SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1345
ENHANCEMENT OF EFFICIANT DATA SECURITY ALGORITHM USING
COMBINED AES AND RAIL FENCE TECHNIQUES
Khadidja NYIRANSABIMANA1, NKUBITO Sergem2, Dr. Papias NIYIGENA3
1UNIVERSITY OF LAY OF ADVENTISTE OF KIGALI (UNILAK)
2FACULTY OF COMPUTING AND INFORMATION SCIENCES
3MASTERS OF SCIENCES IN INFORMATION AND TECHNOLOGY, RWANDA
---------------------------------------------------------------------------***---------------------------------------------------------------------------
ABSTRACT - Cryptography is the security science that allows researcher to improve the confusion of the complex algorithm
for the plain text encryption and cipher decryption in order to increase the security rate all over the world. Rail fence
techniques are simple methods used to encrypt the plain text and decrypt the cipher text. Objective of this study is to encrypt
and to decrypt using the new algorithm by combining the rail fence techniques with AES. The general purpose of this research
is to improving the complexity cipher Security.
Key terms: Aes, Cryptography, cipher text, Decryption, Encryption, Plain text, Rail Fence, Security.
I. INTRODUCTION
With the growth of internet hackers and spies make big issue for security. Many people use internet like online shopping,
money transfer from bank account, etc while hackers and spiers use also the internet. It is difficult to distinguish hackers from
normal clients. This makes the security of data to be strongly protected during data transmission and transactions. This
requires highest degree of understanding the security. Since this information is sensitive, we don’t like it to reach the
unauthorized persons. This study makes more complex the efficient data security combined AES and Rail fence techniques
and to allow people who have the decryption algorithm, are the only one able to decrypt the cipher into the readable message.
Encryption is the process of encoding the message to be sent to the recipient in order to hide the content (wikipedia, 2019). To
make the message doubtful, we have to use transposition techniques to encrypt the plain text and to decrypt the cipher. The
plain text is the original message to be sent to the recipient and the cipher is encoded message. The Rail fence cipher is a form
that referred as zigzag cipher and transposition cipher is a form of rectangular table. This enhancement of data security
algorithm consists encrypting the plain text once by dividing the cipher into different sections and permutation of those
sections depending on the row boundaries this how the cipher text is obtained. This new algorithm has been proposed to
increase the complication of the cipher text without the time complication of the encryption algorithm.
II. METHODOLOGY
The proposed algorithm is used for the encryption and decryption of data by providing New Rail fence Algorithm which is
more confused than the first one.
CASE1:
The given plain text: I like to study
Its encryption by rail fence with row boundary 2, is:
1 2 3 4 5 6 7 8 9 10 11 12
R1 I I E O T D
R2 L K T S U Y
FIGURE1.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1346
The cipher text is: IIEOTDLKTSUY
By knowing the row boundary we can make this NEW table:
Step 1: simple transposition
1 2 1 2 1 2 1 2 1 2 1 2
I L I K E T O S T U D Y
FIGURE2.
The cipher is obtained by writing down the letters containing the same number starting from right to left:
Simple Cipher is: IIEOTDLKTSUY
Step 2: double transposition
The new plain text become: IIEOTDLKTSUY
1 2 1 2 1 2 1 2 1 2 1 2
I I E O T D L K T S U Y
FIGURE 3
Double cipher: IETLTUIODKSY
Step 3: Triple transposition
The new plain text become: IETLTUIODKSY
1 2 1 2 1 2 1 2 1 2 1 2
I E T L T U I O D K S Y
FIGURE 4
The triple cipher = final cipher =ITTIDSELUOKY
The decryption is:
Because of the row boundary were 2, the total number of letters composed the cipher text is 12(nCT), nCT divide by 2 equal to
6,
We are going to divide the cipher text into sections of 6 letters from right to left.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1347
CT= ITTIDSELUOKY
Xi Yi
∑ ( )
PT = X1 Y1 X2 Y2 X3 Y3
PT1= IETLTUIODKSY
Xi Yi
PT2=IIEOTD LKTSUY
Xi Yi
PT= ILIKETOSTUDY
CASE 2:
Let consider also the row boundary is 3:
1 2 3 1 2 3 1 2 3 1 2 3
I L I K E T O S T U D Y
FIGURE5.
The cipher is: IKOULESDITTY
1 2 3 1 2 3 1 2 3 1 2 3
I K O U L E S D I T T Y
FIGURE 6.
The cipher is: IUSTKLDTOEIY
1 2 3 1 2 3 1 2 3 1 2 3
I U S T K L D T O E I Y
The cipher is: ITDEUKTISLOY
The decryption is:
Because of the row boundary were 3, the total number of letters composed the cipher text is 12(nCT), nCT divide by 3 equal to
4.
We are going to divide the cipher text into sections of 4 letters from right to left.
PT1= ITDE UKTI SLOY
Xi Yi Zi
∑( )
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1348
Aglorithm for encryption
1. Start
2. The plain text(PT) without space
3. Row boundary number(nR)
4. write down the plaintext in a numbered table with the index corresponding exactly to nR
5. write down letters with same number
6. reverse letters
7. write down the cipher text(Ct)
8. end
Algorithm for decryption
1. Start
2. Number of Given cipher text(nCT)
3. Number of given row boundary(nR)
4. If nCT is multiple of nR
5. S= nCT/nR
6. Split CT into sections of S letters
7. write down the cipher text in a numbered table with the index corresponding exactly to nR
8. permit the strings of cipher text
9. Else
10. Add x,y or z to CT until nCT is multiple of nR
11. Go to 5
12. Reconstruct the plain text
13. Write the plaintext
Flow charts
1. For encryption
start
Numbered the plain
text i=1,…,+∞
Plain text (PT) without
space
number of rows(nR)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1349
2. For decryption
no
yes
Group together springs
with same index i
Cipher text
End
start
CT, nR
If CT is
multip
le of
nR
S=CT/nR
Split CT into section
of s letters
Add to CT (x or y
or z) until CT is
multiple of nR
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1350
Substitution cipher is a method of encoding by which units of plaintext are replaced with cipher text, according to a regular
system; the "units" may be single letters (the most common), as Rail fence Cipher is not very well-built; The integer of practical
keys is tiny sufficient that a cryptanalyst can attempt them all by hand and simply allows reversing of characters in plain text
to form the cipher text, it offers essentially no communication security and will be shown that it can be easily broken. (Dar,
Humanizing the Security of Rail Fence Cipher, 2012), (Godara, An Improved Algorithmic Implementation of Rail Fence Cipher,
2018) He converted given plain text into Rail Fence cipher text by generating the permutation of the plain text. The outer loop
of the algorithm chooses the rail number, starting from 1 and the inner loop puts letters into cipher and computes the place of
letter of the letter which will be the subsequent letter in the Rail chosen by outer loop, until all the letters in that Rail gets
written out. (Singh, 2012), He find out the algorithm by combined Caesar and Rail fence techniques with stack by using PUSH
and POP, this algorithm was difficult to implement. (M.Lavanya, 2018) Improved data security by combining AES with Rail
Fence techniques. The key generation was carried out by hybrid cipher which is the combination of public key and symmetric
key cryptosystem; it was harder to decode the cipher. (Dar, Humanizing the Security of Rail Fence Cipher, 2012)) improved
the algorithm security of Rail fence cipher using double transposition and substitution, this algorithm was difficult to
implement and use two keys than.
IV. CONCLUSION
Along this paper I have showing how to improve the security data security combining AES (Advanced encryption standard)
and Rail fence techniques in order to make it more secured and strong than the first. Future scope need to focus on more
research to boost the security of substitution techniques.
BIBLIOGRAPHY
1. Dar, J. A. (2012). Humanizing the Security of Rail Fence Cipher. International Journal of Science and Research (IJSR) ,
2319-7064.
2. Dar, J. A. (2012). Humanizing the Security of Rail Fence Cipher. International Journal of Science and Research (IJSR), 2.
3. Dar, J. A. (2012)). Humanizing the Security of Rail Fence Cipher. International Journal of Science and Research (IJSR) ,
2319-7064.
String permutation
Reconstruct the plain
text
Plain text(PT)
End
III. RETERATURE REVIEW
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1351
4. Godara, S. (2018). An Improved Algorithmic Implementation of Rail Fence Cipher. International Journal of Future
Generation Communication and Networking, pp.23-32. Retrieved from
https://pdfs.semanticscholar.org/9d0e/3bd3f1cb881465cd04e3279b3bcc2ed0f1af.pdf
5. Godara, S. (2018). An Improved Algorithmic Implementation of Rail Fence Cipher. International Journal of Future
Generation Communication and Networking, pp.23-32.
6. M.Lavanya. (2018). EFFICIENT DATA SECURITY ALGORITHM USING COMBINED AES AND. International Journal of
Pure and Applied Mathematics, 3219-3227.
7. Siahaan, A. P. (2016). "Vernam Conjugated Manipulation of Bit-Plane. Medan: in ICEST.
8. Siahaan, A. P. (2016). Dynamic Key Matrix of Hill Cipher Using Genetic. Senapati: Bali.
9. Siahaan, A. P. (2016). Rail Fence Cryptography in Securing Information. International Journal of Scientific &
Engineering Research, Volume 7, Issue 7, 2229-5518.
10. Siahaan, A. P. (RC4 Technique in Visual Cryptography). RC4 Technique in Visual Cryptography. International Journal of
Computer Science and Engineering, vol. 3,, pp. 1-5.
11. Singh, A. (2012). Implementation of Caesar Cipher with Rail Fence for. International Journal of Advanced Research in,
pp. 78-82.
12. U, B. O. (2016). Three-Pass Protocol. IOSR, vol. 18, no. 4.
13. wikipedia. (2019, september 20). The free encyclopedia. Retrieved 2019, from Encryption:
https://en.wikipedia.org/wiki/Encryption
14. Y. RANGEL-ROMERO, R. V.-G.-M.-C. (2008). Comments on “How to repair the Hill cipher”. Journal of Zhejiang University
SCIENCE A, pp 211–214.

More Related Content

What's hot

Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
IAEME Publication
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 

What's hot (20)

Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
Final report
Final reportFinal report
Final report
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 
32 9139 it rtl modelling for the cipher blcok ((edit lafi)
32 9139 it   rtl modelling for the cipher blcok ((edit lafi)32 9139 it   rtl modelling for the cipher blcok ((edit lafi)
32 9139 it rtl modelling for the cipher blcok ((edit lafi)
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
G04701051058
G04701051058G04701051058
G04701051058
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Rc6 algorithm
Rc6 algorithmRc6 algorithm
Rc6 algorithm
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 

Similar to IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES and Rail Fence Techniques

Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
CSITiaesprime
 

Similar to IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES and Rail Fence Techniques (20)

Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...Improved authenticated elliptic curve cryptography scheme for resource starve...
Improved authenticated elliptic curve cryptography scheme for resource starve...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded SecurityDesign of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...A secure image steganography based on burrows wheeler transform and dynamic b...
A secure image steganography based on burrows wheeler transform and dynamic b...
 
W4301117121
W4301117121W4301117121
W4301117121
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

IRJET- Enhancement of Efficiant Data Security Algorithm using Combined AES and Rail Fence Techniques

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1345 ENHANCEMENT OF EFFICIANT DATA SECURITY ALGORITHM USING COMBINED AES AND RAIL FENCE TECHNIQUES Khadidja NYIRANSABIMANA1, NKUBITO Sergem2, Dr. Papias NIYIGENA3 1UNIVERSITY OF LAY OF ADVENTISTE OF KIGALI (UNILAK) 2FACULTY OF COMPUTING AND INFORMATION SCIENCES 3MASTERS OF SCIENCES IN INFORMATION AND TECHNOLOGY, RWANDA ---------------------------------------------------------------------------***--------------------------------------------------------------------------- ABSTRACT - Cryptography is the security science that allows researcher to improve the confusion of the complex algorithm for the plain text encryption and cipher decryption in order to increase the security rate all over the world. Rail fence techniques are simple methods used to encrypt the plain text and decrypt the cipher text. Objective of this study is to encrypt and to decrypt using the new algorithm by combining the rail fence techniques with AES. The general purpose of this research is to improving the complexity cipher Security. Key terms: Aes, Cryptography, cipher text, Decryption, Encryption, Plain text, Rail Fence, Security. I. INTRODUCTION With the growth of internet hackers and spies make big issue for security. Many people use internet like online shopping, money transfer from bank account, etc while hackers and spiers use also the internet. It is difficult to distinguish hackers from normal clients. This makes the security of data to be strongly protected during data transmission and transactions. This requires highest degree of understanding the security. Since this information is sensitive, we don’t like it to reach the unauthorized persons. This study makes more complex the efficient data security combined AES and Rail fence techniques and to allow people who have the decryption algorithm, are the only one able to decrypt the cipher into the readable message. Encryption is the process of encoding the message to be sent to the recipient in order to hide the content (wikipedia, 2019). To make the message doubtful, we have to use transposition techniques to encrypt the plain text and to decrypt the cipher. The plain text is the original message to be sent to the recipient and the cipher is encoded message. The Rail fence cipher is a form that referred as zigzag cipher and transposition cipher is a form of rectangular table. This enhancement of data security algorithm consists encrypting the plain text once by dividing the cipher into different sections and permutation of those sections depending on the row boundaries this how the cipher text is obtained. This new algorithm has been proposed to increase the complication of the cipher text without the time complication of the encryption algorithm. II. METHODOLOGY The proposed algorithm is used for the encryption and decryption of data by providing New Rail fence Algorithm which is more confused than the first one. CASE1: The given plain text: I like to study Its encryption by rail fence with row boundary 2, is: 1 2 3 4 5 6 7 8 9 10 11 12 R1 I I E O T D R2 L K T S U Y FIGURE1.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1346 The cipher text is: IIEOTDLKTSUY By knowing the row boundary we can make this NEW table: Step 1: simple transposition 1 2 1 2 1 2 1 2 1 2 1 2 I L I K E T O S T U D Y FIGURE2. The cipher is obtained by writing down the letters containing the same number starting from right to left: Simple Cipher is: IIEOTDLKTSUY Step 2: double transposition The new plain text become: IIEOTDLKTSUY 1 2 1 2 1 2 1 2 1 2 1 2 I I E O T D L K T S U Y FIGURE 3 Double cipher: IETLTUIODKSY Step 3: Triple transposition The new plain text become: IETLTUIODKSY 1 2 1 2 1 2 1 2 1 2 1 2 I E T L T U I O D K S Y FIGURE 4 The triple cipher = final cipher =ITTIDSELUOKY The decryption is: Because of the row boundary were 2, the total number of letters composed the cipher text is 12(nCT), nCT divide by 2 equal to 6, We are going to divide the cipher text into sections of 6 letters from right to left.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1347 CT= ITTIDSELUOKY Xi Yi ∑ ( ) PT = X1 Y1 X2 Y2 X3 Y3 PT1= IETLTUIODKSY Xi Yi PT2=IIEOTD LKTSUY Xi Yi PT= ILIKETOSTUDY CASE 2: Let consider also the row boundary is 3: 1 2 3 1 2 3 1 2 3 1 2 3 I L I K E T O S T U D Y FIGURE5. The cipher is: IKOULESDITTY 1 2 3 1 2 3 1 2 3 1 2 3 I K O U L E S D I T T Y FIGURE 6. The cipher is: IUSTKLDTOEIY 1 2 3 1 2 3 1 2 3 1 2 3 I U S T K L D T O E I Y The cipher is: ITDEUKTISLOY The decryption is: Because of the row boundary were 3, the total number of letters composed the cipher text is 12(nCT), nCT divide by 3 equal to 4. We are going to divide the cipher text into sections of 4 letters from right to left. PT1= ITDE UKTI SLOY Xi Yi Zi ∑( )
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1348 Aglorithm for encryption 1. Start 2. The plain text(PT) without space 3. Row boundary number(nR) 4. write down the plaintext in a numbered table with the index corresponding exactly to nR 5. write down letters with same number 6. reverse letters 7. write down the cipher text(Ct) 8. end Algorithm for decryption 1. Start 2. Number of Given cipher text(nCT) 3. Number of given row boundary(nR) 4. If nCT is multiple of nR 5. S= nCT/nR 6. Split CT into sections of S letters 7. write down the cipher text in a numbered table with the index corresponding exactly to nR 8. permit the strings of cipher text 9. Else 10. Add x,y or z to CT until nCT is multiple of nR 11. Go to 5 12. Reconstruct the plain text 13. Write the plaintext Flow charts 1. For encryption start Numbered the plain text i=1,…,+∞ Plain text (PT) without space number of rows(nR)
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1349 2. For decryption no yes Group together springs with same index i Cipher text End start CT, nR If CT is multip le of nR S=CT/nR Split CT into section of s letters Add to CT (x or y or z) until CT is multiple of nR
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1350 Substitution cipher is a method of encoding by which units of plaintext are replaced with cipher text, according to a regular system; the "units" may be single letters (the most common), as Rail fence Cipher is not very well-built; The integer of practical keys is tiny sufficient that a cryptanalyst can attempt them all by hand and simply allows reversing of characters in plain text to form the cipher text, it offers essentially no communication security and will be shown that it can be easily broken. (Dar, Humanizing the Security of Rail Fence Cipher, 2012), (Godara, An Improved Algorithmic Implementation of Rail Fence Cipher, 2018) He converted given plain text into Rail Fence cipher text by generating the permutation of the plain text. The outer loop of the algorithm chooses the rail number, starting from 1 and the inner loop puts letters into cipher and computes the place of letter of the letter which will be the subsequent letter in the Rail chosen by outer loop, until all the letters in that Rail gets written out. (Singh, 2012), He find out the algorithm by combined Caesar and Rail fence techniques with stack by using PUSH and POP, this algorithm was difficult to implement. (M.Lavanya, 2018) Improved data security by combining AES with Rail Fence techniques. The key generation was carried out by hybrid cipher which is the combination of public key and symmetric key cryptosystem; it was harder to decode the cipher. (Dar, Humanizing the Security of Rail Fence Cipher, 2012)) improved the algorithm security of Rail fence cipher using double transposition and substitution, this algorithm was difficult to implement and use two keys than. IV. CONCLUSION Along this paper I have showing how to improve the security data security combining AES (Advanced encryption standard) and Rail fence techniques in order to make it more secured and strong than the first. Future scope need to focus on more research to boost the security of substitution techniques. BIBLIOGRAPHY 1. Dar, J. A. (2012). Humanizing the Security of Rail Fence Cipher. International Journal of Science and Research (IJSR) , 2319-7064. 2. Dar, J. A. (2012). Humanizing the Security of Rail Fence Cipher. International Journal of Science and Research (IJSR), 2. 3. Dar, J. A. (2012)). Humanizing the Security of Rail Fence Cipher. International Journal of Science and Research (IJSR) , 2319-7064. String permutation Reconstruct the plain text Plain text(PT) End III. RETERATURE REVIEW
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1351 4. Godara, S. (2018). An Improved Algorithmic Implementation of Rail Fence Cipher. International Journal of Future Generation Communication and Networking, pp.23-32. Retrieved from https://pdfs.semanticscholar.org/9d0e/3bd3f1cb881465cd04e3279b3bcc2ed0f1af.pdf 5. Godara, S. (2018). An Improved Algorithmic Implementation of Rail Fence Cipher. International Journal of Future Generation Communication and Networking, pp.23-32. 6. M.Lavanya. (2018). EFFICIENT DATA SECURITY ALGORITHM USING COMBINED AES AND. International Journal of Pure and Applied Mathematics, 3219-3227. 7. Siahaan, A. P. (2016). "Vernam Conjugated Manipulation of Bit-Plane. Medan: in ICEST. 8. Siahaan, A. P. (2016). Dynamic Key Matrix of Hill Cipher Using Genetic. Senapati: Bali. 9. Siahaan, A. P. (2016). Rail Fence Cryptography in Securing Information. International Journal of Scientific & Engineering Research, Volume 7, Issue 7, 2229-5518. 10. Siahaan, A. P. (RC4 Technique in Visual Cryptography). RC4 Technique in Visual Cryptography. International Journal of Computer Science and Engineering, vol. 3,, pp. 1-5. 11. Singh, A. (2012). Implementation of Caesar Cipher with Rail Fence for. International Journal of Advanced Research in, pp. 78-82. 12. U, B. O. (2016). Three-Pass Protocol. IOSR, vol. 18, no. 4. 13. wikipedia. (2019, september 20). The free encyclopedia. Retrieved 2019, from Encryption: https://en.wikipedia.org/wiki/Encryption 14. Y. RANGEL-ROMERO, R. V.-G.-M.-C. (2008). Comments on “How to repair the Hill cipher”. Journal of Zhejiang University SCIENCE A, pp 211–214.