9The Socio-Behavioral Cipher Technique

Harshit Bhatia1*, Rahul Johari2 and Kalpana Gupta3*

1 Reval India Private Limited, Gurugram, India

2 USICT, GGSIPU, Delhi, India

3 C-DAC, Sector-62, Noida, India

Abstract

The primitive and the traditional symmetric key cryptographic systems made use of a limited number of input keys with single encryption function for securing the data before the data can be transmitted over unsecure network. Such limited key cryptographic functions did not withstand the test of time and have become obsolete over time. With the advent of social networking era, the network traffic has also increased rapidly and this increase in unsupervised and unsecure traffic demands a strong and a secure symmetric key technique. This chapter presents a secure and an efficient symmetric key technique that harnesses the readily available social profiling information of the sender for encryption and decryption of the data blending the social behavior of the sender along with the cryptography.

Keywords: Cryptography, symmetric-key, encryption, social, behavioral, profiling

9.1 Introduction

With the increase in human footprint on the internet, there has been a rapid increase in the network traffic too. Much of the data that flows through the internet via the network highway enters and leaves from social network as the social networking has seen an exponential growth over the past years. This expansive data circulates across various nodes through the interconnected web ...

Get Design and Analysis of Security Protocol for Communication now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.