0% found this document useful (0 votes)
37 views12 pages

Updatedpaper

This document discusses an approach to musical cryptography. It proposes encrypting plaintext messages into musical notes or musical scores. Traditional musical cryptography methods used simple character substitution with musical symbols. The proposed approach would use Indian and Western music notes as the basis for encryption. Specifically, it would map the letters of the plaintext to notes in the Indian raga system (Sa, Re, Ga, etc.) or the Western note system (C, D, E, etc.). The goal is to generate different musical cryptograms from plaintext messages. Musical cryptography could provide a creative way to hide messages in music.

Uploaded by

Jérôme Cormier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views12 pages

Updatedpaper

This document discusses an approach to musical cryptography. It proposes encrypting plaintext messages into musical notes or musical scores. Traditional musical cryptography methods used simple character substitution with musical symbols. The proposed approach would use Indian and Western music notes as the basis for encryption. Specifically, it would map the letters of the plaintext to notes in the Indian raga system (Sa, Re, Ga, etc.) or the Western note system (C, D, E, etc.). The goal is to generate different musical cryptograms from plaintext messages. Musical cryptography could provide a creative way to hide messages in music.

Uploaded by

Jérôme Cormier
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/346049815

An Approach to Musical Cryptography

Conference Paper · November 2020

CITATIONS READS
0 1,725

2 authors:

Tannisha Kundu Anurag Sinha


Amity University Amity University Jharkhand
3 PUBLICATIONS 0 CITATIONS 63 PUBLICATIONS 51 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Flame Detection using Computer Vision View project

MACHINE LEARNING View project

All content following this page was uploaded by Anurag Sinha on 21 November 2020.

The user has requested enhancement of the downloaded file.


IWCSET20-CSE-048 ISBN: 978-93-5407-648-0

An Approach to Musical Cryptography


Anurag Sinha Tannisha Kundu
Department of computer science, Scholar, Amity University Jharkhand
Ranchi, Jharkhand(India), 834001
Department of computer science, Assistant Professor, Amity University Jharkhand
Ranchi, Jharkhand(India), 834001
anuragsinha257@gmail.com1
tkundu@rnc.amity.edu2

ABSTRACT- The craft of scrambling messages of data they stow away. The message to be communicated is
utilizing music is named as Musical cryptography and it commonly called as plain instant message. Cryptography is
utilizes predefined set of notes and set of rules for making the specialty of changing the content or information into a
melodic pieces which thus are melodic cryptograms. coded plan or some other encoded structure.
Traditional methodologies applied to melodic
cryptography utilized basic replacement figure which A cryptographic methodology is trailed by two calculation:
produces melodic arrangements. - Music and its encryption Algorithm for encoding the information into
trademark have been utilized in various region of world. progressive coded design and an unscrambling calculation
Music can be utilized as a language of correspondence. which remodels the coded message into its certified
Music notes have been utilized in the field of transcription message. The center objective of cryptography approach is
and cryptography in early days. A part of information is to apply changes to the plain content and with the end goal
covered up inside a melodic note and ships off the that the message not, at this point remain behinds usable to
objective. Melodic images and melodic notes have been an interloper without applying the nullify change.
utilized as the replacement figure. The fundamental
objective of the melodic cryptography is to produce Cryptography known to be is the investigation of techniques
distinctive melodic cryptograms. Any melodic note for sending messages in jugglery structure so just the
comprises of seven fundamental keys. Our ordinary Indian planned beneficiaries can peruse the message. The message
music is made of the seven keys Sa, Re, Ga, Ma, Pa, Dha, we need to send is known as the plaintext and the disguised
Ni. The western music notes depend on the seven keys C, message is known as the code text. Maintaining privacy and
D, E, F, G, A, B. Utilizing these notes as the fundamental covering messages have picked up essentialness directly
notes, music is created. Utilization of music notes in from the earliest starting point of progress. As and when a
encoding any message isn't in wide use. In this paper we picky strategy for encryption becomes well known, the risk
propose a strategy for encryption of any instant message of cryptanalysis increments and consequently new
utilizing the Indian and western music notes. procedure should be imagined or distinguished to give the
expectation.
Keywords— Musical Cryptography,indian ragas,
Contingent upon the key used to encode and unscramble the
music sheet cipher, guitar chords encryption, code calculations are delegated symmetric key and lopsided
genetic algorithm key calculations. Symmetric key calculations utilize the
indistinguishable key for encryption and unscrambling
measure. Awry Key calculation utilizes generally unique
1.INTRODUCTION key for encryption and unscrambling. Symmetric Key is
otherwise called private key cryptography a mystery key is
In this period of innovation, with the utilization of Internet being have similar feeling upon previous exchange of
and its different advances our customary correspondence messages, contingent upon the key the sender side
has been changed into computerized correspondence. In this scrambles the message and beneficiary side decodes the
computerized period, keeping message mystery is a message. In this paper, Musical cryptography ideas convert
fundamental issue to be tended to. To manage with this test the plain instant message into melodic notes or melodic
cryptography is utilized in data security. The messages images. In melodic cryptography music and its credits to
rather data to be sent to target by and large we individuals encode the plain content into its comparing figure text. The
utilize explicit language for the transmission. Their code messages can be emblematic, verbal or instrumental
objective is any individual who doesn't perceive the snippet notes.
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
analytic service [19]. Earliest forms of music cryptography
2. RELATED WORK made use of the straightforward technique of replacing
characters of the plaintext with musical symbols. Edward
Musical notes and the alphabet are together tools for Elgar, a notable composer wrote a letter to Miss Dora Penny
communication. Music uses 12 tones, while the English in encrypted form which is famous as “Dorabella” Cipher
alphabet uses 26 letters. Numerous mappings of music notes [6]. Bach, another musician regularly employed the natural
to the alphabet can alleviate the encryption plaintext into order number alphabet (A=1 to Z=24) in his work.
music cipher text. Musical symbols have been used in
cryptography from the earliest times. As a subject of fact, a Considerable quantity of effort has been done in the pasture
number of cryptologists were also famous musicians. of music cryptography in recent years too. [4] proposed a
Faber, Haydn, Bach, Schumann are examples of composers scheme to encrypt plaintext characters encompasses
who embedded “cipher themes” in their work. For these English letters as well as digits 0-9 by arbitrarily assigning
artists, musical masterpiece with cipher techniques was a every plaintext character to a number between 12 and 23,
mere method to raise the value of their work. While the which in turn represent 36 different music notes.[5]
cryptographic value of their efforts was somewhat limited, described a method that took 12 notes and 6 octaves,
their practice derives from awareness that music and generating 72 music notes which can be used to reinstate
semantics have commonalities. plaintext characters. This process made use of a conversion
table and note transition algorithm in order to denote the
The idea of replacing plaintext characters with musical mapping of plaintext characters to music notes. A method to
notes may engage musical notes in the form of visual encrypt binary strings using concepts of graph theory and
succession (musical symbols/notations), vocal or propagating cipher block chaining (PCBC) mode of
instrumental music. The present paper is mainly concerned encryption was discussed by [23]. Each string of three bits
with plain text characters encrypted as sequence of musical was mapped to a music note. One such 3-bit combinations
notes from an instrument. The challenging part in designing corresponds to a pause/blank in the music clip. In [16], a
a music cryptographic method is to come up with an method that used the concepts of magic-square and Polybius
suitable mapping of plain text characters to musical notes so cipher techniques was explained. A 6X6 magic square was
that the final musical series generated is a valid one. selected and all English letters and 0-9 digits were placed in
Strength of a musical sequence is decided based on how each of its cells. Each column and each row of this magic
pleasing and tuneful it sounds, to a listener. square was labelled with C,D,E,F,G,A. Each plaintext
character was thus replaced by its corresponding row
3. LITERATURE SURVEY column index in the magic square. Space character was
replaced by the music note B. Two more methods to encrypt
While the current studies in the area of combining music binary strings were discussed in [24]. in cooperation these
and cryptography is somewhat limited, more than a few methods considered two binary strings (one of which was
proposals [3,7,6] in musical cryptography have involved the plaintext string to be encrypted) and interleave one of
symmetric key encryption, substitution ciphers, and them into the other at specific locations in order to generate
stenography . a third string. Groups of bits in that final string were
mapped to different music notes. [11] proposed a method of
Dutta et al. [3] proposed a symmetric key algorithm for music cryptography that made use of genesis rules and the
musical cryptography. The algorithm renovates plain text concept of raga in Indian classical music. It was based on
into a musical piece by substituting the text characters with replacing each plaintext character with a swara from a
mathematically generated musical notes. The sequence of specified raga depending on the probability of its occurrence
musical notes generated for a fastidious character in that raga. A method making use of a fuzzy logic was
progression of plain text apes a musical pattern. This explained in [13]. This made use of various constraints like
example is then send to the receiver as a music file. The melodic rules, harmonic rules, rhythm rule, etc in order to
beginning value for encryption and decryption key is sent generate multiple music clips corresponding to a text
using the RSA algorithm, where the key plots the letters message. After that, fuzzy rules were applied and the music
equivalent to a musical note. Their encryption key used is an clip with best possible musical succession was selected and
n x n matrix and it will be generated using the seed value for converted to a MIDI file before sending to the receiver. In
the key. [12], a combination of Play air cipher and Polybius cipher
techniques was used for encryption. Initially plaintext was
History says that many of the cryptologists have been good encrypted using Play air cipher. The encrypted message was
musicians. Also, prominent composers like Schumann, re-encrypted using Polybius cipher. A variation algorithm
Michael Haydn, Elgar and Tartini were known to be was used to produce the key matrix which was used to map
interested in cryptography. In fact, the grounds of music and the text characters to parallel music notes.[14] proposed an
cryptography have positive correlation. The connection was encryption method that generated a cipher key which put up
also known to and used by the British wartime crypto- with the principles of music theory. Dissonance and uneven
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
beats were shun by creating a key that stayed in one key
signature in the context of a single major level.

4. MUSIC THEORY
Scale

The most basic of all scales is a solo octave of the C major


scale. This scale consists of no pointed or smooth, and can
be played by basically pressing every white key on a piano
from one C to the next C an octave above it. In the scale,
there are seven tones which are noted as C, D, E, F, G, A,
and B. The basic structure of any scale is an accretion of
whole steps and half steps. Figure 1 - circle of fifth

Rhythm
5. PROPOSED APPROACH
There are a few significant types of basic rhythms that we
mention in our study. Each character in the simple 5.1 In this section we provide a brief introduction to Indian
replacement cipher will get one full beat of the measure or music notation and keyboard notation.[20]
bar. Beat division is a major way of differentiating notes.
There are innumerable ways to divide a single beat, but Keyboard notation
most of it can be explained through fraction.
Musical notation is the depiction of sound with symbols.
Chords Any music can be characterized using these symbols. The
fundamental notes in music are C, D, E, F, G, A and B. A
A chord is created by playing more than 2 notes pause in music is represented by -. The following
simultaneously. All chords build of a certain tonic will carry illustration signify the musical notation from C to B
the key mark of the tonic, unless otherwise notated with
inadvertent. An accidental is a sharp or level outside of the
key signature used inside the notation of the piece.

Circle of fifths

The circle of fifths is normally read with C major as a


preliminary point. Note G is the central or fifth in the C
major scale, therefore, it is the next major scale comprised
in the circle of fifths. Note D is the dominant in the G major
scale, therefore it comes after G in the circle, and so on. In
the key of C however, D is the second degree. Figure - 2
Indian Musical Notation:
The sample of the circle goes from the first to the fifth to the
ninth to the thirteenth, and so on, pending the circle is The seven music notes in Indian music note are known as
complete. Any scale degree greater than seven can be Sudda Swar Sa Re Ga Ma Pa Da Ni. The similarity of
decreased by seven to attain their scale assignment in a Indian music note to the key board is shown below-
more understandable format, thus creating a circle that goes
from the first to the fifth to the second to the sixth until the
circle is complete.

Figure – 3
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Encryption method amalgamation like MAPA, NIDHA (Note hat these are not
used in the table). So designing the table is solely the
Here we propose a technique of encryption of any message selection of the encoder and decoder. This amplify the
using customary Indian music and keyboard illustration as a probable ways in which the table can be designed spaced
tool of encryption. out from the ( 36! )2 ways shown in the table 1.[20]
Table 1 is the main key for encryption of any message
In the proposed method we relate two levels of encryption.
containing a string of alphabets and numbers.
First we renovate a usual text into traditional Indian music
note using table 1. We then renovate the text into western Table: 2 Conversions to Western Musical Notes
music notes of a piano or a key board. While converting we
use 1 for space between same word and 0 for space between
two different words.

Table 1 provides the conversion of alphabets and numbers


into Indian musical notes. Table 2 provides the conversion
into western music notes.

Designing table 1 and 2 is the choice of the person sending


the message. The alphabets from A – Z and numbers from 0
– 9 can be arranged in 36! Ways. For every alternative of
these 36! ways we can assemble the music notes in 36!
ways. Similarly table 2 can be designed in 7! methods and
for each option of these 7! Ways the music notes can be
arranged in 7! Ways. These two tables will be the key for
encryption and decryption.[20]

Table 1: Conversion to Indian Musical Notes

Encryption Algorithm: by M. Yamuna*1 , Krishna Pandey 2


, Nikhil Choudhary 3 et al.[20]
Let S be the text to be encrypted
 Step 1 change S into Indian music note S1 using
table 1.
 Step 2 change S2 into keyboard music note S2
using table 2.
 Step 3 Send S2 to the receiver
Decryption Algorithm:
 Step 1 From S2 obtain S1 using table 2.
 Step 2 From S1 generate S using table 1.

ILLUSTRATION
The message to be encoded is I LOVE MUSIC
After converting using table 1 we get S1 as
In table 1 we see that the first seven alphabets are allocated Word 1 REMA
the fundamental music notes Sa, Re, Ga, Ma, Pa, Dha, Ni.
The rest alphabets from H – Z and the numbers 0 – 9 are Word 2 PANI NIPA GADHA PA
assigned a conversion which is a grouping of the seven
Word 3 DHASA REPA GASA REMA GA
music notes. This can be designed as per the first choice of
the encoder and decoder. So that string S1 is S1 REMA PANI NIPA GADHA PA
For example the number 9 is assigned a conversion NINI in DHASA REPA GASA REMA GA (seperated by space).
table 1. But as an alternative we could disperse any other
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
S1 is again converted into keyboard notation S2 using table
Start decryption
2 as
S2 DF0GB1BG1EA1G0AC1DG1EC1DF1E
Note that here 0 correspond tos the freedom between words
Stop
and 1 space between letters in the same word to facilitate Step 1 From S2 obtain
encryption. Send DF0GB1BG1EA1G0AC1DG1EC1DF1E
to the receiver.
Suppose the received message is
AC1DG1EC1DF1E0FD1DG1DF1CA1G1F0AC1G
Obtain S1 using
We know that 0 represents the space between words. So we table 2.
recognize that there are three words in the note receive.
They are
Word 1 AC1DG1EC1DF1E Step 2 From S1
Word 2 FD1DG1DF1CA1G1F generate S
Word 3 AC1G
using
In each word 1 represents the space between letters. Using
table 1
table 2 we convert the words as
Word 1 DHASA REPA GASA REMA GA
Word 2 MARE REPA REMA SADHA PA MA
Word 3 DHASA PA
5.2 By Using Music Sheet Cipher
Now using table 1 the words are converted as
Source code
Word 1 MUSIC
dCode retains possession of the online 'Music Sheet Cipher'
Word 2 RUINED tool source code. Except explicit open source licence
Word 3 ME (indicated CC / Creative Commons / free), any algorithm,
applet or snippet (converter, solver, encryption / decryption,
So the decoded message is MUSIC RUINED ME. encoding / decoding, ciphering / deciphering, translator), or
any function (convert, solve, decrypt / encrypt, decipher /
Start cipher, decode / encode, translate) written in any informatic
language (PHP, Java, C#, Python, Javascript, Matlab, etc.).
encryption dCode is a toolkit website for decryption, ciphertexts,
cheating at letter games, solve riddles, treasure hunts, etc.
Step 1-convert s1 from Opened in 2009, the site has grown steadily and improved,
table 1 offering more and more tools and carried by its users, dCode
has become a public site, free and open to all.

Step 2 - change S2 into


keyboard music note S2
using table 2

Send S2 to the
receiver

Receiver
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Figure 4- SYMBOLS FOR THE MUSIC SHEET <c>(A-Z0-90-9)</c> -LO4P
<c>(0-9A-Z0-9)</c> --ASB
How to encrypt using a music sheet? <c>(0-90-9A-Z)</c> Y-0E1
Encryption uses 14 notes and eighth notes, quarter notes, <c>(A-Za-z)</c> yLOeP
half note and whole note, this is 4*14=56 symbols + 3
extras. There are many ways to encode letters with these 59 <c>(A-MN-Za-mn-z)</c> xLNeO
symbo
<c>(a-mn-zA-MN-Z)</c> XlnEo
Example 1 : alphabet is composed of 14 eighth notes then
the first 12 quarter notes : do1 = A, re1 = B, ... si1 = G, do2
<c>(A=♪Ré=♪D)</c> 9-JEK
= H, until sol2 = N then quarter notes do1 = O, etc. until fa2
= Z.
5.3 Music Staff Notation
Example 2 : alphabet is composed of the first 13 eight notes
then the 13 first quarter notes. the reading is based on solfeggio. dCode can covert a staff
into notes by translating the most common 14 notes and
How to decrypt using a music sheet cipher? their variation sharp # and flat b.
The decryption of the Musical Sheet Cipher consists in the
replacement of the 59 symbols (notes) by the characters of a
defined alphabet. Example:DO C RE D MI E
FA F SOL G LA A
 The ciphered message is composed of classical SI B
notes without musical value.
Why a1 and a2?
In order to transcribe the two level of notes, the first level
 The notation used does not necessarily matter, no can be suffixed by 1 and the second by 2.
more than the instruments or actually produced
sound.
Why flat and sharp are not on the partition?

 The sheet can be printed without a key or other dCode has taken the liberty to simplify the writing of dieses
important detail for a musician. and bemols, they are normally on the same level as their
following note.
Encryption
Music notes in alphabetical notation
Plain text - practice makes man perfect
C, D, E, F, G, A, B
ABCDEFGHIJKLM-NOPQRSTUVWXYZ- A# A1 A2 A2b
ABCDEFGHIJKLM-NOPQRSTUVWXYZ----

Figure 6- musical notes of western piano


Music notes in digit notation
1 1.5 2 2.5 3 4 4.5 5 5.5 6 6.5 7 8 8.5 9 9.5 10 11 11.5
12 12.5 13 13.5 14

Figure 5 - Encypted sheet


Decryption
XNOHIVWYX
↑↓ ↑↓
<c>(A-Za-z0-6)</c> 0LOgP
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Figure 7- Music notes in digit notation  A tool to listen the sound and make out which
chord is played is required for this process
Illustration
 . With sound recognizer the receiver generates
following:
i hate you
 C major- by back tracing table will get alphabet A,
similarly
TABLE 4

7. USING GUITAR CHORDS


In this approach, the sound of guitar chords is being used to
encrypt and also the chord finder i.e. the sound recognizer is
used for decrypting.
Algorithm is based on three steps –
1. First step: to allocate a guitar chord to every TABLE 5
letter and symbol for each word in the text
2. Second step: to exchange the assigned chords
into sound or perceptible format from texted
format.
3. Third step: to adapt back the audio file by
sound recognizer from audio to text format.
Using the following table 5 and Figure 8
As there are no E# (sharp) and B# (sharp) hence it is not
used in the algorithm. Now for converting text we can use
the table 5 and procedurally covert into musical files. For
example: Text: ALL IS WELL.
Using table 1 we convert the text as follows:
TABLE 3

After converting this into an audio file, using step two listed
before, we can send this file in mp3 format.

Decrypting Texts
 Receiving the audio file, the receiver can decrypt it
with an accessible key for the conversion.
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
Algorithm to encrypt messages into musical notes
introduces the concept of Musical Cryptography. It is a
:
STARTS ENCRYPTION traditional method being used to symbolize messages in the
form of musical cryptograms. In this paper a new algorithm
is being proposed for Encryption and Decryption rather than
using the traditional methods and algorithms.
First step: to assign a guitar chord
to each letter and symbol for each Encryption:
word in the text Since the Encrypted output would be a musical piece we
need set of notes. In this scheme a set of western notes are
being initialized and assigned to letters of plain text. Initial
Second step: to convert the population is being generated by assigning set of notes. This
assigned chords into sound or gives us the initial population for the genetic algorithm. All
audible format from texted format possible combinations of notes initialized along with
frequency values are are tested find which sequence
produces more natural music. A probability matrix is being
Third step: to convert back the generated based on the standard sequence. This matrix
audio file by sound recognizer would give us in sequence about what would be the
from audio to text format. probability of each note to occur after the previous note.
Along with the probability matrix we necessitate one more
table i.e the frequency table which contains detains about
the the frequency values for each note along with a serial
STOP number assigns to each note as a primary key. Fitness value
for each musical sequence is calculated based on the
probability matrix. One with the highest fitness is selected
as the encrypted output.Genesis rules are applied on it.
START Based on the rules we get the optimized output. This output
DECRYPTION is now in the form of musical notes. It is given to an note
generation algorithm which takes the Musical notes and
their corresponding frequency values as input. A sound
 Receiving the audio file, the receiver can would be played which is the final output.
decrypt it with an available key for the
conversion. Decryption:
 A tool to listen the sound and make out In decryption the sound generated is taken as an input and
which chord is played is required for this
procedure. based on the music the notes and their frequency values are
 With sound recognizer the receiver retrieved from the database. The reverse process is applied
generates following: to obtain the actual message / Plain text.
 C major- by back tracing table will get
alphabet A, similarly
Other techniques for Encryption:

STOP DES: DES is a asymmetric Key ciphering technique. DES is


a block cipher, block size is 64 bits. DES uses either 56 bits
or 128 bits. A single block of plaintext is transformed into
ciphertext after passing through the following stages:
8. By Using Genetic algorithm  An initial Permutation
In the proposed system Genetic algorithm is being  16 rounds of a given function
employed for Encrypting messages into musical notes.
Genetic algorithms are evolutionary algorithms which use  A 32-bit left-right swap
the concept of innate selection and genesis.It is used to
 A final permutation
explain explore problems when the search space is vast and
also used for solving optimization problems. The necessary The DES function is made up of P and S-boxes. P-
proposal behind using genetic algorithm is to generate an boxes transpose bits and S-boxes substitute bits to
optimal musical sequence soothing to ears. Genetic generate a cipher. Since DES uses 56-bit key for
algorithms have been used in field of music since ancient encryption, 256 possible keys can be generated due to
times. But the approach of looking towards it as a technique which brute force attack on such number of keys is
for generating a musical sequence is changed. In this paper impractical.Triple DES was introduced later to replace
the concept of cryptography combined with the Genetic the original DES. It uses 3 individual keys with 56 bits.
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
AES: Advanced Encrytion Standards is a symmetric Key Decryption:
block cipher published by the NIST in December 2001.AES
is a non Fiestal Structure. The key is developed into an array  In order to decrypt the ciphered text (C1, C2) using
of forty-four 32 bit words.Four unlike stages are used,one of the private key x, following two steps are has to be
pernutation and three of substitution.For both encryption taken:
and decryption, the cipher begins with an AddRound stage,  Compute the inverse of (C1)x modulo p, which is
followed by nine rounds that each includes all four stages, (C1)-x called the decryption factor.
followed by tenth round of three stages.Only the AddRound
stage make use of the key.The AddRound stage is, in  Obtain the plaintext by using the following
effect,a form of Vernam Cipher and by itself would not be formula:
formidable.Each stage is easily reversible.The decryption  C2 X (C1)-x mod p= Plaintext
algorithm makes use of the expanded key in reverese order.
Once it is recognized that all four stages are reversible, than 9.ANALYSIS
its easy to verify that decryption can recover the plaintext.
The final round of both encryption and decryption consists Cryptography attempt at changing over a secret message
of only three stages. into a garbled book while, steganography targets concealing
the furtive note inside a cover medium which could be a
RSA: RSA uses public-key for encryption. RSA is an sound/text record. The proposed cycle is worried about
asymmetric algorithm as it makes use of a pair of keys. renovateing a mystery instant message into a hear-able clasp
Public key is used to encrypt the message and private key is which is itself the mystery being sent and subsequently is
used to decrypt it.RSA stands for Rivest, Shamir & fairly connected to both the hypothesis of cryptography and
Adleman intoduced in 1977 and it is best known & widely steganography.
used public-key scheme. RSA makes use of an expression
with exponentials. As clarified before, different mappings are potential for a
given raga. Regardless of whether an assailant with some
 The algorithm for RSA is as follows: data of Carnatic music is fit to recognize the raga from a
music cut, he/she won't have the option to unscramble it
 Select p, q where p and q both prime, p is not equal without knowing the arrangement of swara to plaintext
to q. Calculate n = p * q planning. Accordingly ciphertext-just and man-in-the-center
 Calculate f(n) = (p - 1)(q - 1) assaults can be kept away from.

 Choose e such that 1 < e < f(n) such that e is co-


prime 100 CARNATIC MUSIC

 Calculate d : d= e-1 (mod f(n)) 80


MUSIC SHEET
 Public key PU = {e, n} 60 CIPHER
40 STAFF NOTATION
 Private key PR = {d, n}
20 GUITAR CHORDS
 Encryption:
0
 Plaintext: M 1st Qtr 2nd 3rd 4th genetic algorithm
Qtr Qtr Qtr 94
 Ciphertext: C = M e mod n
 Decryption:
FIGURE 8- COMPARISION OF ALL ALGORITHMS
 Plaintext: M = Cd mod n.
ElGamal Algorithm: ElGamal cryptosystem is also called
the Elliptic Curve Variant, is based on the Discrete 10. FUTURE SCOPE
Logarithm Problem. It is based on two factors one is
choosing the large prime number p and next is choosing the  I will also be applying Braille alphabetic
generator element g. conversion to generate a new algorithm for
musical cryptography.
Encryption:  Further I will also be analyzing
C1= gk mod p BETHOVEN”S TABLE and try extracting
some fuzzy logic approach for cryptography.
C2= p*yk mod p
 Musical symbols and musical notes have
Send the ciphertext C, consisting of the two separate values been used as the substitution cipher. The
(C1, C2), sent together. main goal of the musical cryptography is to
IWCSET20-CSE-048 ISBN: 978-93-5407-648-0
generate different musical cryptograms. I 12. REFERENCES
will also be analyzing some genetic
algorithm for the same.
[1]. Sandip Dutta, Soubhik Chakraborty, N. C. Mahanti.
 I will also be using some more ragas to "Novel Method of Hiding Message Using Musical Notes",
implement through musical 2010
cryptograms.
[2] Chandan Kumar, Sandip Dutta, Soubhik
Chakborty."ASymmetric Key Algorithm for Cryptography
11. CONCLUSION using Music",2013.
From the proposed method it might be construed that we [3] Mohammed AbuTaha, MousaFarajallah,
can adequately use the melodic notes for encoding the RadwanTahboub and Mohammad Odeh, “Survey Paper:
messages. This technique of using notes makes it more Cryptography Is The Science Of Informatio Security,”
difficult to perceive that there is some message concealed in International Journal of Computer Science and Security
it. Also, if it is recognized that there is a hidden message, (IJCSS), Volume (5): Issue (3): 2011.
the possibility of disentangling is less. As the third
[4] Marandi, Y.M.H., Sajedi, H. & Pirasteh, S. A novel
individual don't have key he/she can't disentangle it.. So
method to musicalize shape and visualize music and a novel
using melodic language it is possible to encode the message.
technique in music cryptography. Multimed Tools Appl
The stage and mixes expected to unscramble the message
(2020). https://doi.org/10.1007/s11042-020-09962-8
makes it nearly unfathomable gave the gatecrasher doesn't
have the key. [5] Weiß C, Müller M (2015) Tonal complexity features for
style classification of classical music. 2015 IEEE
We have used two stages of encryption one using traditional International Conference on Acoustics, Speech and Signal
Indian music note and succeeding using our standard Processing (ICASSP). IEEE
keyboard notes. It is complicated for whichever hacker to
[6] Tucker GM, Jones AV, Latham A (2011) The Oxford
shatter the code except the conversion order into alphabets
companion to music. Oxford University Press, Oxford
is known.
[7] Rodrıguez-González S, Pérez-Lancho B (2018)
Also the 36 alpha numeric characters can be placed in a Modeling a Synaesthete System to Generate a Tonal
minimum of (36!)2 Ways and the 7 music notes in table can Melody from a Color Distribution. International Joint
be arranged in ( 7! ) 2 ways so that we can produce a table Conference SOCO’18-CISIS’18-ICEUTE’18: San
of our preference. This increases the security of the Sebastián, Spain, June 6–8, 2018 Proceedings. Vol. 771.
encrypted message and this collected works acts as a key for Springer
encryption and decryption. So the proposed encryption
[8] Lamaute N, et al (2016) A substitution cipher for
format is safe for encoding any message.
musical cryptography. In: Proceedings of Student-Faculty
Research Day, CSIS, Pace University
We were triumphant in creating a cipher table that produces
consonant sounds, but the cipher itself does not have [9] Piano Keyboard Guide, Piano Keyboard. 2016. (No
strapping security. Substitution ciphers are hardly ever used subject)
today because they are easy to split. This key distribution in
this scenario presents a problem that has to be addressed [10] Desmedt Y., Hou S., Quisquater J.J. (1998) Audio and
through supplementary research. Optical Cryptography. In: Ohta K., Pei D. (eds) Advances in
Cryptology — ASIACRYPT’98. ASIACRYPT 1998.
Lecture Notes in Computer Science, vol 1514. Springer,
9. ACKNOWLEDGEMENT Berlin, Heidelberg. https://doi.org/10.1007/3-540-49649-
1_31
I IWOULD
WOULDLIKE
LIKETO
TO THANKS
THANKS MY
MY FACULTY
FACULTY OFOF MY
MY
UNIVERSITY“AMITY
UNIVERSITY “AMITY UNIVERSITY
UNIVERSITY JHARKHAND”
JHARKHAND” [11] M. Maity, “A Modified Version of Polybius Cipher
PROF.TANNISHA KUNDU
PROF.TANNISHA KUNDU AND
ANDDR.POOJA JHA
PROF. DR.POOJA Using Magic Square and Western Music Notes,International
JHA FOR GUIDING AND ALSO FOR LETTING ME Journal for Technological Research in Engineering, vol. 1
KNOW ABOUT THIS CONFERENCE.AND ALSO I no.10, (2014)
WOULD LIKE TO THANKS WHOLE CSE TEAM OF [12] Moumita Maity. “A MODIFIED VERSION OF POLYBIUS
RIT FOR HELPING IN REGISTRATION. CIPHER USING MAGIC SQUARE AND WESTERN MUSIC
NOTES” International Journal For Technological Research In
Engineering Volume 1, Issue 10, June-2014
[13] W. Stallings, Cryptography and Network Security
Principles and Practices, Prentice Hall, 2011
View publication stats

IWCSET20-CSE-048 ISBN: 978-93-5407-648-0


[14] N. J. Thorwirth, P. Horvatic, R. Weis and Jian Zhao,
"Security methods for MP3 music delivery," Conference
Record of the Thirty-Fourth Asilomar Conference on
Signals, Systems and Computers (Cat. No.00CH37154),
Pacific Grove, CA, USA, 2000, pp. 1831-1835 vol.2, doi:
10.1109/ACSSC.2000.911304.
[15] Alimomeni, M., Safavi-Naini, R.: Human assisted
randomness generation using video games. IACR Cryptol.
ePrint Archive 2014, 45 (2014)
[16] Tsai, J.M., Chen, I.T., Tzeng, J.: Random number
generated from white noise of webcam. In: Fifth
International Conference on Intelligent Information Hiding
and Multimedia Signal Processing. IIH-MSP’09, pp. 214–
217. IEEE (2009)
[17] . Lacy, J. H. Snyder and D. P. Maher, "Music on the
Internet and the intellectual property protection problem,"
ISIE '97 Proceeding of the IEEE International Symposium
on Industrial Electronics, Guimaraes, Portugal, 1997, pp.
SS77-SS83 vol.1, doi: 10.1109/ISIE.1997.651739.
[18] P. Z. Onufryk and J. H. Snyder, "Consumer Devices for
Networked Audio", Proceedings of the 1997 IEEE
International Symposium on Industrial Electronics.
[19] IS 13818-7 (MPEG-2 Advanced Audio Coding, AAC),
M. Bosi, K. Brandenburg, S. Quackenbush, M. Dietz, J.
Johnston, J. Herre, H. Fuchs, Y. Oikawa, K. Akagiri, M.
Coleman, M. Iwadare, C. Lueck, U. Gbur, B. Teichmann.
[20] M. Yamuna , Krishna Pandey , Nikhil Choudhary
“CRYPTOGRAPHY USING MUSIC NOTES” Volume 4, No. 4,
April 2013 Journal of Global Research in Computer Science
[21] C. Kumar, S. Dutta and S. Chakborty, "Musical
cryptography using genetic algorithm," 2014 International
Conference on Circuits, Power and Computing
Technologies [ICCPCT-2014], Nagercoil, 2014, pp. 1742-
1747, doi: 10.1109/ICCPCT.2014.7054851.
[22] Norissa Lamaute, Alexa Piccoli, Li-Chiou Chen, and
Andreea Cotoranu “A Substitution Cipher for Musical
Cryptography” Proceedings of Student-Faculty Research
Day, CSIS, Pace University, May 6th, 2016
[23] J. McCormac, "European Scrambling Systems Circuits
Tactics and Techniques" in The Black Book, Waterford
University Press, vol. 4, 1994.
[24] Wikipedia contributors. (2020, July 22). Musical
cryptogram. In Wikipedia, The Free Encyclopedia.
Retrieved 02:49, November 21, 2020, from
https://en.wikipedia.org/w/index.php?title=Musical_cryptog
ram&oldid=968933237

You might also like