SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-2, Issue-2, February 2014
206 www.erpublication.org

Abstract— This paper aims to present the implementation
of One-Time Pad (OTP) which is a type of encryption that is
impossible to crack if used properly and correctly. In this paper
we are proposing one-time pad implementation over web using
cookie encryption and cookie decryption. The basic encryption
method of one-time pad is used, where characterfrom
the plaintext is XOR with the character from a secret
random key (or pad) of the same length as the plaintext,
resulting in a cipher text. If the key is truly random then the
cipher text would be impossible to decrypt or break without
knowing the key. In our proposed method an index string is
generated with is stored in remote servers. This information is
used to generate cookie which can be used for secure
communication over web using One-Time pad.
Index Terms— One-Time Pad, Encryption, Decryption,
Randomness
I. INTRODUCTION
One-Time Pad was first proposed in 1926 by G. Vernam to
encrypt wire and radio communications. In 1949 C.Shannon
[1] proved the perfect secrecy of one-time pad. The essence of
one-time pad is to generate a random string of at least the
length of the message to be the key of this message, and then
perform any operation like XOR the key with the message to
produce the cipher text. In order to decrypt the cipher text we
have to reverse the operation XOR the cipher text with the key
again in this example. It is impossible to crypt-analyse
one-time pad, since every message has a different random
key, and there is no way to distinguish the cipher text from a
random string. Although one-time pad is simple, fast and very
secure, it is not widely used. There are two major obstacles
that prevent one-time pad from being used in generic
applications [2].
The first obstacle being the generation of random
numbers.Although we recognize that this is a big obstacle for
using one-time pad encryption we do not address any solution
for this particular problem in this paper. We believe that if the
second obstacle, the key distribution problem, can be solved
then pseudo random number generator [2]
with periodic reseeding can be used. Although the resulting
algorithm would not be exactly one-time pad init’s some
sense, but it would provide a reasonable proximity to the
one-time pad.
Manuscript received Feb. 20, 2014.
Sagar Chandrakar, Department of Computer Science and Engineering
FET, SSTC, SSGI, Junwani, Bhilai (C.G.)
Bhagya Shree Jain, Department of Computer Science and Engineering
FET, SSTC, SSGI, Junwani, Bhilai (C.G.)
Shrikant Tiwari, Department of Computer Science and Engineering
FET, SSTC, SSGI, Junwani, Bhilai (C.G.)
In the usual scenario of secure data communication,
encryption of a message is done by one party, and decryption
of the same message is done by another party, with both
parties sharing the same key for the same message. However
the one-time pad encryption requires a new key for every new
message, which in turn requires a mechanism to distribute
keys so that both parties can have the same key for a message
while no third party could intercept morph or tamper with
these keys. If such a mechanism exists for generic
applications, then logically the encrypting party could have
used this mechanism to send the message directly without
encryption. In reality, no such practical mechanism exists, so
this fear of leaking the keys out is keeping people from using
one-time pad extensively. However, we should notice that in
applications where encryption and decryption are performed
by the same party, the key distribution problem [3] is not an
issue anymore. This means that we can employ one-time pad
on such type of encryptions tasks, and achieve the perfect
secrecy.
II. PROPOSED WEB IMPLEMENTATION OF ONE-TIME PAD
One Implementation that can be used in web is cookie
encryption [4] where encryption and decryption of the
cookies are done by the same party that is in server. The client
simply stores and sends the cookie, but does not participate in
cookie encryption or decryption also; the client does not use
the information in the cookie. Therefore the keys are solely
used by the server, instead of being shared by two parties.
This characteristic shows up only when the party that
performs both encryption and decryption is not able to or does
not want to store the sensitive information after its use.
Otherwise, if the encrypting or decrypting party wants to store
the information, then this party could have simply generated a
string to send to the other party, while storing the real
information with the string in the local database, since the
other party does not need the real information anyway.
Another approach would be to use combination of different
encryption algorithm [5]
in one-time pad.Figure1 shows the flow charts for cookie
encryption and Figure2for decryption. When a web server
needs to encrypt a cookie before sending it out, the web server
follows the first chart. When the web server receives a cookie
from a client, the web server follows the other chart to decrypt
the cookie.
Sagar Chandrakar, Bhagya Shree Jain, Shrikant Tiwari
Implementation of One-Time Pad over Web
Implementation of One-Time Pad over Web
207 www.erpublication.org
Figure 1: Cookie Encryption [4]
What makes cookie encryption so special is the web sites'
motive to respect users' privacy and reduce the web sites' own
liability; this is the reason why the web sites do not want to
store customers' credit card information after its use. Based on
this observation, we can use one-time pad cookie encryption
protocol to protect online users' privacy. In short, the web
servers store the one-time pad keys in a local database and
encrypt or decrypt the cookies using these keys.
Figure 2: Cookie Decryption [4]
Notice that after the decryption, whether or not to remove
the key from the key database would depend on the web
designer's choice. The web server would check’s the
expiration times in the key database against the current time,
and deletes all the expired keys. The main security related
reason is to provide a mechanism to limit the time the server
stores the key, hence limiting the web server's liability in case
an attacker breaks into both the database and a user's
computer. Another reason is that sometimes users may leave a
web site and not come back anymore, or chooses to clean her
cookies even if she comes back next time, or the users' system
might crash, in which cases the cookies would not return to
the web server anymore. So server should delete them.
The main factor that could impact one-time pad performance
is not the encryption or decryption themselves, but the
generation of the random keys [6]. The process of generating
random numbers is usually far slower than the one-time pad
encryption or decryption itself. Nevertheless, in case this
becomes a major issue of the overall real-time performance,
web servers can choose to use pre-computed random number
table to save the time of random number generation.
One seeming drawback of one-time pad is that the keys should
be as long as the plain texts and have to occupy the server's
storage space that is as large as the plain texts. In addition,
Is key valid? t
> current time)
END
Yes
No
No
No
Yes
Yes
Decompose cookie into cipher text C
and index i
Fetch the record (i, k, t) from
database
Decrypt the cipher text: p = k XOR C
Keep
Record?
Update (i, k, t) to (i, k, t’) where t’ is new
expiration time.
Discard cookie
and return error
message
Remove the
record (i, k, t)
Remove the
record (i, k, t)
Is i present in key db?
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-2, Issue-2, February 2014
208 www.erpublication.org
since the keys are supposed to be random strings with very
high entropy, compression will not work on the keys.
However, the cookies that this scheme is encrypting are not
that much large.
The perfect secrecy of any one-time pad relies on the
randomness of key generation [7, 8]. If the keys are not
random, then the algorithm cannot be proven to provide
perfect secrecy. True random numbers can be obtained by
measuring anyrandom physical process, such as cosmic
radiation, or thermal noise [9]. Therefore we can be
reasonably confident that one-time pad encryption on cookies
is unbreakable. The user's privacy is hence strongly protected
[9], and the web site's liability is substantially reduced by the
one-time pad encryption.
III. OBSERVATION
When we observe the theoretical aspect as well as the
Practical implementation in one-time pad as shown in Figure
3 we come across a very important aspect that the length of
Key should be equal to length of Message. This implies that as
the length of message increases proportionally the key length
also increase’s thus the complexity and the probability of
brute force method to find out the encrypted messages
reduces.
Figure 3: Basis Characteristics of One-Time pad
The performance comparison as shown in Figure 4 of
one-time pad gives us very useful insight of encryption rate
over different formats of different encryption algorithms
which are used worldwide over web.
Figure 4: Performance Comparison of various encryption
algorithms over web
When we analysis the speed or rather the time complexity of
one-time pad with major other encryption algorithm as shown
in Table: 1 we observe that speed or encryption rate is
practically is more or less same for text data or rather for low
volume, but as the volume of data increase’s the time taken for
encryption increase due to increased complexity and higher
data iteration overhead. In one-time pad when the data size is
small then we have faster encryption rate as the length of key
is also small, but as the data size increase’s the key length also
increase’s in same proportion so there is decrease in the data
encryption rate.
Algorithm
Time taken for Encryption
Text Image Video
RC4 Low Low Low-Medium
Salsa20 Low Low Low-Medium
PGP Low Medium Medium-High
Camellia Low Medium Medium-High
SEED Low Medium Medium-High
One-Time
Pad
Low Medium High
Table 1: Time Complexity of major encryption algorithm
used over web.
IV. CONCLUSION
This paper gives a really useful, real-world application of
secure distributed storage of sensitive information using our
implementation. A One-Time Pad method to achieve perfect
secrecy of cookie encryption is proposed, based on the
observation of the interesting characteristic of cookie
encryption. The pros and cons of this approach are analysed,
and the comparison with the existing approaches shows that
our approach is able to protects users' privacy and reduce web
sites' liability in a much stronger manner.
REFERENCES
[1] Jiao-Hongqiang, Tian-Junfeng and Wang-Baomin, “A Study on
the One-Time Pad Scheme Based Stern-Brocot Tree” in
proceeding of ISCSCT 08 Conference, pages 568-571. December
2008.
[2] Fengling Han, Jiankun Hu and Kai Xi, “Highly Efficient One-time
Pad Key Generation for Large Volume Medical Data Protection”
in proceeding of ICIEA Conference, pages 330-335. June 2010.
[3] Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliver Slattery,
Barry Hershman and Xiao Tang, “A Quantum Network Manager
That Supports A One-Time Pad Stream” in proceeding of
Quantum, Nano and Micro Technologies Conference, pages
16-21. February 2008.
[4] Donghua Xu, Chenghuai Lu and Andre Dos Santos, “Protecting
Web Usage of Credit Cards Using One-Time Pad Cookie
Encryption” in proceeding of Computer Security Applications
Conference, pages 51-58. April 2002.
[5] Songsheng Tang and Fuqiang Liu, “A one-time pad encryption
algorithm based on one-way hash and conventional block cipher”
in proceeding of CECNet Conference, pages 72-74. April 2012.
[6] Mariusz Borowski and Marek Lesniewicz, “Modern usage of “old”
one-time pad” in proceeding of Communications and
Information Systems Conference, pages 1-5. October 2012.
[7] Samah M. H. Alwahbani and Eihab B. M. Bashier “Speech
Scrambling Based on Chaotic Maps and One Time Pad” in
proceeding of ICCEEE Conference, pages 128-133. August
2013.
[8] Jeyamala.C, GopiGanesh.S, Raman G.S, “An Image Encryption
Scheme Based on One Time Pads – A Chaotic Approach” in
proceeding of ICCCNT Conference, pages 1-6. July 2010.
[9]Zhihua Chen and Jin Xu, “One-Time-Pads Encryption in the Tile
Assembly Model” in proceeding of BICTA Conference, pages
23-30. October 2008.

More Related Content

What's hot

E031102034039
E031102034039E031102034039
E031102034039theijes
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET Journal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication Systempaperpublications3
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Eswar Publications
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationIRJET Journal
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptographyeSAT Publishing House
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 

What's hot (17)

E031102034039
E031102034039E031102034039
E031102034039
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
P01813101103
P01813101103P01813101103
P01813101103
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Multilevel Security and Authentication System
Multilevel Security and Authentication SystemMultilevel Security and Authentication System
Multilevel Security and Authentication System
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
Enhanced Authentication in Wireless Sensor Networks for Effective Lifetime En...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android ApplicationA Study of Location and Date-Time Encryption of Cloud using Android Application
A Study of Location and Date-Time Encryption of Cloud using Android Application
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 

Viewers also liked (20)

General meeting (1.28.2014)
General meeting (1.28.2014)General meeting (1.28.2014)
General meeting (1.28.2014)
 
Refleksi hafazan
Refleksi hafazanRefleksi hafazan
Refleksi hafazan
 
Badminton Theater Analysis Presentation PPT
Badminton Theater Analysis Presentation PPTBadminton Theater Analysis Presentation PPT
Badminton Theater Analysis Presentation PPT
 
Songs
SongsSongs
Songs
 
General docs 1
General docs 1General docs 1
General docs 1
 
Ijetr021252
Ijetr021252Ijetr021252
Ijetr021252
 
Ijetr021224
Ijetr021224Ijetr021224
Ijetr021224
 
Slide share
Slide shareSlide share
Slide share
 
Ijetr021239
Ijetr021239Ijetr021239
Ijetr021239
 
Coursebook essay
Coursebook essayCoursebook essay
Coursebook essay
 
Ijetr021265
Ijetr021265Ijetr021265
Ijetr021265
 
Programa al alndalus 2013
Programa al alndalus 2013Programa al alndalus 2013
Programa al alndalus 2013
 
050113
050113050113
050113
 
Docker やってみた
Docker やってみたDocker やってみた
Docker やってみた
 
Digiwomen - the art of in mails
Digiwomen - the art of in mailsDigiwomen - the art of in mails
Digiwomen - the art of in mails
 
Internet
InternetInternet
Internet
 
Okapi_Health Horizons 2021
Okapi_Health Horizons 2021Okapi_Health Horizons 2021
Okapi_Health Horizons 2021
 
Change Your Voice in Firefox Hello
Change Your Voice in Firefox HelloChange Your Voice in Firefox Hello
Change Your Voice in Firefox Hello
 
Impianto natatorio(tv)
Impianto natatorio(tv)Impianto natatorio(tv)
Impianto natatorio(tv)
 
RSA
RSARSA
RSA
 

Similar to Implementing One-Time Pad Encryption over the Web

IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On CryptographyHaley Johnson
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudeSAT Journals
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Hacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningHacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningSumutiu Marius
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 

Similar to Implementing One-Time Pad Encryption over the Web (20)

IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
Essay On Cryptography
Essay On CryptographyEssay On Cryptography
Essay On Cryptography
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Hacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie PoisoningHacking Web Aplications using Cookie Poisoning
Hacking Web Aplications using Cookie Poisoning
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 

More from Engineering Research Publication (20)

Ijetr042339
Ijetr042339Ijetr042339
Ijetr042339
 
Ijetr042336
Ijetr042336Ijetr042336
Ijetr042336
 
Ijetr042335
Ijetr042335Ijetr042335
Ijetr042335
 
Ijetr042334
Ijetr042334Ijetr042334
Ijetr042334
 
Ijetr042330
Ijetr042330Ijetr042330
Ijetr042330
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
Ijetr042328
Ijetr042328Ijetr042328
Ijetr042328
 
Ijetr042327
Ijetr042327Ijetr042327
Ijetr042327
 
Ijetr042322
Ijetr042322Ijetr042322
Ijetr042322
 
Ijetr042321
Ijetr042321Ijetr042321
Ijetr042321
 
Ijetr042319
Ijetr042319Ijetr042319
Ijetr042319
 
Ijetr042318
Ijetr042318Ijetr042318
Ijetr042318
 
Ijetr042316
Ijetr042316Ijetr042316
Ijetr042316
 
Ijetr042313
Ijetr042313Ijetr042313
Ijetr042313
 
Ijetr042309
Ijetr042309Ijetr042309
Ijetr042309
 
Ijetr042301
Ijetr042301Ijetr042301
Ijetr042301
 
Ijetr042207
Ijetr042207Ijetr042207
Ijetr042207
 
Ijetr042201
Ijetr042201Ijetr042201
Ijetr042201
 
Ijetr042195
Ijetr042195Ijetr042195
Ijetr042195
 
Ijetr042192
Ijetr042192Ijetr042192
Ijetr042192
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Implementing One-Time Pad Encryption over the Web

  • 1. International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-2, February 2014 206 www.erpublication.org  Abstract— This paper aims to present the implementation of One-Time Pad (OTP) which is a type of encryption that is impossible to crack if used properly and correctly. In this paper we are proposing one-time pad implementation over web using cookie encryption and cookie decryption. The basic encryption method of one-time pad is used, where characterfrom the plaintext is XOR with the character from a secret random key (or pad) of the same length as the plaintext, resulting in a cipher text. If the key is truly random then the cipher text would be impossible to decrypt or break without knowing the key. In our proposed method an index string is generated with is stored in remote servers. This information is used to generate cookie which can be used for secure communication over web using One-Time pad. Index Terms— One-Time Pad, Encryption, Decryption, Randomness I. INTRODUCTION One-Time Pad was first proposed in 1926 by G. Vernam to encrypt wire and radio communications. In 1949 C.Shannon [1] proved the perfect secrecy of one-time pad. The essence of one-time pad is to generate a random string of at least the length of the message to be the key of this message, and then perform any operation like XOR the key with the message to produce the cipher text. In order to decrypt the cipher text we have to reverse the operation XOR the cipher text with the key again in this example. It is impossible to crypt-analyse one-time pad, since every message has a different random key, and there is no way to distinguish the cipher text from a random string. Although one-time pad is simple, fast and very secure, it is not widely used. There are two major obstacles that prevent one-time pad from being used in generic applications [2]. The first obstacle being the generation of random numbers.Although we recognize that this is a big obstacle for using one-time pad encryption we do not address any solution for this particular problem in this paper. We believe that if the second obstacle, the key distribution problem, can be solved then pseudo random number generator [2] with periodic reseeding can be used. Although the resulting algorithm would not be exactly one-time pad init’s some sense, but it would provide a reasonable proximity to the one-time pad. Manuscript received Feb. 20, 2014. Sagar Chandrakar, Department of Computer Science and Engineering FET, SSTC, SSGI, Junwani, Bhilai (C.G.) Bhagya Shree Jain, Department of Computer Science and Engineering FET, SSTC, SSGI, Junwani, Bhilai (C.G.) Shrikant Tiwari, Department of Computer Science and Engineering FET, SSTC, SSGI, Junwani, Bhilai (C.G.) In the usual scenario of secure data communication, encryption of a message is done by one party, and decryption of the same message is done by another party, with both parties sharing the same key for the same message. However the one-time pad encryption requires a new key for every new message, which in turn requires a mechanism to distribute keys so that both parties can have the same key for a message while no third party could intercept morph or tamper with these keys. If such a mechanism exists for generic applications, then logically the encrypting party could have used this mechanism to send the message directly without encryption. In reality, no such practical mechanism exists, so this fear of leaking the keys out is keeping people from using one-time pad extensively. However, we should notice that in applications where encryption and decryption are performed by the same party, the key distribution problem [3] is not an issue anymore. This means that we can employ one-time pad on such type of encryptions tasks, and achieve the perfect secrecy. II. PROPOSED WEB IMPLEMENTATION OF ONE-TIME PAD One Implementation that can be used in web is cookie encryption [4] where encryption and decryption of the cookies are done by the same party that is in server. The client simply stores and sends the cookie, but does not participate in cookie encryption or decryption also; the client does not use the information in the cookie. Therefore the keys are solely used by the server, instead of being shared by two parties. This characteristic shows up only when the party that performs both encryption and decryption is not able to or does not want to store the sensitive information after its use. Otherwise, if the encrypting or decrypting party wants to store the information, then this party could have simply generated a string to send to the other party, while storing the real information with the string in the local database, since the other party does not need the real information anyway. Another approach would be to use combination of different encryption algorithm [5] in one-time pad.Figure1 shows the flow charts for cookie encryption and Figure2for decryption. When a web server needs to encrypt a cookie before sending it out, the web server follows the first chart. When the web server receives a cookie from a client, the web server follows the other chart to decrypt the cookie. Sagar Chandrakar, Bhagya Shree Jain, Shrikant Tiwari Implementation of One-Time Pad over Web
  • 2. Implementation of One-Time Pad over Web 207 www.erpublication.org Figure 1: Cookie Encryption [4] What makes cookie encryption so special is the web sites' motive to respect users' privacy and reduce the web sites' own liability; this is the reason why the web sites do not want to store customers' credit card information after its use. Based on this observation, we can use one-time pad cookie encryption protocol to protect online users' privacy. In short, the web servers store the one-time pad keys in a local database and encrypt or decrypt the cookies using these keys. Figure 2: Cookie Decryption [4] Notice that after the decryption, whether or not to remove the key from the key database would depend on the web designer's choice. The web server would check’s the expiration times in the key database against the current time, and deletes all the expired keys. The main security related reason is to provide a mechanism to limit the time the server stores the key, hence limiting the web server's liability in case an attacker breaks into both the database and a user's computer. Another reason is that sometimes users may leave a web site and not come back anymore, or chooses to clean her cookies even if she comes back next time, or the users' system might crash, in which cases the cookies would not return to the web server anymore. So server should delete them. The main factor that could impact one-time pad performance is not the encryption or decryption themselves, but the generation of the random keys [6]. The process of generating random numbers is usually far slower than the one-time pad encryption or decryption itself. Nevertheless, in case this becomes a major issue of the overall real-time performance, web servers can choose to use pre-computed random number table to save the time of random number generation. One seeming drawback of one-time pad is that the keys should be as long as the plain texts and have to occupy the server's storage space that is as large as the plain texts. In addition, Is key valid? t > current time) END Yes No No No Yes Yes Decompose cookie into cipher text C and index i Fetch the record (i, k, t) from database Decrypt the cipher text: p = k XOR C Keep Record? Update (i, k, t) to (i, k, t’) where t’ is new expiration time. Discard cookie and return error message Remove the record (i, k, t) Remove the record (i, k, t) Is i present in key db?
  • 3. International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-2, February 2014 208 www.erpublication.org since the keys are supposed to be random strings with very high entropy, compression will not work on the keys. However, the cookies that this scheme is encrypting are not that much large. The perfect secrecy of any one-time pad relies on the randomness of key generation [7, 8]. If the keys are not random, then the algorithm cannot be proven to provide perfect secrecy. True random numbers can be obtained by measuring anyrandom physical process, such as cosmic radiation, or thermal noise [9]. Therefore we can be reasonably confident that one-time pad encryption on cookies is unbreakable. The user's privacy is hence strongly protected [9], and the web site's liability is substantially reduced by the one-time pad encryption. III. OBSERVATION When we observe the theoretical aspect as well as the Practical implementation in one-time pad as shown in Figure 3 we come across a very important aspect that the length of Key should be equal to length of Message. This implies that as the length of message increases proportionally the key length also increase’s thus the complexity and the probability of brute force method to find out the encrypted messages reduces. Figure 3: Basis Characteristics of One-Time pad The performance comparison as shown in Figure 4 of one-time pad gives us very useful insight of encryption rate over different formats of different encryption algorithms which are used worldwide over web. Figure 4: Performance Comparison of various encryption algorithms over web When we analysis the speed or rather the time complexity of one-time pad with major other encryption algorithm as shown in Table: 1 we observe that speed or encryption rate is practically is more or less same for text data or rather for low volume, but as the volume of data increase’s the time taken for encryption increase due to increased complexity and higher data iteration overhead. In one-time pad when the data size is small then we have faster encryption rate as the length of key is also small, but as the data size increase’s the key length also increase’s in same proportion so there is decrease in the data encryption rate. Algorithm Time taken for Encryption Text Image Video RC4 Low Low Low-Medium Salsa20 Low Low Low-Medium PGP Low Medium Medium-High Camellia Low Medium Medium-High SEED Low Medium Medium-High One-Time Pad Low Medium High Table 1: Time Complexity of major encryption algorithm used over web. IV. CONCLUSION This paper gives a really useful, real-world application of secure distributed storage of sensitive information using our implementation. A One-Time Pad method to achieve perfect secrecy of cookie encryption is proposed, based on the observation of the interesting characteristic of cookie encryption. The pros and cons of this approach are analysed, and the comparison with the existing approaches shows that our approach is able to protects users' privacy and reduce web sites' liability in a much stronger manner. REFERENCES [1] Jiao-Hongqiang, Tian-Junfeng and Wang-Baomin, “A Study on the One-Time Pad Scheme Based Stern-Brocot Tree” in proceeding of ISCSCT 08 Conference, pages 568-571. December 2008. [2] Fengling Han, Jiankun Hu and Kai Xi, “Highly Efficient One-time Pad Key Generation for Large Volume Medical Data Protection” in proceeding of ICIEA Conference, pages 330-335. June 2010. [3] Alan Mink, Lijun Ma, Tassos Nakassis, Hai Xu, Oliver Slattery, Barry Hershman and Xiao Tang, “A Quantum Network Manager That Supports A One-Time Pad Stream” in proceeding of Quantum, Nano and Micro Technologies Conference, pages 16-21. February 2008. [4] Donghua Xu, Chenghuai Lu and Andre Dos Santos, “Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption” in proceeding of Computer Security Applications Conference, pages 51-58. April 2002. [5] Songsheng Tang and Fuqiang Liu, “A one-time pad encryption algorithm based on one-way hash and conventional block cipher” in proceeding of CECNet Conference, pages 72-74. April 2012. [6] Mariusz Borowski and Marek Lesniewicz, “Modern usage of “old” one-time pad” in proceeding of Communications and Information Systems Conference, pages 1-5. October 2012. [7] Samah M. H. Alwahbani and Eihab B. M. Bashier “Speech Scrambling Based on Chaotic Maps and One Time Pad” in proceeding of ICCEEE Conference, pages 128-133. August 2013. [8] Jeyamala.C, GopiGanesh.S, Raman G.S, “An Image Encryption Scheme Based on One Time Pads – A Chaotic Approach” in proceeding of ICCCNT Conference, pages 1-6. July 2010. [9]Zhihua Chen and Jin Xu, “One-Time-Pads Encryption in the Tile Assembly Model” in proceeding of BICTA Conference, pages 23-30. October 2008.