DESIGN AND IMPLEMENTATION OF A MATHEMATICAL ENCRYPTION MODEL FOR THE CENTRAL KURDISH FONT BASED ON UNICODE
DOI:
https://doi.org/10.25271/sjuoz.2023.11.2.1126Keywords:
Kurdish language, Unicode, Central Kurdish Font, Encryption, Decryption, Offset Value, Caesar MethodAbstract
This research focuses on the development of encryption algorithms for the Kurdish language, specifically tailored to the Kurdish alphabet. With the rapid growth and digital advancements in the Kurdistan Region of Iraq, there is a pressing need for accurate encryption methods that can be applied to Kurdish texts in administration and digital governance. To address this need, a mathematical encryption model is proposed, leveraging the Kurdish central font supported by Microsoft Windows to ensure compatibility between sender and receiver. The model utilizes the Unicode representation of Kurdish letters to calculate offset and mod values accurately. The effectiveness of the proposed model is validated through its implementation using the Caesar cipher method. Computation tasks are performed using Excel, while the encryption system is designed and programmed in C#. Extensive testing of the system with diverse key values demonstrates its high accuracy, achieving a high success rate in encrypting Kurdish texts. This research contributes significantly to the field of encryption for the Kurdish language, providing a scientific framework for further advancements in this area.
References
Ahmed, O. H., Ahmed, A. M., Ahmed, S. H. J. I. J. o. E., & Science, C. (2015). Improving playfair algorithm to support user verification and all the languages in the world including kurdish language. 4(8), 14058-14062.
AL-Nasrawi, D. A., Hashem, H. A., & Odhaib, M. A. J. E. C. S. J. (2014). Unicode text editor for ancient Egyptian hieroglyphs writing system. 38(2), 48-55.
AL-Shakarchy, N. D., AL-Shahad, H. F., & AL-Nasrawi, D. A. (2018). Cryptographic system based on Unicode. Paper presented at the Journal of Physics: Conference Series.
Aleqabie, H. J., Al-Nasrawi, D., Al-Shakarchy, N., Alshahad, H., & Abd, E. (2019). New Cryptographic System of Romanized Arabic Text Based on Modified Playfiar. Journal of Engineering and Applied Sciences, 14. doi:10.36478/jeasci.2019.1331.1338
Alkhudaydi, M., & Gutub, A. J. S. C. S. (2021). Securing data via cryptography and Arabic text steganography. 2, 1-18.
Ghauri, F. (2021). DIGITAL SECURITY VERSUS PRIVATE INFORMATION.
Hawezi, R. S., Azeez, M. Y., & Qadir, A. A. (2019). Spell checking algorithm for agglutinative languages “Central Kurdish as an example”. Paper presented at the 2019 International Engineering Conference (IEC).
Kako, N. A. (2018). Classical Cryptography for Kurdish Language. Paper presented at the 4th International Engineering Conference on Developments in Civil & Computer Engineering Applications (IEC2018).
Kareem, R. A. (2016). The syntax of verbal inflection in Central Kurdish. Newcastle University,
Khairullah, M., & Ratul, M. (2018). Steganography in Bengali Unicode Text. 27.
Korpela, J. K. (2006). Unicode explained: " O'Reilly Media, Inc.".
Maghrebi, H., Portigliatti, T., & Prouff, E. (2016). Breaking cryptographic implementations using deep learning techniques. Paper presented at the Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings 6.
Maram, B., Gnanasekar, J., Manogaran, G., Balaanand, M. J. S. O. C., & Applications. (2019). Intelligent security algorithm for UNICODE data privacy and security in IOT. 13, 3-15.
Miltner, K. M. J. N. M., & Society. (2021). “One part politics, one part technology, one part history”: Racial representation in the Unicode 7.0 emoji set. 23(3), 515-534.
Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing: Pearson Education.
Pyeatt, L. (2016). Modern assembly language programming with the ARM processor: Newnes.
Rajasekharaiah, K., Dule, C. S., & Sudarshan, E. (2020). Cyber security challenges and its emerging trends on latest technologies. Paper presented at the IOP Conference Series: Materials Science and Engineering.
Ramanathan, A. J. J. o. O. S. S. (2022). Unishox: A hybrid encoder for short unicode strings. 7(69), 3919.
Rashid, F. J. A. a. S. (2020). Design and implementation a new approach for enhancing encryption and decryption mechanisms.
Shareef, S., & Arreymbi, J. (2013). E-Government Initiatives in Kurdistan Region of Iraq: A Citizen-Centric Approach. In (pp. 1-33).
Shirali-Shahreza, M., & Shirali-Shahreza, S. (2008, 8-10 Sept. 2008). Persian/Arabic Unicode Text Steganography. Paper presented at the 2008 The Fourth International Conference on Information Assurance and Security.
Stallings, W. (2006). Cryptography and Network Security: Principles and Practice: Pearson/Prentice Hall.
Tawfiq, N. E. J. A. J. o. N. U. (2018). Modified Lsb For Hiding Encrypted Kurdish Text Into Digital Image. 7(4), 254-260.
Thakur, K., Qiu, M., Gai, K., & Ali, M. L. (2015). An investigation on cyber security threats and security models. Paper presented at the 2015 IEEE 2nd international conference on cyber security and cloud computing.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ziyad H. Abid Al Jabbar, Zeravan A. Ali , Hanan A. Taher
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-SA 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work, with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online.