SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 11
JIT DYNAMIC CRYPTOSYSTEM
Anntinu.T.J1
, Sherly.K.K2
1
PG Student, Department of Computer Science, Toc H Institute of Science & Technology, Kerala, India
2
Associate Professor, Department of Information Technology, Toc H Institute of Science & Technology, Kerala, India
Abstract
Conventional cryptography systems use a static key or a pair of keys for the encryption and decryption process. It is known from the
study of the authentication method that the dynamic 2-factor based methods are more secure than the static parameter based
authentication method. Also in the static key based encryption technique the entire security is based on the secrecy of the key used.
Since the computational power of computers are increasing the key length is also increasing, which in turn force us to record it
somewhere which makes it vulnerable. Here arises the need for a dynamic 2-factor based encryption technique in which the keys are
generated based on Just in Time (JIT) principle for the encryption and decryption process. Here we utilize the property of RSA method
for the generation of the JIT dynamic key for encryption and decryption process using a mobile agent in Client-Server architecture. In
this system both the encryption key and decryption key is generated by the mobile agent in association with the server. A random
number generated in both mobile agent and the server using time and a secret parameter as its seed makes the JIT key different for
different users at same time and different JIT key for same user at different time. This method provides dynamic nature to the key and
protects our system from key compromise. This method also provides an inborn authentication scheme for the users in the system. In
conventional RSA system there is a chance for key compromise by brute force attack, but in this system the RSA key changes for every
encryption and decryption without the overhead of key generation which make the system reliable and robust.
Keywords: 2-FACTOR, JIT, RSA, Client-Server, Dynamic.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
The growth of information technology has increased the value
of data. Data security is of utmost importance in today’s E-
world. Confidentiality of data can be achieved by using
cryptography and steganography. Cryptography is the
dexterity of secret writing. The major hotspot in today’s
research world is secure communication through insecure
channel like internet. Internet plays a major role in data
communication in this digital world. The development in
internet technology and increase in the computational power
of computer are causing challenges to data security. Last but
not the least, we should also consider the fact that we are
mainly relying on encryption technique certified by NSA who
is also behind the clandestine prism project.
Usually, the security of an encryption method is determined
based on the complexity of its mathematical operation. But we
are forgetting the fact that the security of an encryption
method is actually depending on the secrecy of encryption
key. One time key is a good method for increasing the security
of encrypted data but the key exchange will be always an
overhead. Many dynamic encryption techniques have been
proposed in order to increase the security but still the key or
key pair for encryption and decryption will be the same. So
security of the cipher data is directly related to the secrecy of
key. For improving the security it is better to change key with
respect to time. But the limitation of this approach is that same
or pair key is necessary for decryption. In our method we are
reconfiguring RSA encryption algorithm in client-server
model in such a way that the key for encryption and
decryption will be generated using Just in Time(JIT)
methodology and the key for decryption process will be
different at different time for same cipher text. So the security
of key is achieved using a mobile key generator. Here the
system is similar to that of 2-Factor authentication method.
The remaining portion of the paper is organized as follows. In
section 2, the existing literatures are analyzed. The proposed
system and its working are discussed in section 3 and
4.Section 5 deals with the analysis part and finally conclusion
is made in section 6.
2. RELATED WORKS
Many works have been done in the field of authentication
using 2-Factor authentication method which clearly point out
the security improvements. But so far no works were done in
the field of 2-Factor encryption and JIT key generator. There
are many papers exploring the use of dynamic encryption.
In[1] Fabian et al proposes a new method in which dynamic
key will be generated for AES encryption using a Pseudo-
Random Number Generator(PRNG) and using a hash function
from an image. This helped us to utilize the dynamic key
generation from PRNG.
In our method for generating the JIT key we are using a
random number generator. Cryptographic PRNG of[2] can be
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 12
reconfigured for our need. In [2] chalama reddy et al proposed
cryptographic PRNG using blow fish encryption algorithm.
The advantage of this method is that we can generate a
random number of infinite length by using a 64 bit plain text
and variable length key. In our method we are utilizing this
PRNG in our server and mobile key generator side for
generating JIT key.
For our system we are utilizing the exponential property of
RSA encryption algorithm. It is this property through which
we are achieving the half encryption. In [3] improvements of
RSA key generation are proposed through which we can
achieve better security to our system. In [3] instead of two
prime numbers we are utilizing three prime numbers for key
generation which will further increase the complexity of
factorization.
3. THE PROPOSED METHOD
Fig -1: Abstract representation of proposed system
The key logic in our system is in RSA half encryption. We
achieve a high degree of security for information with help of
this two factor encryption. Here the RSA algorithm is
implemented in two stages,
1. In the client part the Intermediate text is encrypted
using {Public key[receivers] minus Random number
[at time t1]}. The Mobile agent generates the random
number using synchronized time seed and Secret
UID.
2. In the server part the half encrypted message is
encrypted using the random number [at time t1]
generated using the synchronized time seed by the
server.
The fully encrypted cipher text is stored in the server’s
database for further use. The static key is the public key-
private key pair of RSA and the dynamic factor is generated
by the PRNG using time and secret User ID. The decryption
process is also implemented in two stages of RSA,
1. In the server part half decryption is achieved using
the random number [at time t2] generated using the
synchronous time seed by the server.
2. In the client part the half decrypted data is again
decrypted by using {Private key [receiver]-Random
number [at time t2]} generated by the mobile agent
having synchronous time seed.
Our proposed system consists of several sub systems. These
sub systems are discussed below,
3.1 Random Number Generator
Fig -2: Crypto Based Pseudo Random Number Generator
(CBSRNG)
The random number generator used in our system is crypto
based pseudo- random number generator[2] with blow fish
algorithm. Here we are reconfiguring [2] according to our
requirements. In our method we are using date and time
together with a secret user id as the seed to the crypto based
pseudo- random number generator (CBPRNG). Here the 64 bit
date and time act as the plain text for encryption and secret
user id(SUID) act as the key with variable size of 32-448 bits.
The results provided by the CBPRNG were quiet promising.
We are using this random number generator for both the
mobile key generator and server. For generating same random
number at both ends the seed should be same. The SUID is
shared with the server by the mobile key generator at the time
of registration. Then at the time of encryption the mobile key
generator interact with the server and select a common time
seed.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 13
3.2 RSA Key Generation & Encryption-Decryption
Process
For key generation we are using [3] in which they are using
two prime number for key generation. But we are using three
prime number for key generation which increases security of
the system. Using [3] the complexity of factorization also
increases.
Fig -3: Functional diagram of proposed system
3.2.1 RSA Key Generation Steps:
(a) Choose three distinct prime numbers p, q and s.
(b) Find n such that n = p*q*s. n will be used as the modulus
for both the public and private keys.
(c) Find the Phi of n, ɸ (n) = (p-1)(q-1)(s-1).
(d) Choose an e such that 1 < e < ɸ (n), and such that e and ɸ
(n) share no Divisors other than 1 (e and ɸ (n) are relatively
prime). e is kept as the public key exponent.
(e) Determine d (using modular arithmetic) which satisfies the
congruence relation .d*e ≡ 1 (mod ɸ (n)).
3.2.2 Encryption & Decryption
The key idea in our system is half encryption/decryption for
achieving the two factor encryption. It is achieved by utilizing
the property of RSA encryption algorithm. The mathematical
operation involved in RSA is exponential operation, Me
(mod
n) & Cd
(mod n). The half encryption is possible in RSA due to
properties of exponential and modular arithmetic.
C=Me
(mod n) ≡ (Me1
(mod n)) e2
) mod n) ----------(1)
M=Cd
(mod n)≡( Cd1
(mod n)) d2
) mod n) ----------(2)
Where,
e= e1+e2 (3)
d=d1+d2 (4)
In our method in the sender side e1 is the Receiver’s public
key minus Random number(Ra) and e2 is Random
number(Ra). ie, e= (Pu-Ra) + Ra = Pu. So in effect after the
two half encryption the total process is equivalent to
encryption with public key of receiver. Likewise in the
receiver side d1 is the Receiver’s private key minus Random
number(Rb) and d2 is Random number(Rb). ie, in effect d=
(Pr-Rb) + Rb = Pr. So in effect after the two half decryption
the total process is equivalent to decryption with private key
of receiver.
The system consists of four parts. They are,
1. Sender: The function of the sender is to perform half
encryption using the part key(half encryption
/decryption key generated in mobile key generator or
server) and sending it to the server.
2. Mobile key generator: Mobile key generator
generates the part key for encryption & decryption.
For the part key generation process, it interacts with
the server for date and time synchronization and by
using this synchronized date and time and Secret user
ID as the seed it generates the random number. By
subtracting this random number from receiver’s
public key it generates part key for encryption and by
subtracting from receivers private key it generates the
part key for decryption. The mobile key generator
also generates the RSA key pair and enrolls the user
with the system. The public key, user details & SUID
is registered with the server at the time of enrollment
process.
3 Server: The server performs half encryption and half
decryption by using the random number generated
using synchronized date and time and Secret user ID
as seed. It also stores the full encrypted file for
serving users request.
4 Receiver: The receiver requests the encrypted data
from the server and performs the completion of
decryption process by using the part key generated by
the mobile key generator.
4. WORKING
The system can be explained with the help of sample data used
in the Fig-4.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 14
Fig -4: Working with Sample data.
4.1 Algorithm
4.1.1 Sender
1. The message for encryption is given as input into the RSA
module.
2. The time synchronization module of the mobile agent
interacts with the time synchronization module of the server
and agrees upon a common time. The cryptographic PRNG in
server and Mobile Agent generate a random number using
time(T1) and Secret UID of sender as seed.
3. Encryption key for sender is generated by subtracting the
random number produced by PRNG from the Public key of
the receiver. The data is then half encrypted and send to the
server.
4. The RSA encryption process is completed in the server
using the random number as key and the result is stored in the
database for future use.
4.1.2 Receiver
1. The receiver will request for the file along with a time
synchronization request by the Mobile agent.
2. The data from the database will be half decrypted using the
random number generated by PRNG using time(T2) and
Secret UID of the receiver. This half decrypted data will be
send to the receiver.
3. In the receiver side, the decryption is done using the key
obtained by subtracting the random number from the private
key of the receiver.
4. Finally, the plain message will be returned.
In the Fig-4 the inputs and outputs along with the intermediate
result are shown. For better understanding simple input is
given. In the system we can see that the encrypted data in the
insecure communication channel is different for the same
message, minimizing the chances for external attack.
5. ANALYSIS
In our proposed system, the hacker can access the file when it
is being transmitted through the network. The data that is send
to the server is not completely encrypted so the data won’t
have the characteristic of RSA encryption. Also the same
property exists for the sending process from the server. Here
we can also see that the data send from the server to receiver
and from the sender to server is entirely different. Also our
method will provide authenticity and non repudiation as an
inborn feature. Here the encryption key and decryption key
will be generated only at the time of need so one time
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 15
compromise will not affect the security of key pair and the
system. Our system will provide better security than the
currently exiting system. One of the major disadvantages of
our system is time and space complexity.
6. CONCLUSIONS
Maintaining security is becoming more and more challenging
with time. In the field of cryptography, static key encryption is
currently used resulting in decrease of security with time. The
current problem in the field of cryptography is the need for
changing the encryption key or key pair periodically. It is
essential in order to ensure confidentiality. In this paper we are
proposing a new dynamic encryption method in which both
encryption and decryption key change with respect to time.
Here a mobile key generator is used to generate dynamically
changing key. Our method will provide authenticity together
with non repudiation as an inborn feature. In this paper we are
proposing a new approach to the cryptographic world known
as “Two Factor Cryptography”. Here both encryption and
decryption key is generated only at the time of need generally
known as Just in Time (JIT) key generation. Here this
approach is possible due to the exponential feature of RSA
method. Here the possibility of key compromise will reduce
since the encryption key is different from decryption key and
changes with time. Hence, in our proposed system the security
is not compromised with time.
REFERENCES
[1]. Septimiu Fabian Mare, Mircea Vladutiu and Lucian
Prodan,“Secret data communication system using
Steganography, AES and RSA”,2011 IEEE 17th International
Symposium for Design and Technology in Electronic
Packaging (SIITME).
[2]. T.Chalama Reddy 1, Dr.R.Seshadri2,“New Design of
Crypto- Based Pseudo random number generator (CBPRNG)
using BLOW FISH cipher”,International Journal on Computer
Science and Engineering (IJCSE), Vol. 5 No. 06 Jun 2013.
[3]. Prof.Dr.Alaa Hussein Al-Hamami and Ibrahem Abdallah
Aldariseh, “Enhanced Method for RSA Cryptosystem
Algorithm”, 2012 International Conference on Advanced
Computer Science Applications and Technologies.
BIOGRAPHIES
Anntinu.T.J received his B.Tech in
Computer Science & Engg from Calicut
University, Kerala and currently pursuing
M.Tech in Computer Science & Engg with
specialization in Data Security from CUSAT,
Kerala. His research interest are Data
security, Network security, Image processing.
Sherly K.K received her B.E degree in
Electronics & Communication from
Karnataka University, Dharwad and M.Tech
degree in Information Technology from
Punjabi University, Patiala in 1990 and 2004
respectively. Presently she is working as
Head of Department of Information Technology at Toc H
Institute of Science & Technology, Arakunnam .She has more
than 20 years of academic experience. Her research interests
are Network security, Knowledge Discovery in Databases,
Distributed Database Systems and Parallel Processing.

More Related Content

What's hot

Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
The technique to detect and avoid the denial of service attacks in wireless s...
The technique to detect and avoid the denial of service attacks in wireless s...The technique to detect and avoid the denial of service attacks in wireless s...
The technique to detect and avoid the denial of service attacks in wireless s...eSAT Publishing House
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Journals
 
IRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manetcsandit
 
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETAGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETcscpconf
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETIJNSA Journal
 
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...IJNSA Journal
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...IJNSA Journal
 
An authentication framework for wireless sensor networks using Signature Base...
An authentication framework for wireless sensor networks using Signature Base...An authentication framework for wireless sensor networks using Signature Base...
An authentication framework for wireless sensor networks using Signature Base...ijsrd.com
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme inIJNSA Journal
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 

What's hot (18)

Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
The technique to detect and avoid the denial of service attacks in wireless s...
The technique to detect and avoid the denial of service attacks in wireless s...The technique to detect and avoid the denial of service attacks in wireless s...
The technique to detect and avoid the denial of service attacks in wireless s...
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
IRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed Environment
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Agent based intrusion detection system in manet
Agent based intrusion detection system in manetAgent based intrusion detection system in manet
Agent based intrusion detection system in manet
 
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANETAGENT BASED INTRUSION DETECTION SYSTEM IN MANET
AGENT BASED INTRUSION DETECTION SYSTEM IN MANET
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANETA NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
 
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
 
An authentication framework for wireless sensor networks using Signature Base...
An authentication framework for wireless sensor networks using Signature Base...An authentication framework for wireless sensor networks using Signature Base...
An authentication framework for wireless sensor networks using Signature Base...
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 

Viewers also liked

Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageeSAT Publishing House
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokenseSAT Publishing House
 
Empirical model for the estimation of global solar
Empirical model for the estimation of global solarEmpirical model for the estimation of global solar
Empirical model for the estimation of global solareSAT Publishing House
 
Vlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter forVlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter foreSAT Publishing House
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...eSAT Publishing House
 
A vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackA vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackeSAT Publishing House
 
Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’seSAT Publishing House
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofeSAT Publishing House
 
Dynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateDynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateeSAT Publishing House
 
Numerical analysis of influence of deep excavation on nearby existing tunnel
Numerical analysis of influence of deep excavation on nearby existing tunnelNumerical analysis of influence of deep excavation on nearby existing tunnel
Numerical analysis of influence of deep excavation on nearby existing tunneleSAT Publishing House
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...eSAT Publishing House
 
Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...eSAT Publishing House
 
Route optimization in manets with aco and ga
Route optimization in manets with aco and gaRoute optimization in manets with aco and ga
Route optimization in manets with aco and gaeSAT Publishing House
 
Performance analysis of active clamped interleaved
Performance analysis of active clamped interleavedPerformance analysis of active clamped interleaved
Performance analysis of active clamped interleavedeSAT Publishing House
 
Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...eSAT Publishing House
 
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a reviewPerformance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a revieweSAT Publishing House
 
Revamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lanRevamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless laneSAT Publishing House
 
A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...eSAT Publishing House
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientseSAT Publishing House
 

Viewers also liked (20)

Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr image
 
Cross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokensCross cloud single sign on (sso) using tokens
Cross cloud single sign on (sso) using tokens
 
Empirical model for the estimation of global solar
Empirical model for the estimation of global solarEmpirical model for the estimation of global solar
Empirical model for the estimation of global solar
 
Vlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter forVlsi implementation of adaptive kalman filter for
Vlsi implementation of adaptive kalman filter for
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...
 
A vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attackA vivacious approach to detect and prevent d do s attack
A vivacious approach to detect and prevent d do s attack
 
Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’s
 
An axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of ofAn axisymmetric bending and shear stress analysis of of
An axisymmetric bending and shear stress analysis of of
 
Dynamic model of zeta converter with full state
Dynamic model of zeta converter with full stateDynamic model of zeta converter with full state
Dynamic model of zeta converter with full state
 
Numerical analysis of influence of deep excavation on nearby existing tunnel
Numerical analysis of influence of deep excavation on nearby existing tunnelNumerical analysis of influence of deep excavation on nearby existing tunnel
Numerical analysis of influence of deep excavation on nearby existing tunnel
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...
 
Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...
 
Route optimization in manets with aco and ga
Route optimization in manets with aco and gaRoute optimization in manets with aco and ga
Route optimization in manets with aco and ga
 
Performance analysis of active clamped interleaved
Performance analysis of active clamped interleavedPerformance analysis of active clamped interleaved
Performance analysis of active clamped interleaved
 
Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...Sensitivity based optimal location of tcsc for improvement of power system se...
Sensitivity based optimal location of tcsc for improvement of power system se...
 
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a reviewPerformance of nano crystalline h zsm-5 as additive in fcc catalyst a review
Performance of nano crystalline h zsm-5 as additive in fcc catalyst a review
 
Revamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lanRevamping quality of service of video streaming over wireless lan
Revamping quality of service of video streaming over wireless lan
 
A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...A quantitative risk assessment approach in an integrated cold chain system en...
A quantitative risk assessment approach in an integrated cold chain system en...
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficients
 

Similar to Jit dynamic cryptosystem

IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Journals
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...IRJET Journal
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsIRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureeSAT Journals
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...
Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...
Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...AM Publications
 
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...eSAT Journals
 
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...eSAT Publishing House
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 

Similar to Jit dynamic cryptosystem (20)

IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Graphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signatureGraphical password authentication using pccp with sound signature
Graphical password authentication using pccp with sound signature
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...
Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...
Secure communication for mobile Adhoc network using (LPIT) Lagrange polynomia...
 
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
 
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
Tiled bitmap algorithm and forensic analysis of data tampering (an evolutiona...
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

Jit dynamic cryptosystem

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 11 JIT DYNAMIC CRYPTOSYSTEM Anntinu.T.J1 , Sherly.K.K2 1 PG Student, Department of Computer Science, Toc H Institute of Science & Technology, Kerala, India 2 Associate Professor, Department of Information Technology, Toc H Institute of Science & Technology, Kerala, India Abstract Conventional cryptography systems use a static key or a pair of keys for the encryption and decryption process. It is known from the study of the authentication method that the dynamic 2-factor based methods are more secure than the static parameter based authentication method. Also in the static key based encryption technique the entire security is based on the secrecy of the key used. Since the computational power of computers are increasing the key length is also increasing, which in turn force us to record it somewhere which makes it vulnerable. Here arises the need for a dynamic 2-factor based encryption technique in which the keys are generated based on Just in Time (JIT) principle for the encryption and decryption process. Here we utilize the property of RSA method for the generation of the JIT dynamic key for encryption and decryption process using a mobile agent in Client-Server architecture. In this system both the encryption key and decryption key is generated by the mobile agent in association with the server. A random number generated in both mobile agent and the server using time and a secret parameter as its seed makes the JIT key different for different users at same time and different JIT key for same user at different time. This method provides dynamic nature to the key and protects our system from key compromise. This method also provides an inborn authentication scheme for the users in the system. In conventional RSA system there is a chance for key compromise by brute force attack, but in this system the RSA key changes for every encryption and decryption without the overhead of key generation which make the system reliable and robust. Keywords: 2-FACTOR, JIT, RSA, Client-Server, Dynamic. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION The growth of information technology has increased the value of data. Data security is of utmost importance in today’s E- world. Confidentiality of data can be achieved by using cryptography and steganography. Cryptography is the dexterity of secret writing. The major hotspot in today’s research world is secure communication through insecure channel like internet. Internet plays a major role in data communication in this digital world. The development in internet technology and increase in the computational power of computer are causing challenges to data security. Last but not the least, we should also consider the fact that we are mainly relying on encryption technique certified by NSA who is also behind the clandestine prism project. Usually, the security of an encryption method is determined based on the complexity of its mathematical operation. But we are forgetting the fact that the security of an encryption method is actually depending on the secrecy of encryption key. One time key is a good method for increasing the security of encrypted data but the key exchange will be always an overhead. Many dynamic encryption techniques have been proposed in order to increase the security but still the key or key pair for encryption and decryption will be the same. So security of the cipher data is directly related to the secrecy of key. For improving the security it is better to change key with respect to time. But the limitation of this approach is that same or pair key is necessary for decryption. In our method we are reconfiguring RSA encryption algorithm in client-server model in such a way that the key for encryption and decryption will be generated using Just in Time(JIT) methodology and the key for decryption process will be different at different time for same cipher text. So the security of key is achieved using a mobile key generator. Here the system is similar to that of 2-Factor authentication method. The remaining portion of the paper is organized as follows. In section 2, the existing literatures are analyzed. The proposed system and its working are discussed in section 3 and 4.Section 5 deals with the analysis part and finally conclusion is made in section 6. 2. RELATED WORKS Many works have been done in the field of authentication using 2-Factor authentication method which clearly point out the security improvements. But so far no works were done in the field of 2-Factor encryption and JIT key generator. There are many papers exploring the use of dynamic encryption. In[1] Fabian et al proposes a new method in which dynamic key will be generated for AES encryption using a Pseudo- Random Number Generator(PRNG) and using a hash function from an image. This helped us to utilize the dynamic key generation from PRNG. In our method for generating the JIT key we are using a random number generator. Cryptographic PRNG of[2] can be
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 12 reconfigured for our need. In [2] chalama reddy et al proposed cryptographic PRNG using blow fish encryption algorithm. The advantage of this method is that we can generate a random number of infinite length by using a 64 bit plain text and variable length key. In our method we are utilizing this PRNG in our server and mobile key generator side for generating JIT key. For our system we are utilizing the exponential property of RSA encryption algorithm. It is this property through which we are achieving the half encryption. In [3] improvements of RSA key generation are proposed through which we can achieve better security to our system. In [3] instead of two prime numbers we are utilizing three prime numbers for key generation which will further increase the complexity of factorization. 3. THE PROPOSED METHOD Fig -1: Abstract representation of proposed system The key logic in our system is in RSA half encryption. We achieve a high degree of security for information with help of this two factor encryption. Here the RSA algorithm is implemented in two stages, 1. In the client part the Intermediate text is encrypted using {Public key[receivers] minus Random number [at time t1]}. The Mobile agent generates the random number using synchronized time seed and Secret UID. 2. In the server part the half encrypted message is encrypted using the random number [at time t1] generated using the synchronized time seed by the server. The fully encrypted cipher text is stored in the server’s database for further use. The static key is the public key- private key pair of RSA and the dynamic factor is generated by the PRNG using time and secret User ID. The decryption process is also implemented in two stages of RSA, 1. In the server part half decryption is achieved using the random number [at time t2] generated using the synchronous time seed by the server. 2. In the client part the half decrypted data is again decrypted by using {Private key [receiver]-Random number [at time t2]} generated by the mobile agent having synchronous time seed. Our proposed system consists of several sub systems. These sub systems are discussed below, 3.1 Random Number Generator Fig -2: Crypto Based Pseudo Random Number Generator (CBSRNG) The random number generator used in our system is crypto based pseudo- random number generator[2] with blow fish algorithm. Here we are reconfiguring [2] according to our requirements. In our method we are using date and time together with a secret user id as the seed to the crypto based pseudo- random number generator (CBPRNG). Here the 64 bit date and time act as the plain text for encryption and secret user id(SUID) act as the key with variable size of 32-448 bits. The results provided by the CBPRNG were quiet promising. We are using this random number generator for both the mobile key generator and server. For generating same random number at both ends the seed should be same. The SUID is shared with the server by the mobile key generator at the time of registration. Then at the time of encryption the mobile key generator interact with the server and select a common time seed.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 13 3.2 RSA Key Generation & Encryption-Decryption Process For key generation we are using [3] in which they are using two prime number for key generation. But we are using three prime number for key generation which increases security of the system. Using [3] the complexity of factorization also increases. Fig -3: Functional diagram of proposed system 3.2.1 RSA Key Generation Steps: (a) Choose three distinct prime numbers p, q and s. (b) Find n such that n = p*q*s. n will be used as the modulus for both the public and private keys. (c) Find the Phi of n, ɸ (n) = (p-1)(q-1)(s-1). (d) Choose an e such that 1 < e < ɸ (n), and such that e and ɸ (n) share no Divisors other than 1 (e and ɸ (n) are relatively prime). e is kept as the public key exponent. (e) Determine d (using modular arithmetic) which satisfies the congruence relation .d*e ≡ 1 (mod ɸ (n)). 3.2.2 Encryption & Decryption The key idea in our system is half encryption/decryption for achieving the two factor encryption. It is achieved by utilizing the property of RSA encryption algorithm. The mathematical operation involved in RSA is exponential operation, Me (mod n) & Cd (mod n). The half encryption is possible in RSA due to properties of exponential and modular arithmetic. C=Me (mod n) ≡ (Me1 (mod n)) e2 ) mod n) ----------(1) M=Cd (mod n)≡( Cd1 (mod n)) d2 ) mod n) ----------(2) Where, e= e1+e2 (3) d=d1+d2 (4) In our method in the sender side e1 is the Receiver’s public key minus Random number(Ra) and e2 is Random number(Ra). ie, e= (Pu-Ra) + Ra = Pu. So in effect after the two half encryption the total process is equivalent to encryption with public key of receiver. Likewise in the receiver side d1 is the Receiver’s private key minus Random number(Rb) and d2 is Random number(Rb). ie, in effect d= (Pr-Rb) + Rb = Pr. So in effect after the two half decryption the total process is equivalent to decryption with private key of receiver. The system consists of four parts. They are, 1. Sender: The function of the sender is to perform half encryption using the part key(half encryption /decryption key generated in mobile key generator or server) and sending it to the server. 2. Mobile key generator: Mobile key generator generates the part key for encryption & decryption. For the part key generation process, it interacts with the server for date and time synchronization and by using this synchronized date and time and Secret user ID as the seed it generates the random number. By subtracting this random number from receiver’s public key it generates part key for encryption and by subtracting from receivers private key it generates the part key for decryption. The mobile key generator also generates the RSA key pair and enrolls the user with the system. The public key, user details & SUID is registered with the server at the time of enrollment process. 3 Server: The server performs half encryption and half decryption by using the random number generated using synchronized date and time and Secret user ID as seed. It also stores the full encrypted file for serving users request. 4 Receiver: The receiver requests the encrypted data from the server and performs the completion of decryption process by using the part key generated by the mobile key generator. 4. WORKING The system can be explained with the help of sample data used in the Fig-4.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 14 Fig -4: Working with Sample data. 4.1 Algorithm 4.1.1 Sender 1. The message for encryption is given as input into the RSA module. 2. The time synchronization module of the mobile agent interacts with the time synchronization module of the server and agrees upon a common time. The cryptographic PRNG in server and Mobile Agent generate a random number using time(T1) and Secret UID of sender as seed. 3. Encryption key for sender is generated by subtracting the random number produced by PRNG from the Public key of the receiver. The data is then half encrypted and send to the server. 4. The RSA encryption process is completed in the server using the random number as key and the result is stored in the database for future use. 4.1.2 Receiver 1. The receiver will request for the file along with a time synchronization request by the Mobile agent. 2. The data from the database will be half decrypted using the random number generated by PRNG using time(T2) and Secret UID of the receiver. This half decrypted data will be send to the receiver. 3. In the receiver side, the decryption is done using the key obtained by subtracting the random number from the private key of the receiver. 4. Finally, the plain message will be returned. In the Fig-4 the inputs and outputs along with the intermediate result are shown. For better understanding simple input is given. In the system we can see that the encrypted data in the insecure communication channel is different for the same message, minimizing the chances for external attack. 5. ANALYSIS In our proposed system, the hacker can access the file when it is being transmitted through the network. The data that is send to the server is not completely encrypted so the data won’t have the characteristic of RSA encryption. Also the same property exists for the sending process from the server. Here we can also see that the data send from the server to receiver and from the sender to server is entirely different. Also our method will provide authenticity and non repudiation as an inborn feature. Here the encryption key and decryption key will be generated only at the time of need so one time
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 01 | NC-WiCOMET-2014 | Mar-2014, Available @ http://www.ijret.org 15 compromise will not affect the security of key pair and the system. Our system will provide better security than the currently exiting system. One of the major disadvantages of our system is time and space complexity. 6. CONCLUSIONS Maintaining security is becoming more and more challenging with time. In the field of cryptography, static key encryption is currently used resulting in decrease of security with time. The current problem in the field of cryptography is the need for changing the encryption key or key pair periodically. It is essential in order to ensure confidentiality. In this paper we are proposing a new dynamic encryption method in which both encryption and decryption key change with respect to time. Here a mobile key generator is used to generate dynamically changing key. Our method will provide authenticity together with non repudiation as an inborn feature. In this paper we are proposing a new approach to the cryptographic world known as “Two Factor Cryptography”. Here both encryption and decryption key is generated only at the time of need generally known as Just in Time (JIT) key generation. Here this approach is possible due to the exponential feature of RSA method. Here the possibility of key compromise will reduce since the encryption key is different from decryption key and changes with time. Hence, in our proposed system the security is not compromised with time. REFERENCES [1]. Septimiu Fabian Mare, Mircea Vladutiu and Lucian Prodan,“Secret data communication system using Steganography, AES and RSA”,2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME). [2]. T.Chalama Reddy 1, Dr.R.Seshadri2,“New Design of Crypto- Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher”,International Journal on Computer Science and Engineering (IJCSE), Vol. 5 No. 06 Jun 2013. [3]. Prof.Dr.Alaa Hussein Al-Hamami and Ibrahem Abdallah Aldariseh, “Enhanced Method for RSA Cryptosystem Algorithm”, 2012 International Conference on Advanced Computer Science Applications and Technologies. BIOGRAPHIES Anntinu.T.J received his B.Tech in Computer Science & Engg from Calicut University, Kerala and currently pursuing M.Tech in Computer Science & Engg with specialization in Data Security from CUSAT, Kerala. His research interest are Data security, Network security, Image processing. Sherly K.K received her B.E degree in Electronics & Communication from Karnataka University, Dharwad and M.Tech degree in Information Technology from Punjabi University, Patiala in 1990 and 2004 respectively. Presently she is working as Head of Department of Information Technology at Toc H Institute of Science & Technology, Arakunnam .She has more than 20 years of academic experience. Her research interests are Network security, Knowledge Discovery in Databases, Distributed Database Systems and Parallel Processing.