Authors :
Umar, M; Hassan, A; Abdullahi, I; Muhammad Shehu, Z
Volume/Issue :
Volume 9 - 2024, Issue 5 - May
Google Scholar :
https://tinyurl.com/54tpzf9s
Scribd :
https://tinyurl.com/u3c7xn4t
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24MAY1655
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
This study proposes a new method to enhance
the security of transmitting national identification
number via various communication channels like SMS,
email, and Box office. It introduces a permutation
technique utilizing the Gamma 1 Non-Deranged
Permutation group, ensuring the confidentiality of the
information. By employing 11 factorial (11!)
permutations, the national identification number is
transformed into a mixed format for unintended
recipients, yet remains easily decrypted by the intended
recipient. This approach mitigates concerns regarding
data interception and unauthorized access, providing a
robust solution for secure information transmission
across diverse media channels.
Keywords :
NIN, Permutation, Cryptography, Factorial, Non Deranged Permutation.
References :
- Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using “Divide and Conquer Approach”. International Journal of Advance Research in Science and Engineering. 06(02):144-150.
- Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal .2(5): 22-25.
- Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt text message using double encryption. International Journal of Computer Applications 86(6):24-28.
- Shahid B. D. (2014), Enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
- Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
- Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology. 2(09):327-332.
- Garba A. I and Ibrahim A. A. (2010), A new method of constructing a Variety of Finite Group Based on some succession scheme. Internal Journal of Physical Science. 2(3):23-26.
- Vukašin, G and Sandra, O (2024) Group Processes & Intergroup Relations Active rejection or passive indifference? Mixed-methods evidence on national (dis) identification, Group Processes & Intergroup Relations.1–22 DOI: 0.1177/136 84302241229981
- Rajendra K. B, Uzma B, Nupura V, Vidya K, Pramod R. C and Sushma G (2018) Proposing national identification number on dental prostheses as universal personal identification code – A revolution in forensic odontology, Journal of Forensic Dental Sciences . Vol 7 / Issue 2 pp:84-89
- Osita, E (2023) Understanding the Mandatory use Of National Identification Number in Nigeria. https://www.Researchgate.net/publication/375963871
- Maya B-W., Ella D., Einat, E. Noga, S and Peter F. T (2024) Values and National Identification in Minority and Majority Youth: Longitudinal Multi-Study Findings. Journal of Youth and Adolescence https://doi.org/10.1007/s10964-024-01965-0 pp:1-18
- Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
- Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
- Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y. (2021). A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
- Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
- Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
- Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26.
- Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure Gp. Bayero Journal of Pure and applied sciences, 12(1):146-150
- A. Hassan, A. Garko, S. Sani, U. Abdullahi and S. Sahalu (2023) Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters, 2023, 1, 822 www.scipublications.org/journal/index.php/jml DOI: 10.31586/jml.2023.822
- Rejewski, Marian (1980). "An application of the theory of permutations in breaking the Enigma cipher". Applicationes Mathematicae. 16 (4): 543–559. doi:10.4064/am-16-4-543-559. ISSN 1233-7234.
- https://www.cbn.gov.ng/out/2017/ccd/circular% 20and%20exposure% 20draft% 20on% 20the% 20framework% 20for%20bvn% 20operations%20and%20watchlist.pdf
This study proposes a new method to enhance
the security of transmitting national identification
number via various communication channels like SMS,
email, and Box office. It introduces a permutation
technique utilizing the Gamma 1 Non-Deranged
Permutation group, ensuring the confidentiality of the
information. By employing 11 factorial (11!)
permutations, the national identification number is
transformed into a mixed format for unintended
recipients, yet remains easily decrypted by the intended
recipient. This approach mitigates concerns regarding
data interception and unauthorized access, providing a
robust solution for secure information transmission
across diverse media channels.
Keywords :
NIN, Permutation, Cryptography, Factorial, Non Deranged Permutation.