Delay and disruption tolerant network (DTN) is used for long area communication in computer network, where there is no direct connection between the sender and receiver and there was no internet facility. Delay tolerant network generally perform store and forward techniques as a result intermediate node can view the message, the possible solution is using encryption techniques to protect the message. Starting stages of DTN RSA, DES, 3DES encryption algorithms are used but now a day’s attribute based encryption (ABE) techniques are used. Attribute based encryption technique can be classified in to two, key policy attribute based encryption (KPABE) and cipher policy attribute based encryption (CPABE). In this paper we perform a categorized survey on different encryption techniques presents in delay tolerant networks. This categorized survey is very helpful for researchers to propose modified encryption techniques. Finally the paper compares the performance and effectiveness of different encryption algorithms.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
NETWORK SECURITY
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for network security. 6 Hrs
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher. 7 Hrs
UNIT - 3
Principles of Public-Key Cryptosystems, The RSA algorithm, Key Management, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash Functions. 6 Hrs
UNIT - 4
Digital signatures, Authentication Protocols, Digital Signature Standard. 7 Hrs
UNIT - 5
Web Security Consideration, Security socket layer (SSL) and Transport layer security, Secure Electronic Transaction. 6 Hrs
UNIT - 6
Intruders, Intrusion Detection, Password Management. 6 Hrs
UNIT - 7
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures. 7 Hrs
UNIT - 8
Firewalls Design Principles, Trusted Systems. 6 Hrs
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for
network security.
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
NETWORK SECURITY
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for network security. 6 Hrs
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher. 7 Hrs
UNIT - 3
Principles of Public-Key Cryptosystems, The RSA algorithm, Key Management, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Authentication functions, Hash Functions. 6 Hrs
UNIT - 4
Digital signatures, Authentication Protocols, Digital Signature Standard. 7 Hrs
UNIT - 5
Web Security Consideration, Security socket layer (SSL) and Transport layer security, Secure Electronic Transaction. 6 Hrs
UNIT - 6
Intruders, Intrusion Detection, Password Management. 6 Hrs
UNIT - 7
MALICIOUS SOFTWARE: Viruses and Related Threats, Virus Countermeasures. 7 Hrs
UNIT - 8
Firewalls Design Principles, Trusted Systems. 6 Hrs
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for
network security.
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
This paper discuss various wireless networks and their security, for each type, structure and related threats are described and how different techniques are applied to achieve security goals starting by general case
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At
present, majority of the security protocols involve massive iterations and complex steps of
encryptions thereby giving rise to degradation of quality of service. Many WSN applications are
based on secure group communication. In this paper, we have proposed a scheme for secure
group key management with simultaneous multiple groups. The scheme uses a key-based
approach for managing the groups and we show that membership change events can be
handled with less storage, communication and computation cost. The scheme also offers
authentication to the messages communicated within and among the groups.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Introduction to Cyberspace and its Architecture, Evolution and Basic Concepts of Internet, Cyberspace, Internet Ownership and Management, Data Security and Management, Data Encryption and Digital Signature, Convergence. Internet Telephony
and VPN, Social Issues in the Regulation of Cyberspace, The Regulability of Cyberspace, UNCITRAL Model Law on Electronics Commerce 1996
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
This paper discuss various wireless networks and their security, for each type, structure and related threats are described and how different techniques are applied to achieve security goals starting by general case
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At
present, majority of the security protocols involve massive iterations and complex steps of
encryptions thereby giving rise to degradation of quality of service. Many WSN applications are
based on secure group communication. In this paper, we have proposed a scheme for secure
group key management with simultaneous multiple groups. The scheme uses a key-based
approach for managing the groups and we show that membership change events can be
handled with less storage, communication and computation cost. The scheme also offers
authentication to the messages communicated within and among the groups.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
Introduction to Cyberspace and its Architecture, Evolution and Basic Concepts of Internet, Cyberspace, Internet Ownership and Management, Data Security and Management, Data Encryption and Digital Signature, Convergence. Internet Telephony
and VPN, Social Issues in the Regulation of Cyberspace, The Regulability of Cyberspace, UNCITRAL Model Law on Electronics Commerce 1996
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
An authenticated key management scheme for securing big data environmentIJECEIAES
If data security issues in a big data environment are considered, then the distribution of keys, their management, and the ability to transfer them between server users in a public channel will be one of the most critical issues that must consider on. In which the importance of keys management may outweigh the importance of the encryption algorithm strength. Therefore, this paper raised a new proposed scheme called authenticated key management scheme (AKMS) that works through two levels of security. First, to concerns how the user communicates with the server with preventing any attempt to penetrate senders/receivers. Second, to make the data sent vague by encrypting it, and unreadable by others except for the concerned receiver, thus the server function be limited only as a passageway for communication between the sender and receiver. In the presented work some concepts discussed related to analysis and evaluation as keys security, data security, public channel transmission, and security isolation inquiry which demonstrated the rich value that AKMS scheme carried. As well, AKMS scheme achieved very satisfactory results about computation cost, communication cost, and storage overhead which proved that AKMS scheme is appropriate, secure, and practical to use and protect the user's private data in big data environments.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Significant features for steganography techniques using deoxyribonucleic acid...nooriasukmaningtyas
Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this willbe helpful.
Similar to 5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption tolerant network (20)
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption tolerant network
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-1, Jan- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 27
Survey on Encryption Techniques in Delay and
Disruption Tolerant Network
Akhil V.V1
, Jisha S.2
1
P.G Scholar, Department of CSE, Mohandas College of Engineering and Technology, Anad, Nedumangad, Kerala, India
2
Assistant Professor, Department of CSE, Mohandas College of Engineering and Technology, Anad, Nedumangad, Kerala,
India
Abstract— Delay and disruption tolerant network (DTN)
is used for long area communication in computer
network, where there is no direct connection between the
sender and receiver and there was no internet facility.
Delay tolerant network generally perform store and
forward techniques as a result intermediate node can
view the message, the possible solution is using
encryption techniques to protect the message. Starting
stages of DTN RSA, DES, 3DES encryption algorithms
are used but now a day’s attribute based encryption
(ABE) techniques are used. Attribute based encryption
technique can be classified in to two, key policy attribute
based encryption (KPABE) and cipher policy attribute
based encryption (CPABE). In this paper we perform a
categorized survey on different encryption techniques
presents in delay tolerant networks. This categorized
survey is very helpful for researchers to propose modified
encryption techniques. Finally the paper compares the
performance and effectiveness of different encryption
algorithms.
Keywords— Delay and disruption tolerant network
(DTN), attribute based encryption (ABE)
I. INTRODUCTION
Internet is a better medium to communicating different
devices in world wide. For transferring of message from
one device to other TCP/IP protocol place a major role.
TCP/IP protocol works based on certain assumptions,
they are
• End to end path between source and destination is
exist.
• All the routers and end stations support TCP/IP
protocol.
• End point based security mechanism is highly
secure.
• Retransmission based on timely and stable form.
For some situation these criteria’s may fail, for this
purpose introduces a new technology called DTN. DTN is
the better solution for following cases.
• If there is no end to end connection between source
and destination
• Long propagation delay between the nodes.
• Asymmetric data rate and high error rate etc.
DTN uses store and forward techniques for achieving the
above advantages. The store and forward technique
specify that whole messages or a piece of messages are
moved from a storage node to storage space of another
node as shown in Fig 1. Internet routers use memory
chips or internet buffers to store incoming packets. But
these techniques have very few millisecond storage
capacities. But DTN requires persistent storage because
• A communication link to the next hop may not be
available for a long time.
• User within a communicating pair may send or
receive data much faster or more reliably than the
other node.
• A message, once transmitted, may need to be
retransmitted if an error occurs
The store and forward technique uses new protocol called
bundle protocol. The bundle protocol stores information
as bundle and forward to adjacent node. The structure of
the bundle protocol is shown in Fig. 1.
The bundle layer in DTN protocol helps to
communicate application programs to same or different
set of lower layer protocols under the condition that long
network delays or disruption. The bundle protocol
generally contains three things, they are
• Bundle header.
• Source applications user data.
• Optional bundle trailer.
Bundle header contains one or more DTN blocks inserted
bundle agent. Source applications user data specifies how
to store the data, how to process the data, how to handle
the data and how to dispose the data. The optional bundle
trailer consisting of zero or more DTN block inserted
bundle agent.
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-1, Jan- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 28
Fig. 1: Architecture of store and forward technique.
Fig. 2: Comparison of Internet protocol and DTN
protocol.
Now a day’s DTN has several applications, DTN is
normally used in international space station
communication, military and intelligence, commercial
purpose like vehicle tracking, agriculture monitoring and
underground mining, engineering and scientific research,
environmental monitoring, public service and safety, and
personal use.
The rest of the paper is organized as follows. Section II
describes general attacks in DTN. General purpose
encryptions techniques are described in section III.
Section IV describes latest encryption techniques. In
section V, we are performing a comparison of the
discussed methods in section IV and section V concludes
the paper.
II. GENERAL ATTACKS IN DTN
DTN faces some serious attacks in some situations; these
attacks can be classified in to two. They are external
attacks and internal attacks. External attacks cause
congestion in routing and disturb node from providing
routing information. But internal attacks access the
network activities and destroy it with malicious attacks
such as email attack, phishing attack etc. We can
generally categorize attacks in communication network in
to two. They are attacks on routing protocol and attacks
on secret information. The second category is more
serious than the first. [1]
Attacks on secret information occurred in three different
types. They are attacks of content modification, worm
attacks, and lack of cooperation in mobile nodes. The
modification attacks modify the message and path and
hence message is forwarded to malicious nodes in the
network. As a result unauthorized users can access the
information and send the bundles in bulk size and rate. To
implement security some secret keys are provided for
authentication and access policies. However with the help
of this secret key plaintext is converted in to a cipher text.
The cipher text sends from sender to receiver. The
receiver can decrypt the cipher text with the help of this
secret key. For this purpose key is also sending from
sender to receiver. If an unauthorized person getting the
key he can decrypt the message. So the other challenging
attack is protection of these keys from a third party [2].
III. GENERAL PURPOSE ENCRYPTION
TECHNIQUES
Generally used encryption techniques can be classified in
to two types; they are symmetric key encryption and
asymmetric key encryption techniques. For symmetric
key encryption both encryption and decryption same keys
are used. It is secure if both keys are the same. The
message can be decrypted if the unauthorized person
knows the key. The problem here is management of keys,
transforming the keys securely i.e. not with the message.
Keys are generated before the message because it is
smaller than the message. Commonly used symmetric
algorithms are DES [3], AES [4], and IDEA [3] etc.
In asymmetric key encryption technique a pair of key is
used; one key for encrypting and other is for decrypting
the message. Bob want to send a piece of information to
Alice, Bob encrypting the message with the help of public
key of Alice and Alice can decrypt the message using its
own private key [5]. Hence the key management problem
can be overcome. Commonly used asymmetric key
algorithms are RSA [6], and ECC [7] etc. The Fig. 3
shows the general architecture of encryption technique
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-1, Jan- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 29
Fig. 3: General architecture of encryption technique.
IV. RECENT TREND IN ENCRYPTION
TECHNIQUES
a. Attribute Based Encryption
The recent encryption techniques present in DTN field is
attribute based encryption. Attribute based encryption is a
type of public key encryption. In the case of attribute
based encryption, secret key is used for performing
encryption and cipher text depends on user attribute such
as name, address, location, country etc. Decryption of the
message is possible only when set of attributes of the key
matches with attributes of cipher text. In this type of
systems multiple keys should only be able to access data
if at least one individual key grants access.
Attribute based encryption guaranty secure data transfer
in DTN [5] [8]. The main problem occurs in this area is if
some client modifies their key at some situation then
handling the key is a challenging task. Attribute based
encryption can be classified in to mainly two. They are
key policy attribute based encryption (KPABE) and
cipher policy attributes based encryption (CPABE).
KPABE is one of the secure data transfer mechanism.
Here the sender generates a cipher text with a set of
attributes or key provided by the key authority. Only the
key authority decides a policy for each user that
establishes which cipher texts he can decrypt and provide
the key to each user. Using these keys receiver can
decrypt it.
CPABE is another secure data transfer mechanism. The
architecture of CPABE is depicted in Fig. 4. In CPABE
the cipher text is encrypted with an access policy chosen
by a sender, but a key is simply produced with admiration
to an attributes set [5] [9]. CPABE is more suitable to
DTNs than KPABE because it enables encryptions such
as a leader to choose an access policy on attributes and to
encrypt private data under the access structure via
encrypting with the equivalent public keys or attributes.
Cipher text policy attribute-based encryption (CP-ABE) is
an assured cryptographic answer for the right to gain
entry control issues. In the case of decentralized DTN
CPABE is not that much suitable. Because handling key
escrow problem [1], key updating problem [10] and
handling light weight devices [11] [12] are very difficult.
As a result some modifications are applied to CPABE.
They are Privacy Preserving Constant CPABE
(PPCCPABE), a privacy-preserving decentralized
CPABE (PPDCPABE), adaptable cipher text-policy
attribute-based encryption (ACPABE), Cooperative
Cipher text Policy (CCPABE).
Fig. 4: Architecture of CPABE.
Zhibin Zhou et.al [13], propose a novel Privacy
Preserving Constant CPABE (PPCPABE) construction,
which enforces hidden access policies with wildcards and
incurs constant-size conjunctive headers, regardless of the
number of attributes. Each conjunctive cipher text header
only requires 2 bilinear group elements, which are
bounded by 100 bytes in total. The actual size of the
bilinear group depends on the chosen parameters for the
cryptosystem. Moreover, PPCPABE supports non-
monotonic data access control policy. This technique
significantly reduces the cipher text to a constant size
with any given number of attributes. Furthermore,
PPCPABE leverages a hidden policy construction such
that the recipients’ privacy is preserved efficiently. In the
same paper, a Constant Cipher text Policy Attribute
Based Encryption (PPCPABE) was proposed. Compared
with existing CPABE constructions, PPCPABE
significantly reduces the cipher text size from linear to
constant and supports expressive access policies. Thus,
PPCPABE can be used in many communication
constrained environments. Based on PPCPABE, authors
proposed an Attribute Based Broadcast Encryption
(PPABBE) scheme that attains information theoretical
minimal storage overhead. Thus, a storage restricted user
can easily pre-install all required key materials to perform
encryption and decryption. Through theoretical analysis
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-1, Jan- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 30
and simulation, they compared PPABBE with many
existing BE solutions and they showed that PPABBE
achieve better trade-offs between storage and
communication overhead.
Jinguang Han et.al [14] proposes a privacy-preserving
DCPABE (PPDCPABE) scheme where a central
authority is not required and each local authority can
work independently without any cooperation so that each
authority can dynamically join or leave the system. Each
communication party monitors a set of attributes and
issues secret keys to users accordingly. To resist the
collusion attacks, user’s secret keys are tied to his Global
identifier (GID). Especially, a user can obtain secret keys
for his attributes from multiple authorities without
knowing any information about his GID and attributes.
Therefore, PPDCPABE scheme can provide stronger
privacy protection compared to PPMAABE schemes
where only the GID is protected. The advantage of this
technique is to reduce the trust on the central authority
and protect user’s privacy; each authority can work
independently without any collaboration to initial the
system and issue secret keys to users. Furthermore, a user
can obtain secret keys from multiple authorities without
them knowing anything about his global identifier and
attributes.
Junzuo Lai et.al [15] proposes concrete adaptable
CPABE (ACPABE).They use Key Gen, Encrypt and
Decrypt algorithms as in a traditional CPABE Scheme.
Key gen algorithm takes inputs such as public parameter,
master’s secret key and set of attribute and produces the
output a private key corresponding to the input.
Encryption takes input message, access tree [15] and key
generated by KeyGen algorithm to produce the output
cipher text. The reverse operation performed in the
decryption side. It takes public parameters, private key,
and a cipher text associated with an access policy as
input. If the attributes satisfies the access tree, then the
algorithm will decrypt the cipher text and return a
message. Adaptable CPABE scheme also includes two
additional algorithms: Trapdoor Gen and Policy
Adaptive. The authority runs the algorithm Trapdoor Gen
to generate a trapdoor. Given the trapdoor, a proxy can
transform a cipher text under an access policy into
another cipher text of the same plaintext under any access
policy using the algorithm Policy Adaptive. In this work,
authors proposed yet another new variant of CPABE,
namely adaptable CP-ABE. Authors introduce a semi-
trusted party, called proxy, into the setting of CPABE.
Given a trapdoor, the proxy is entitled to transform a
cipher text under one access policy into cipher texts of the
same plaintext under any other access policies. The
proxy, however, learns nothing about the plaintext during
the process of transformation. In this technique CPABE
has many real world applications, such as handling policy
changes in CPABE encryption of cloud data and
outsourcing of CPABE encryption.
Fig. 5: Architecture of secure data retrieval in DTN
network.
Cooperative Cipher text Policy Attribute-Based
Encryption (CCPABE) technique proposed by Lyes
Touati et.al [16] focus on the encryption algorithm and
proposes a computation offloading scheme to reduce the
induced overhead at resource-constrained objects. The
main idea is to delegate the computation of
exponentiation to other trusted neighbor devices called
assistant nodes. When a resource-constrained device
wants to encrypt a message, it looks for trusted
unconstrained nodes in its neighborhood and it delegates
to them the costly operations. Hence, the burden due to
CP-ABE encryption primitive is displaced from resource-
constrained devices to unconstrained ones. The advantage
of this approach is that it exploits collaboration between
heterogeneous nodes and accomplishes safe and efficient
transmission. The Fig.5 shows the architecture of secure
data retrieval in DTN network. It consist of following
modules,
• Sender who wants to transfer a piece of
information.
• Key authorities whom are key generation centers
that generate the key for perform encryption
operation.
• Storage node which stores data from the sender
and pass to the corresponding users.
• Users a mobile node who want to access the data
[10].
V. DISCUSSION
Symmetric algorithms and asymmetric algorithms are not
suitable for DTN networks as a result attribute based
5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-1, Jan- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 31
encryption techniques are introduced. Key policy attribute
based encryption is one of the encryption techniques; here
key authority maintains the task of key exchange between
sender and receiver. As a result key escrow problems
occur and sender has no control to the key generation and
key distribution.
Another type of encryption technique used in DTN is
cipher policy attributes based encryption. Here the sender
has also got a contribution to key generation and receiver
contributes attributes for key generation. But CPABE is
not suitable for decentralized DTN and light weight
devices; as a result some modification is performed on the
CPABE. They are Privacy Preserving Constant CPABE
(PPCCPABE), a privacy-preserving decentralized
CPABE (PPDCPABE), adaptable cipher text-policy
attribute-based encryption (ACPABE), Cooperative
Cipher text Policy (CCPABE).
PPCPABE contains fixed size conjunctive headers which
reduces cipher text in to a constant size with any number
of attribute. We can simply say PPCPABE reduces cipher
text size in to constant. PPCPABE is the better solution to
avoid storage and communication overhead. PPDCPABE
scheme central authority is not required each authority
can work independently. PPDCPABE introduced GID to
achieve and distribute information. The main attraction of
this technique is reducing the trust on central authority
and protects user privacy. In the case of ACPABE a proxy
is created. The proxy transform message from one access
policy to any other access policy. ACPABE has
applications in the area of cloud data and outsourcing of
CPABE encryption. CCPABE scheme node wants to
transfer a message, it looks the neighbor nodes and
calculates its cost of operation then only the message pass
occurs. The main advantage of this technique is avoiding
collaboration between heterogeneous nodes and provides
safe and efficient transmission. The table I shows the
most suitable DTN encryption technique for required
DTN feature.
TABLE I
FEATURE WISE ENCRYPTION SOLUTION
Required Feature/
Network Type
DTN Encryption
Solution
Storage and
communication
PPCPABE
Protect users privacy
in decentralized
network
PPDCPABE
Bulk storage and
handling bulk data
ACPABE
Safe and efficient
transmission
CCPABE
VI. CONCLUSION
DTN technologies are becoming successful solution to
transfer information between different wireless nodes
without the presence of end to end connection and long
propagation delay. Now a day’s DTN contains several
applications in the area of space agencies, military and
intelligence, commercial purpose, public service and
safety, environmental monitoring and engineering and
scientific research etc. In the case of information transfer
occur in DTN, there is a compulsory need for encryption,
because it generally uses store and forward technique. As
a result several nodes will get access to the critical
information. In this paper we perform a survey on
different encryption technique used in DTN networks.
This survey shows that cipher policy attribute based
encryption is the comparatively better technique. But
some situations like decentralized DTN some
modifications are required on base algorithms which
guarantee better results.
REFERENCES
[1] Sonika Gandhi, A.N. Jaiswal,, “A Method for
Detecting Attacks on Delay Tolerant Network,”
International Journal of Advanced Computational
Engineering and Networking, Volume-2, Issue-6,
June-2014.
[2] Sarawagya Singh, Elayaraja.K, “A survey of
misbehaviors of node and routing attack in delay
tolerant network,” International Journal of Science,
Engineering and Technology Research, Volume 4,
Issue 2, February 2015.
[3] P. Eronen, Ed.Nokia, "DES and IDEA Cipher Suites
for Transport Layer Security (TLS)," RFC 5469,
February 2009.
[4] JH. Song, R. Poovendran, “The AES-CMAC
Algorithm," RFC 4493, June 2006.
[5] Dhiren Kumar Dalai, P. Elumalaivasan, Sreejith V.
P., “An analysis on attribute based encryption for
secure data retrieval in DTNs,” International Journal
of Advance Research In Science And Engineering,
Vol. No.4, Issue No.02, February 2015.
[6] J. Jonsson, B. Kaliski, "Public-Key Cryptography
Standards (PKCS) #1: RSA Cryptography
Specifications Version 2.1", RFC 3447, February
2003.
[7] S. Blake-Wilson, N. Bolyard, V. Gupta,"Elliptic
Curve Cryptography (ECC) Cipher Suites for
Transport Layer Security (TLS)," RFC 4492,May
2006
[8] SuvarnaPatil,Geetha R. Chillerge, “ Delay Tolerant
Networks – Survey Paper,” Int. Journal of
6. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-1, Jan- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 32
Engineering Research and Applications, Vol. 4,
Issue 2(Version 2), February 2014.
[9] K. Kalaiselvi and B.Kabilarasan “ Cipher Text-
Policy Attribute based Encryption for Secure Data
Retrieval in Disruption-Tolerant Military
Networks,” International Journal of Emerging
Technology in Computer Science & Electronics,,
volume 11 issue 3 –November 2014.
[10]Junbeom Hur and Kyungtae Kang, “Secure Data
Retrieval for Decentralized Disruption-Tolerant
Military Networks,” IEEE Transactions on
Networking vol:22 no:1 year 2014.
[11]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei
Wei,and Xiaodong Lin, “White-Box Traceable
Ciphertext-Policy Attribute-Based Encryption
Supporting Flexible Attributes,” IEEE Transactions
on Information Forensics and Security, vol. 10, no.
6, June 2015.
[12]Fuchun Guo, Yi Mu, Willy Susilo, Duncan S.
Wong, and Vijay Varadharajan, “CP-ABE With
Constant-Size Keys for Lightweight Devices,” IEEE
transactions on information forensics and security,
vol. 9, no. 5, May 2014.
[13]Zhibin Zhou and Dijiang Huang, “Efficient privacy-
preserving Ciphertext-policy attribute based-
encryption and broadcast encryption,” IEEE
Transactions on Computers, vol. 64, no. 1, January
2015.
[14]Jinguang Han, Willy Susilo, Yi Mu, Jianying
Zhou,,and Man Ho Allen Au, “Improving Privacy
and Security in Decentralized Ciphertext-Policy
Attribute-Based Encryption,” IEEE Transactions on
Information Forensics and Security, vol. 10, no. 3,
march 2015.
[15]Junzuo Lai, Robert H. Deng, Yanjiang Yang, and
Jian Weng “Adaptable Ciphertext-Policy Attribute-
Based Encryption,” Springer International
Publishing Switzerland 2014.
[16]Lyes Touati, Yacine Challal, Abdelmadjid
Bouabdallah “C-CP-ABE: Cooperative Ciphertext
Policy Attribute-Based Encryption for the Internet of
Things,” International Conference on Advanced
Networking, Distributed Systems and Applications,
2014, B_ejaia, Algeria. pp.64-69, 2014.