classical Cryptography for Kurdish Language. Paper presented at the 4th International Engineering Conference on Developments in Civil & Computer Engineering Applications (IEC2018).

Kareem, R. A. (2016). The syntax of verbal inflection in Central Kurdish. Newcastle University,

Khairullah, M., & Ratul, M. (2018). Steganography in Bengali Unicode Text. 27.

Korpela, J. K. (2006). Unicode explained: " O'Reilly Media, Inc.".

Maghrebi, H., Portigliatti, T., & Prouff, E. (2016). Breaking cryptographic implementations using deep learning techniques. Paper presented at the Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings 6.

Maram, B., Gnanasekar, J., Manogaran, G., Balaanand, M. J. S. O. C., & Applications. (2019). Intelligent security algorithm for UNICODE data privacy and security in IOT. 13, 3-15.

Miltner, K. M. J. N. M., & Society. (2021). “One part politics, one part technology, one part history”: Racial representation in the Unicode 7.0 emoji set. 23(3), 515-534.

Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing: Pearson Education.

Pyeatt, L. (2016). Modern assembly language programming with the ARM processor: Newnes.

Rajasekharaiah, K., Dule, C. S., & Sudarshan, E. (2020). Cyber security challenges and its emerging trends on latest technologies. Paper presented at the IOP Conference Series: Materials Science and Engineering.

Ramanathan, A. J. J. o. O. S. S. (2022). Unishox: A hybrid encoder for short unicode strings. 7(69), 3919.

Rashid, F. J. A. a. S. (2020). Design and implementation a new approach for enhancing encryption and decryption mechanisms.

Shareef, S., & Arreymbi, J. (2013). E-Government Initiatives in Kurdistan Region of Iraq: A Citizen-Centric Approach. In (pp. 1-33).

Shirali-Shahreza, M., & Shirali-Shahreza, S. (2008, 8-10 Sept. 2008). Persian/Arabic Unicode Text Steganography. Paper presented at the 2008 The Fourth International Conference on Information Assurance and Security.

Stallings, W. (2006). Cryptography and Network Security: Principles and Practice: Pearson/Prentice Hall.

Tawfiq, N. E. J. A. J. o. N. U. (2018). Modified Lsb For Hiding Encrypted Kurdish Text Into Digital Image. 7(4), 254-260.

Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2015). An investigation on cyber security threats and security models. Paper presented at the 2015 IEEE 2nd international conference on cyber security and cloud computing.

Downloads

Published

2023-06-04

How to Cite

Abid Al Jabbar, Z. H., Ali , Z. A., & Taher , H. A. (2023). DESIGN AND IMPLEMENTATION OF A MATHEMATICAL ENCRYPTION MODEL FOR THE CENTRAL KURDISH FONT BASED ON UNICODE. Science Journal of University of Zakho, 11(2), 273–279. https://doi.org/10.25271/sjuoz.2023.11.2.1126

Issue

Section

Science Journal of University of Zakho