Permutation of National Identification Number for a Better Security in Communication Channel


Authors : Umar, M; Hassan, A; Abdullahi, I; Muhammad Shehu, Z

Volume/Issue : Volume 9 - 2024, Issue 5 - May

Google Scholar : https://tinyurl.com/54tpzf9s

Scribd : https://tinyurl.com/u3c7xn4t

DOI : https://doi.org/10.38124/ijisrt/IJISRT24MAY1655

Abstract : This study proposes a new method to enhance the security of transmitting national identification number via various communication channels like SMS, email, and Box office. It introduces a permutation technique utilizing the Gamma 1 Non-Deranged Permutation group, ensuring the confidentiality of the information. By employing 11 factorial (11!) permutations, the national identification number is transformed into a mixed format for unintended recipients, yet remains easily decrypted by the intended recipient. This approach mitigates concerns regarding data interception and unauthorized access, providing a robust solution for secure information transmission across diverse media channels.

Keywords : NIN, Permutation, Cryptography, Factorial, Non Deranged Permutation.

References :

  1. Pooja S and Pintu S. (2017), Enhancing security of Ceaser cipher using “Divide and Conquer Approach”. International Journal of Advance Research in Science and Engineering. 06(02):144-150.
  2. Fahrul I, K., Hassan F, S., Toras P and Rahmat W. (2017), Combination of Ceaser Cipher Modification with Transposition Cipher. Advances in Science Technology and Engineering Systems Journal .2(5): 22-25.
  3. Rajput Y., Naik D. and Mane C. (2014), An improved cryptographic technique to encrypt text message using double encryption. International Journal of Computer Applications 86(6):24-28.
  4. Shahid B. D. (2014), Enhancing the security of Ceaser cipher using double substitution method. International Journal of Computer Science and Engineering Technology.5:772-774.
  5. Kashish G and Supriya K.(2013) Modified Ceaser Cipher for a Better Security Enhancement. International Journal of Computer Application.73:26-31
  6. Mishra A. (2013), Enhancing security of Ceaser cipher using different methods. International Journal of Research in Engineering and Technology. 2(09):327-332.
  7. Garba A. I and Ibrahim A. A. (2010), A new method of constructing a Variety of Finite Group Based on some succession scheme. Internal Journal of Physical Science. 2(3):23-26.
  8. Vukašin, G and Sandra, O (2024) Group Processes & Intergroup Relations Active rejection or passive indifference? Mixed-methods evidence on national (dis) identification, Group Processes & Intergroup Relations.1–22  DOI:  0.1177/136 84302241229981
  9. Rajendra K. B, Uzma B, Nupura V, Vidya K, Pramod R. C and Sushma G (2018)  Proposing national identification number on dental prostheses as universal personal identification code – A revolution in forensic odontology,  Journal of Forensic Dental Sciences . Vol 7 / Issue 2 pp:84-89
  10. Osita, E (2023) Understanding the Mandatory use Of National Identification Number in Nigeria.  https://www.Researchgate.net/publication/375963871
  11. Maya B-W., Ella D., Einat, E. Noga, S and Peter  F. T (2024)  Values and National Identification in Minority and Majority Youth: Longitudinal Multi-Study Findings. Journal of Youth and Adolescence https://doi.org/10.1007/s10964-024-01965-0 pp:1-18
  12. Audu M.S. (1986), Generating Sets for Transitive Permutation groups of prime-power order. The Journal of Mathematical Association of Nigeria Abacus, 17(2), 22-26.
  13. Ibrahim A. A. (2006), Correspondence between the Length of some Class of Permutation patterns and Primitive Elements of Automophism Group modulo n, Abacus. The Journal of mathematical Association of Nigeria, 33:143-154.
  14. Alhassan, M. J; Hassan, A; Sani, S. and Alhassan, Y. (2021). A Combined Technique of an Affine Cipher and Transposition Cipher Quest Journals Journal of Research in Applied Mathematics Volume 7. Issue 10 (2021) pp: 08-12
  15. Hassan, A; Alhassan, M. J; Alhassan, Y. and Sani, S. (2021). Cryptography as a Solution for a Better Security International Journal of Advances in Engineering and Management (IJAEM :3(12). pp: 849-853
  16. Azzam A and Sumarsono (2017), A Modifying of Hill Cipher Algorithm with 3 Substitution Ceaser Cipher. Proceedings International Conference of Science and Engineering, Indonesia.1: 157-163.
  17. Garba A. I, Yusuf A and Hassan A. (2018), Some Topological Properties of a Constructed Algebraic Structure. Journal of the Nigerian Association of Mathematical Physics, 45:21-26.
  18. Garba A. I, Zakari, Y. and Hassan, A. (2019), on the fuzzy nature of constructed algebraic structure Gp. Bayero Journal of Pure and applied sciences, 12(1):146-150
  19. A. Hassan, A. Garko, S. Sani, U. Abdullahi and S. Sahalu (2023)  Combined Techniques of Hill Cipher and Transposition Cipher. Journal of Mathematics Letters, 2023, 1, 822 www.scipublications.org/journal/index.php/jml DOI: 10.31586/jml.2023.822
  20. Rejewski, Marian (1980). "An application of the theory of permutations in breaking the Enigma cipher". Applicationes Mathematicae. 16 (4): 543–559. doi:10.4064/am-16-4-543-559. ISSN 1233-7234.
  21. https://www.cbn.gov.ng/out/2017/ccd/circular% 20and%20exposure% 20draft% 20on% 20the% 20framework% 20for%20bvn% 20operations%20and%20watchlist.pdf

This study proposes a new method to enhance the security of transmitting national identification number via various communication channels like SMS, email, and Box office. It introduces a permutation technique utilizing the Gamma 1 Non-Deranged Permutation group, ensuring the confidentiality of the information. By employing 11 factorial (11!) permutations, the national identification number is transformed into a mixed format for unintended recipients, yet remains easily decrypted by the intended recipient. This approach mitigates concerns regarding data interception and unauthorized access, providing a robust solution for secure information transmission across diverse media channels.

Keywords : NIN, Permutation, Cryptography, Factorial, Non Deranged Permutation.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe