IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 8 - Issue 12, December 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Securing Twitter Data Using Srb21 Phase I Methodology

[Full Text]

 

AUTHOR(S)

C Bagath Basha, S Rajaprakash

 

KEYWORDS

Encryption, Polarity, Salsa, Security, SRB21, Twitter, Tweets

 

ABSTRACT

Today’s world has witnessed the buildup of information through social media like Twitter and Facebook, that are growing hugely day by day. Victimization these social media, users tweet or post on several topics from anywhere within the world through the net. Tweets area unit accustomed analyze positive and negative messages to drive polarity scores and additionally to predict future trends. These polarity scores might be extracted from Twitter, albeit polarity score knowledge area unit placed underneath security. The information will be simply hacked, and dynamical the score results will cause immeasurable problems, like touching the worldwide economic standing, company brands, and therefore the reputations of companies. To tackle these problems, Daniel Bernstein planned to the implementation of Salsa, that has quicker encryption because of the district round with better data security. In the current work, a novel methodology is proposed by modifying the Salsa20/4 to further enhance the security of the polarity scores, which is an important requirement of the current world. The proposed methodology has two stages. The first stage has secret key. The second stage is prime number secret key in N-1 steps which are interchange the secret key value and prime number value. The proposed methodology has good security while to comparing to Salsa20/4 methodology.

 

REFERENCES

[1] Z. Shao and L. Ding, “Related-Cipher Attack on Salsa20,” Proc. Fourth Inter. Conf. on Computational and Information Sciences, pp.1182 1185, 2012.
[2] M. Almazrooie, A. Samsudin, and M. M. Singh, “Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map,” J. of Information Processing Systems, vol. 11, no. 4, pp. 310-324, 2015.
[3] P. Yadav, I. Gupta, and S. K. Murthy, “Study and Analysis of eSTREAM Cipher Salsa And ChaCha,” Proc. Second IEEE Inter. Conf. on Engineering and Technology, 2016.
[4] L. Ding, “Improved Related-Cipher Attack on Salsa20 Stream Cipher,” IEEE Access, vol. 7, pp. 30197-30202, 2019.
[5] S. Dey and S. Sarkar, “Improved analysis for reduced round Salsa and Chacha,” Discrete Applied Mathematics, vol. 227, pp. 58-69, 2017.
[6] K. K. C. Deepthi and K. Singh, “Cryptanalysis of Salsa and ChaCha: Revisited,” Proc. ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 324 338, 2018.
[7] S. Maitra, “Chosen IV cryptanalysis on reduced round ChaCha and Salsa,” Discrete Applied Mathematics, vol. 208, pp. 88-97, 2016.
[8] A. R. Choudhuri and S. Maitra, “Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha,” IACR Transactions on Symmetric Cryptology, vol. 2016, no. 2, pp. 261-287, 2016.
[9] D. Afdhila, S. M. Nasution, and F. Azmi, “Implementation of Stream Cipher Salsa20 Algorithm to Secure Voice on Push to Talk Application,” Proc. IEEE A. Paci. Conf. on Wireless and Mobile, pp. 137 141, 2016.
[10] R. R. Parmar, S. Roy, D. Bhattacharyya, S. K. Bandyopadhyay, and T. Kim, “Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions,” IEEE Access, vol. 5, pp. 7156-7163, 2017.
[11] D. J. Bernstein, “The Salsa20 family of stream ciphers,” New Stream Cipher Designs: The eSTREAM Finalists, Lecture Notes in Computer Science, M. Robshaw and O. Billet, eds., Berlin: Springer, 2008.
[12] C. Bagath Basha and K. Somasundaram, “A Comparative Study of Twitter Sentiment Analysis Using Machine Learning Algorithms in Big Data,” Inter. J. of Recent Technology and Engineering, vol. 8, pp. 591-599, 2019.