The International Arab Journal of Information Technology (IAJIT)


Dictionary Based Arabic Text Compression and Encryption Utilizing Two-Dimensional Random

This paper developed Arabic text encryption and compression based on dictionary indexing algorithm. The proposed algorithm includes encoding the Arabic text utilizing Arabic words dictionary, mapping encoded binary stream to a two- dimensional binary matrix, utilizing randomized variable size encryption key, applying randomly binary shuffling functions on the two-dimensional matrix, and mapping back the two-dimensional binary matrix into a sequential binary stream. The decryption algorithm at the receiver side implements the encryption steps reversely, utilizing the encryption key and the shared Arabic word dictionary. In this dictionary, the words of the formal Arabic language are classified into four categories according to the word length and sorted alphabetically. Each dictionary category is given an index size that is large enough to fit all words in that category. The proposed algorithm shuffles adjacent bits away from each other in random fashion through utilizing randomized variable length encryption key, two-dimensional shuffling functions, and repetition loop. Moreover, the index size is selected not to be multiple bytes to destroy any statistical feature that may be utilized to break the algorithm. The proposed algorithm analysis concluded that it could be broken after 3.215∗109 years. Moreover, the proposed algorithm achieved a less than 30% compression ratio.

[1] Abduljabbar R., Hamid O., and Alhyani N., “Features of Genetic Algorithm for Plain Text Encryption,” International Journal of Electrical and Computer Engineering, vol. 11, no. 1, pp. 434-441, 2021.

[2] Abduljabbar R., “Fast Approach for Arabic Text Encryption Using Genetic Algorithm,” European Journal of Scientific Research, vol. 144, no. 4, pp. 342-348, 2017.

[3] Al-Bsharat A., “Developing a Word-Based Encryption Algorithm,” Master Thesis, Yarmouk University, 2016.

[4] Al-Hazaimeh O., Al-Jamal M., Bawaneh M., Alhindawi N., and Hamdoni B., “A New Image Encryption Scheme Using Dual Chaotic Map Synchronization,” The International Arab Journal of Information Technology, vol. 18, no. 1, pp. 95- 102, 2021.

[5] Al-Jarrah A., Al-bsharat A., and Al-Jarrah M., “Word-based Encryption Algorithm Using Dictionary Indexing with Variable Encryption Key Length,” International Journal of Electrical and Computer Engineering, vol. 12, no. 1, pp. 669-683, 2022.

[6] Al-Omari A., “ABJAD Arabic-Based Encryption,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 10, pp. 164-170, 2018.

[7] Alla K. and Ramachandran V., “A Novel Encryption Using Genetic Algorithms and Quantum Computing with Roulette Wheel Algorithm for Secret Key Generation,” in Proceeding of the Analysis and Applications, Singapore, pp. 263-271, 2020.

[8] Alqahtani Y., Kuppuswamy P., and Shah S., “New Approach of Arabic Encryption/Decryption Technique Using Vigenere Chiper on Mod 39,” International Journal of Advanced Research in IT and Engineering, vol. 2, no. 12, pp. 1-9, 2013.

[9] Alsuhibany S., “Developing a Visual Cryptography Tool for Arabic Text,” IEEE Access, vol. 7, pp. 76573-76579, 2019.

[10] Attia M., “Arabic Wordlist for Spellchecking.”, Last Visited, 2019.

[11] Aysan M. and Kuppuswamy p., “Hybrid Combination of Message Encryption Techniques on Arabic Text Using New Symmetric Key and Simple Logarithm Function,” International Journal of Scientific Knowledge Computing and Information Technology, vol. 5, pp. 37-41, 2014.

[12] Fatoum A., “Wordlists for Arabic,”, Last Vistited, 2022.

[13] Freeman W. and Miller E., “An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems,” in Proceeding of the 7th International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems, College Park, pp. 348-357, 1999.

[14] Green W., “Integrity in Information Systems,” Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in Information Systems, pp. 295, 2013.

[15] Habeeb R., “Arabic Text Cryptanalysis Using Genetic Algorithm,” Iraqi Journal for Electrical and Electronic Engineering, vol. 12, no. 2, pp. 161-166, 2016.

[16] Hwang S., “Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures,” in Proceeding of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Netherlands, pp. 905-909, 2014.

[17] Karima A., Zakaria E., Yamina T., Mohammed S., Selvam P., and Venkatakrishnan V., “Arabic Text Categorization: a Comparative Study of Different 872 The International Arab Journal of Information Technology, Vol. 19, No. 6, November 2022 Representation Modes,” Journal of Theoretical and Applied Information Technology, vol. 38, no. 1, pp. 1-5, 2012.

[18] Kataria S., Kumar T., Singh K., and Nehra S., “ECR (Encryption with Cover Text and Reordering) Based Text Steganography,” in Proceeding of the IEEE 2nd International Conference on Image Information Processing, pp. 612-616, 2013.

[19] Khare R. and Raghuwanshi K., “A Review of Video Steganography Methods,” International Journal of Research in Advent Technology, vol. 2, no. 1, 2014.

[20] Kuppuswamy P. and Alqahtani Y., “New Innovation of Arabic Language Encryption Technique Using New Symmetric Key Algorithm,” International Journal of Advances in Engineering and Technology, vol. 7, no. 1, pp. 30, 2014.

[21] Mahmoud A. and Zrigui M., “Semantic Similarity Analysis for Corpus Development and Paraphrase Detection in Arabic,” The International Arab Journal of Information Technology, vol. 18, no. 1, pp. 1-7, 2021.

[22] Marton Y., Wu N., and Hellerstein L., “On Compression-based Text Classification,” in Proceeding of the European Conference on Information Retrieval, Santiago de Compostela, pp. 300-314, 2005.

[23] Microsoft, “Microsoft Visual Studio,”, Last Visited, 2020.

[24] Pal D., Raghavendra P., and Babu A., “An Intelligent Method of Secure Text Data Transmission Through Internet and Its Comparison Using Complexity of Various Indian Languages in Relation to Data Security,” Global Journal of Computer Science and Technology, vol. 13, no. 4, 2013.

[25] Rihan S. and Osma S., “Arabic Cryptography Technique Using Neural Network and Genetic Algorithm,” International Research Journal of Computer Science, vol. 3, pp. 35-42, 2016.

[26] Roy S., “The Extensive Bit-level Encryption System (EBES),” International Journal of Information Technology and Computer Science, vol. 5, no. 5, pp. 67-73, 2013.

[27] Shaban S., “A New Algorithm for Encrypting Arabic Text Using the Mathematical Equation,” Diyala Journal of Engineering sciences, vol. 10, no. 1, pp. 21-30, 2017.

[28] Shareef R., Al-Shakarchy D., Abd H., Al-Nasrawi A., Al-Shahad F., and Aleqabie J., “New Cryptographic System of Romanized Arabic Text Based on Modified Playfiar,” Journal of Engineering and Applied Sciences, vol. 14, no. 4, pp. 1331-1338, 2019.

[29] Suthanthiramani P., Muthurajkumar S., Sannasi G., and Arputharaj K., “Secured Data Storage and Retrieval Using Elliptic Curve Cryptography in Cloud,” The International Arab Journal of Information Technology, vol. 18, no. 1, pp. 56-66, 2021.

[30] Thahab A., “A Novel Secure Video Steganography Technique Using Temporal Lifted Wavelet Transform and Human Vision Properties,” The International Arab Journal of Information Technology, vol. 17, no. 2, pp. 147- 153, 2020.

[31] Wang S. and Liu G., “File Encryption and Decryption System Based on RSA Algorithm,” in Proceeding of the International Conference on, Chengdu, pp. 797-800, 2011.

[32] Waters B., “Functional Encryption: Origins and Recent Developments,” in Proceeding of the International Workshop on Public Key Cryptography, Japan, pp. 51-54, 2013. Ahmad Al-Jarrah is an assistant professor at the Computer Science Department, Al-Balqa Applied University, Jordan. Dr. Al-Jarrah holds Ph.D in Computer Science from Computer Science Department, New Mexico State University, USA (2016). In addition, he received his B.Sc in Computer Science at Irbid National University, Jordan, and Master degree from the Computer Science department at Yarmouk University, Jordan. His research interest spans the general areas of online learning, social media, collaborative learning, and software engineering. Mohammad Al-Jarrah is a professor of Computer Engineering at Yarmouk University. He earned his Ph.D. in 2000 from University of Ohio, USA., MS and BS in Computer Engineering from Jordan University of Science and Technology, Jordan in 1992, and 1990. Since 2000, he has been working with the Department of Computer Engineering at Yarmouk University.His research interests include image indexing and retrieval, multimedia systems, distributed systems, medical imaging, Network management and security, Data Encryption, and many others. Amer Albsharat is a cyber security and cryptography expert. As a CEO of Smart Business Systems, he specializes in enterprise cyber security consulting and risk management services. With a solid experience in business continuity, disaster recovery, and information security management systems, Amer has a major focus on research and development in cryptography, artificial intelligence, and embedded systems.