Original Article INSERTION METHOD USING MUSIC NOTES M. YAMUNA, A. SANKAR, SIDDARTH RAVICHANDRAN, V. HARISH VIT University, Vellore, Tamilnadu, India, 632 01, Email: myamuna@vit.ac.in Received: 14 May 2014, Revised and Accepted: 17 June 2014 ABSTRACT Communication signals are openly available as they are propagated. Secured transmission is always a question and various methods are devised. Use of music notes is not in wide use in encryption of data. Any musical note consists of seven basic keys. In this paper we propose an insertion method with the seven music keys are used as a tool of encryption. Keywords: Music Note, Binary string, Encryption, Decryption. INTRODUCTION The word cryptography refers to the science and art of transforming messages to make them secure and immune to attacks. It is basically based on the concept of abstract algebra. Network security is mostly achieved through the use of cryptography. More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. PRELIMINARY NOTE In this section we provide the details of music notes required for encryption of a binary string using the proposed encryption scheme. Music Notation Musical notation is the representation of sound with symbols. Any music can be represented using these symbols. The basic notes in music are C, D, E, F, G, A and B. A pause in music is represented by -. The following diagram represents the musical notation from C to B [ 3 ]. Sheet music comprises of the following components: Staff: All musical notation symbols are placed on the staff. The staff is an arrangement of five parallel lines and the spaces between them. Each line and each space represents a musical note. Clef: The clef is a symbol which represents the pitch or range of the instrument in which the music must be played in. The music to be played in higher range is assigned the Treble symbol. The music to be played in lower range is assigned bass symbol. Symbol and notation in Treble clef The Treble, or G clef, is derived from an ornamental Latin letter G. The five lines, from the bottom up, represent the following notes: E G B D F. The four spaces, from the bottom up, represent these notes: F A C E. Symbol and notation in Bass Clef PROPOSED ENCRYPTION SCHEME In encrypting any binary string the regular insertion method [ 2 ] is so familiar that anyone who wants to decode a binary string will attempt using insertion method. So any technique that is similar to insertion method, but not the regular insertion one gives rooms for a wrong decryption of the message by any hacker and hence safe for encryption. In this paper we propose two insertion methods using musical notes. To convert the sheet music to binary digital form, consisting of only 0s and 1s, we use the following substitution. Table 1 – Binary Conversion Table Music note Binary String - 000 C 001 D 010 E 011 F 100 G 101 A 110 B 111 Method 1 ( Binary as Fake Music Note using insertion method ) Vol 2, Issue 3 , 2014 ISSN: 2347-1573