SlideShare a Scribd company logo
‘Siribhūvalaya’: A Unique Scripture crafted
with Modern Cryptography Constituents
by
Er. Anil Kumar Jain
FIETE, FIE(I), SMCSI, LM-ISCA
email: jain.anilk@gmail.com
web-site: siri-bhoovalaya.org
Virtual Symposium on Jainism and Mathematics
Dec. 12 to Dec. 14, 2020
Main Objectives of this Presentation
1. To reveal that Cryptographic mechanisms devised by Acārya
Kumudēndu about 1200 years ago are strikingly similar to ones
used in modern Information Security applications.
2. To convey in modern mathematical expressions the underlying
premise of the cryptographic Writing System (Anka-Lipi) as
conceived by Acārya Kumudēndu. This is labeled as Kumudēndu
Encryption System (KES) by this author.
3. To present rudiments of KES (Kumudēndu Encryption System) in
modern terminology of Information Security and to corroborate
its potential in present scenario.
siri-bhoovalaya.org
Siribhūvalaya by Ācārya Kumudēndu
• Siribhūvalaya was scripted by Ācārya Kumudēndu during 8th
century AD in the state of in Karnataka, India.
• Ācārya Kumudēndu devised an exclusive ‘Writing System’ for
this unique creation which was based on universal script of
numerals only. [Anka-Lipi]
• Herein one Cakra or a page contained only integer numbers
arranged in a square matrix of dimension 27.
• Integer, in each of the cells of the matrix in the range of 1 to
64, represented one of the 64 Mūla Varṇas or basic phonetic
alphabets as enumerated in texts of earlier Ācāryas in lineage
to which Ācārya Kumudēndu belonged to.
• It is claimed to be the largest scripture in the world (only one
out of total of nine Khaṇḍas is available in public domain).
siri-bhoovalaya.org
Siribhūvalaya manuscript at National Archives of India
[One CAKRA ( 27x27 matrix) with numerals in Kannaḍa script]
siri-bhoovalaya.org
siri-bhoovalaya.org
Symmetric Cipher Model by Claude E. Shannon
(Father of Modern Information Theory)
C. E. Shannon: “Communication Theory of Secrecy Systems” : Bell Systems Technical
Journal, Vol. 28, pp. 656–715, 1948.
Earlier version of this research was presented in the classified report : “A Mathematical
Theory of Cryptography”: Memorandum MM 45-110-02, Sept. 1, 1945, Bell Laboratories.
Kumudēndu Encryption System
(KES)
siri-bhoovalaya.org
Schematic of Kumudēndu Encryption System
.
Basic Building Blocks of KES framework
siri-bhoovalaya.org
KES (Kumudēndu Encryption System) framework, as deployed in Siribhūvalaya,
consists of two symmetric encryption ciphers and an Integrity check mechanism :
Mono Alphabetic Substitution Cipher : Here Key is identified as ‘Kumudendu Code
Table’ (KCT). Here each of phonetic alphabet or Mūla Varṇa of the target script is
assigned an integer numeric value in range 1 to 64.
Transposition Cipher : Here key is named as ‘Bandha Traversal Path Matrix’ (BTPM).
It is a matrix of 27x27 integers or a vector of 729 integers. Herein each element is a
distinct integer in the range 1 to 729, and which is indicative of place of the
transposed phonetic alphabets in corresponding Cakra matrix (27x27).
Transposition Cipher has two variants – Cakra-Bandha and Navmānk Bandha ,
wherein BTPM operates over whole of 27x27 matrix or 9x9 sub-matrices of the
Cakra respectively.
Integrity Check : To ensure accuracy and consistency of content in Siribhūvalaya, at
the end of each Adhyaya there is mention of total number of phonetic alphabets in
basic decoded and derived text of the Adhyaya. This ensures that there is no
addition, deletion or modification of Cakras consisting the Adhyaya.
Substitution Cipher Key (KCT) for Devanāgarī, Kannaḍa
and Brāhmī scripts
कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर
siri-bhoovalaya.org
Mathematical Representation of Decryption
Mechanism (Transposition) – [Step-1]
siri-bhoovalaya.org
Transformation function (matrix to vector conversion function) i.e. ‘nvfunc’ converts
CAKRA matrix into NVECTOR by implementation of a method called ‘locate’ which has
got two arguments viz. BTPM and an integer variable ‘p’ in the range from 1 to 729.
Mathematical Representation of Decryption
Mechanism (Transposition) in Cakra 1-1-1 – [Step-2 ]
siri-bhoovalaya.org
Value of p 1 2 3 4 5 6 7 8
(x,y) in BTPM 1,14 27,15 26,16 25,17 24,18 23,19 22,20 21,21
cxy in CAKRA 1 58 38 1 52 1 60 2
Mathematical Representation of Decryption
Mechanism (Substitution) – [Step-3]
siri-bhoovalaya.org
Mathematical Representation of Decryption
Mechanism (Substitution & Assimilation) – [Step-4 ]
siri-bhoovalaya.org
Resultant text after conjoining phonetic alphabets or Mūla Varṇas into words,
phrases and verses results in following:
अष्ट महाप्रातिहार्य वय्भवदिन्ि | अष्ट गुणन्गळौल् ओोम्िं ||
स्र्ष्ष्टगे मन्गळ पर्ायर्दितिि | अष्टम स्र्षििगेर गुवेिु ||1||
This is the first verse of first Khaṇḍa i.e. ṁagala Prābhr̥ta of Siribhūvalaya.
Robustness of KES against Brute Force Attacks
siri-bhoovalaya.org
Depending on the security requirements, the substitution table can be altered in
size and assignment of integers. Thus even with 64 element KCT, there are
possible Factorial (64) permutations resulting in a number with 89 digits.
Size of Transposition key can be adjusted to thwart anticipated brute-force
attacks. Preliminary estimations reveal that possible Transposition schemes of
729 elements, of 27x27 matrix as deployed in “Siribhūvalaya”, amount to
Factorial (729) permutations and that results in massive number of approximately
1772 digits. That means a brute-force attacker will have to find correct
Transposition Key out of so many possible ones. This will require massive
computational resources which is very highly impractical in contemporary
scenario.
Current cryptographic standards of symmetric key encryption recommend key
length of 256 bits, wherein possible key combinations are of the order 78 digits
only for a brute-force attack.
KES in present Scenario
siri-bhoovalaya.org
KES is inherently suitable for applications on variety of platforms which use
Indian Languages and Scripts.
With its variable length dual key symmetric encryption scheme it can be
customised for Information Security requirements of wide-range of systems
and applications.
Since it requires small computational overhead, KES can efficiently be deployed
on systems with nominal computing resources. Even in absence of computing
machines, KES can be implemented with manual operations only. That is how
Acārya Kumudēndu encrypted Siribhūvalaya in 8th century and later in 20th
century Pandit Yellappa Shastri was able to decrypt it manually.
In addition to KES there are other Cryptographic mechanisms very creatively
integrated in Siribhūvalaya. These are termed in modern terminology as Visual
Cryptography (Citra Bandha) and Steganography (Antara Sāhitya).

More Related Content

What's hot

ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH CiphersChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
AdaLabs
 
Development and Dose Modification of Ayurvedic Formulations
Development and Dose Modification of Ayurvedic FormulationsDevelopment and Dose Modification of Ayurvedic Formulations
Development and Dose Modification of Ayurvedic Formulations
Shri Shivayogeeshwar Rural Ayurvedic Medical college, INCHAL,
 
Cryptanalysis by savyasachi
Cryptanalysis by savyasachiCryptanalysis by savyasachi
Cryptanalysis by savyasachi
Savyasachi14
 
Parada Yaugika Dosha
Parada Yaugika DoshaParada Yaugika Dosha
Parada Yaugika Dosha
devayu
 
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASE
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASEIMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASE
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASE
DR AJITH KUMAR
 
حلول تمارين الكتاب المدرسى جبر للصف الثالث الثانوى
  حلول تمارين الكتاب المدرسى  جبر للصف الثالث الثانوى  حلول تمارين الكتاب المدرسى  جبر للصف الثالث الثانوى
حلول تمارين الكتاب المدرسى جبر للصف الثالث الثانوى
أمنية وجدى
 
Chaitanya mahaprabhu's advent predictions from various vedic
Chaitanya mahaprabhu's advent predictions from various vedicChaitanya mahaprabhu's advent predictions from various vedic
Chaitanya mahaprabhu's advent predictions from various vedic
Deepak Kumar
 
Karthika maas
Karthika maasKarthika maas
Karthika maas
ganeshn0
 
Buya hamka berbicara tentang perempuan
Buya hamka berbicara tentang perempuanBuya hamka berbicara tentang perempuan
Buya hamka berbicara tentang perempuan
alfunlailatulqdr
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne
 
Role of agni in womens health and disease
Role of agni in womens health and diseaseRole of agni in womens health and disease
Role of agni in womens health and disease
Rajalekshmi Asish
 
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGT
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGTPPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGT
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGT
sibaprasad Rout
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
kinleay
 
뉴스 엔 올디스 - 연금술 1 (전혜정)
뉴스 엔 올디스 - 연금술 1 (전혜정)뉴스 엔 올디스 - 연금술 1 (전혜정)
뉴스 엔 올디스 - 연금술 1 (전혜정)
sciencepeople
 
Nasya.pptx
Nasya.pptxNasya.pptx
Nasya.pptx
Dr. Prabhakar Manu
 
Vedic astrology for_better_health
Vedic astrology for_better_health Vedic astrology for_better_health
Vedic astrology for_better_health
Bhaskar Naidu
 
Vishopavisha in Ayurveda
Vishopavisha in AyurvedaVishopavisha in Ayurveda
Vishopavisha in Ayurveda
ananyakadambini1
 
RASA Vargeekarana.pptx
RASA Vargeekarana.pptxRASA Vargeekarana.pptx
RASA Vargeekarana.pptx
Saranya Sasi
 
Relevance of poorvakarma in shodhana.pptx
Relevance of poorvakarma in shodhana.pptxRelevance of poorvakarma in shodhana.pptx
Relevance of poorvakarma in shodhana.pptx
e-MAP
 
Vaikranta
VaikrantaVaikranta

What's hot (20)

ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH CiphersChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
ChaCha20-Poly1305 Cipher Summary - AdaLabs SPARKAda OpenSSH Ciphers
 
Development and Dose Modification of Ayurvedic Formulations
Development and Dose Modification of Ayurvedic FormulationsDevelopment and Dose Modification of Ayurvedic Formulations
Development and Dose Modification of Ayurvedic Formulations
 
Cryptanalysis by savyasachi
Cryptanalysis by savyasachiCryptanalysis by savyasachi
Cryptanalysis by savyasachi
 
Parada Yaugika Dosha
Parada Yaugika DoshaParada Yaugika Dosha
Parada Yaugika Dosha
 
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASE
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASEIMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASE
IMPORTANCE OF RASOUSHADI IN THE MANAGEMENT OF SKIN DISEASE
 
حلول تمارين الكتاب المدرسى جبر للصف الثالث الثانوى
  حلول تمارين الكتاب المدرسى  جبر للصف الثالث الثانوى  حلول تمارين الكتاب المدرسى  جبر للصف الثالث الثانوى
حلول تمارين الكتاب المدرسى جبر للصف الثالث الثانوى
 
Chaitanya mahaprabhu's advent predictions from various vedic
Chaitanya mahaprabhu's advent predictions from various vedicChaitanya mahaprabhu's advent predictions from various vedic
Chaitanya mahaprabhu's advent predictions from various vedic
 
Karthika maas
Karthika maasKarthika maas
Karthika maas
 
Buya hamka berbicara tentang perempuan
Buya hamka berbicara tentang perempuanBuya hamka berbicara tentang perempuan
Buya hamka berbicara tentang perempuan
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
Role of agni in womens health and disease
Role of agni in womens health and diseaseRole of agni in womens health and disease
Role of agni in womens health and disease
 
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGT
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGTPPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGT
PPT ON 50 AYURVEDIC DRUGS BY DR SIBA PRASAD ROUT,IPGT
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
뉴스 엔 올디스 - 연금술 1 (전혜정)
뉴스 엔 올디스 - 연금술 1 (전혜정)뉴스 엔 올디스 - 연금술 1 (전혜정)
뉴스 엔 올디스 - 연금술 1 (전혜정)
 
Nasya.pptx
Nasya.pptxNasya.pptx
Nasya.pptx
 
Vedic astrology for_better_health
Vedic astrology for_better_health Vedic astrology for_better_health
Vedic astrology for_better_health
 
Vishopavisha in Ayurveda
Vishopavisha in AyurvedaVishopavisha in Ayurveda
Vishopavisha in Ayurveda
 
RASA Vargeekarana.pptx
RASA Vargeekarana.pptxRASA Vargeekarana.pptx
RASA Vargeekarana.pptx
 
Relevance of poorvakarma in shodhana.pptx
Relevance of poorvakarma in shodhana.pptxRelevance of poorvakarma in shodhana.pptx
Relevance of poorvakarma in shodhana.pptx
 
Vaikranta
VaikrantaVaikranta
Vaikranta
 

Similar to Symposium on Jainism and Mathematics - presentation : 2020

Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
Editor IJCATR
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
INFOGAIN PUBLICATION
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Marisa Paryasto
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
IJERA Editor
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
IJCERT
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
ijcisjournal
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
ijcisjournal
 
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
dbpublications
 
581 517-525
581 517-525581 517-525
581 517-525
idescitation
 
C0281010016
C0281010016C0281010016
C0281010016
inventionjournals
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
ijcisjournal
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
An efficient file hierarchy attribute based
An efficient file hierarchy attribute basedAn efficient file hierarchy attribute based
An efficient file hierarchy attribute based
cloudtechnologies42
 

Similar to Symposium on Jainism and Mathematics - presentation : 2020 (20)

Ijcatr04051002
Ijcatr04051002Ijcatr04051002
Ijcatr04051002
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
 
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...Improved Caesar Cipher with Random Number Generation Technique and Multistage...
Improved Caesar Cipher with Random Number Generation Technique and Multistage...
 
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
 
581 517-525
581 517-525581 517-525
581 517-525
 
C0281010016
C0281010016C0281010016
C0281010016
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
A Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated KeysA Robust Cryptographic System using Neighborhood-Generated Keys
A Robust Cryptographic System using Neighborhood-Generated Keys
 
An efficient file hierarchy attribute based
An efficient file hierarchy attribute basedAn efficient file hierarchy attribute based
An efficient file hierarchy attribute based
 

More from Anil Jain

"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
Anil Jain
 
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Anil Jain
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3
Anil Jain
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2
Anil Jain
 
Siri bhoovalaya workshop-session-1
Siri bhoovalaya workshop-session-1Siri bhoovalaya workshop-session-1
Siri bhoovalaya workshop-session-1
Anil Jain
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-Bhoovalaya
Anil Jain
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
Siribhoovalaya pustak shakti
Siribhoovalaya pustak shaktiSiribhoovalaya pustak shakti
Siribhoovalaya pustak shakti
Anil Jain
 
An inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAn inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri Bhoovalaya
Anil Jain
 

More from Anil Jain (9)

"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
 
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at B...
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2
 
Siri bhoovalaya workshop-session-1
Siri bhoovalaya workshop-session-1Siri bhoovalaya workshop-session-1
Siri bhoovalaya workshop-session-1
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-Bhoovalaya
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Siribhoovalaya pustak shakti
Siribhoovalaya pustak shaktiSiribhoovalaya pustak shakti
Siribhoovalaya pustak shakti
 
An inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri BhoovalayaAn inimitable cryptographic creation : Siri Bhoovalaya
An inimitable cryptographic creation : Siri Bhoovalaya
 

Recently uploaded

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (11)

Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

Symposium on Jainism and Mathematics - presentation : 2020

  • 1. ‘Siribhūvalaya’: A Unique Scripture crafted with Modern Cryptography Constituents by Er. Anil Kumar Jain FIETE, FIE(I), SMCSI, LM-ISCA email: jain.anilk@gmail.com web-site: siri-bhoovalaya.org Virtual Symposium on Jainism and Mathematics Dec. 12 to Dec. 14, 2020
  • 2. Main Objectives of this Presentation 1. To reveal that Cryptographic mechanisms devised by Acārya Kumudēndu about 1200 years ago are strikingly similar to ones used in modern Information Security applications. 2. To convey in modern mathematical expressions the underlying premise of the cryptographic Writing System (Anka-Lipi) as conceived by Acārya Kumudēndu. This is labeled as Kumudēndu Encryption System (KES) by this author. 3. To present rudiments of KES (Kumudēndu Encryption System) in modern terminology of Information Security and to corroborate its potential in present scenario. siri-bhoovalaya.org
  • 3. Siribhūvalaya by Ācārya Kumudēndu • Siribhūvalaya was scripted by Ācārya Kumudēndu during 8th century AD in the state of in Karnataka, India. • Ācārya Kumudēndu devised an exclusive ‘Writing System’ for this unique creation which was based on universal script of numerals only. [Anka-Lipi] • Herein one Cakra or a page contained only integer numbers arranged in a square matrix of dimension 27. • Integer, in each of the cells of the matrix in the range of 1 to 64, represented one of the 64 Mūla Varṇas or basic phonetic alphabets as enumerated in texts of earlier Ācāryas in lineage to which Ācārya Kumudēndu belonged to. • It is claimed to be the largest scripture in the world (only one out of total of nine Khaṇḍas is available in public domain). siri-bhoovalaya.org
  • 4. Siribhūvalaya manuscript at National Archives of India [One CAKRA ( 27x27 matrix) with numerals in Kannaḍa script] siri-bhoovalaya.org
  • 5. siri-bhoovalaya.org Symmetric Cipher Model by Claude E. Shannon (Father of Modern Information Theory) C. E. Shannon: “Communication Theory of Secrecy Systems” : Bell Systems Technical Journal, Vol. 28, pp. 656–715, 1948. Earlier version of this research was presented in the classified report : “A Mathematical Theory of Cryptography”: Memorandum MM 45-110-02, Sept. 1, 1945, Bell Laboratories.
  • 7. Basic Building Blocks of KES framework siri-bhoovalaya.org KES (Kumudēndu Encryption System) framework, as deployed in Siribhūvalaya, consists of two symmetric encryption ciphers and an Integrity check mechanism : Mono Alphabetic Substitution Cipher : Here Key is identified as ‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet or Mūla Varṇa of the target script is assigned an integer numeric value in range 1 to 64. Transposition Cipher : Here key is named as ‘Bandha Traversal Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector of 729 integers. Herein each element is a distinct integer in the range 1 to 729, and which is indicative of place of the transposed phonetic alphabets in corresponding Cakra matrix (27x27). Transposition Cipher has two variants – Cakra-Bandha and Navmānk Bandha , wherein BTPM operates over whole of 27x27 matrix or 9x9 sub-matrices of the Cakra respectively. Integrity Check : To ensure accuracy and consistency of content in Siribhūvalaya, at the end of each Adhyaya there is mention of total number of phonetic alphabets in basic decoded and derived text of the Adhyaya. This ensures that there is no addition, deletion or modification of Cakras consisting the Adhyaya.
  • 8. Substitution Cipher Key (KCT) for Devanāgarī, Kannaḍa and Brāhmī scripts कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर siri-bhoovalaya.org
  • 9. Mathematical Representation of Decryption Mechanism (Transposition) – [Step-1] siri-bhoovalaya.org Transformation function (matrix to vector conversion function) i.e. ‘nvfunc’ converts CAKRA matrix into NVECTOR by implementation of a method called ‘locate’ which has got two arguments viz. BTPM and an integer variable ‘p’ in the range from 1 to 729.
  • 10. Mathematical Representation of Decryption Mechanism (Transposition) in Cakra 1-1-1 – [Step-2 ] siri-bhoovalaya.org Value of p 1 2 3 4 5 6 7 8 (x,y) in BTPM 1,14 27,15 26,16 25,17 24,18 23,19 22,20 21,21 cxy in CAKRA 1 58 38 1 52 1 60 2
  • 11. Mathematical Representation of Decryption Mechanism (Substitution) – [Step-3] siri-bhoovalaya.org
  • 12. Mathematical Representation of Decryption Mechanism (Substitution & Assimilation) – [Step-4 ] siri-bhoovalaya.org Resultant text after conjoining phonetic alphabets or Mūla Varṇas into words, phrases and verses results in following: अष्ट महाप्रातिहार्य वय्भवदिन्ि | अष्ट गुणन्गळौल् ओोम्िं || स्र्ष्ष्टगे मन्गळ पर्ायर्दितिि | अष्टम स्र्षििगेर गुवेिु ||1|| This is the first verse of first Khaṇḍa i.e. ṁagala Prābhr̥ta of Siribhūvalaya.
  • 13. Robustness of KES against Brute Force Attacks siri-bhoovalaya.org Depending on the security requirements, the substitution table can be altered in size and assignment of integers. Thus even with 64 element KCT, there are possible Factorial (64) permutations resulting in a number with 89 digits. Size of Transposition key can be adjusted to thwart anticipated brute-force attacks. Preliminary estimations reveal that possible Transposition schemes of 729 elements, of 27x27 matrix as deployed in “Siribhūvalaya”, amount to Factorial (729) permutations and that results in massive number of approximately 1772 digits. That means a brute-force attacker will have to find correct Transposition Key out of so many possible ones. This will require massive computational resources which is very highly impractical in contemporary scenario. Current cryptographic standards of symmetric key encryption recommend key length of 256 bits, wherein possible key combinations are of the order 78 digits only for a brute-force attack.
  • 14. KES in present Scenario siri-bhoovalaya.org KES is inherently suitable for applications on variety of platforms which use Indian Languages and Scripts. With its variable length dual key symmetric encryption scheme it can be customised for Information Security requirements of wide-range of systems and applications. Since it requires small computational overhead, KES can efficiently be deployed on systems with nominal computing resources. Even in absence of computing machines, KES can be implemented with manual operations only. That is how Acārya Kumudēndu encrypted Siribhūvalaya in 8th century and later in 20th century Pandit Yellappa Shastri was able to decrypt it manually. In addition to KES there are other Cryptographic mechanisms very creatively integrated in Siribhūvalaya. These are termed in modern terminology as Visual Cryptography (Citra Bandha) and Steganography (Antara Sāhitya).

Editor's Notes

  1. There are many distinctive features of this unique creation, but in this presentation focus is on the Cryptographic constituents which are strikingly similar to ones used in modern applications of Cryptography in Information Security. One can noticeably observe creative deployment of Substitution and Transposition Ciphers in Cakras of this epic. Built upon notions of Matrices these are mathematical applications of combinatorics and permutations. A generalized version of this mechanism in modern terminology has been proposed as KES (Kumudendu Encryption System) which can measure up to a versatile and robust block cipher as compared to existing ones. Besides encryption mechanisms Muni Kumudendu implemented a scheme to check Integrity of the verses in each of Adhyāyas in a smart manner. Muni Kumudendu has very creatively used Steganography for interweaving not only multi-lingual verses in base Kannada text but also deployed this technique to enclose scriptures from other sources.
  2. Purpose of this presentation is to highlight one of the unique characteristics of an enigmatic epic created by Jain Acārya Kumudēndu more than a century ago. Yet not fully revealed this scripture had remained out-of-sight for centuries and was rediscovered about 70 years ago by Pandit Yellappa Shastri in Bengaluru, Karnataka State of India. Acārya Kumudēndu regarded Acārya Virasen as his Guru. Subject matter of Siribhuvalaya covers wide spectrum of Jain canonical topics along with discourses on ancient sciences and scriptures of non-jain religious streams. This is very rightfully described as a scripture of scriptures (Shatron and Shatra).
  3. This is the image of one sheet of manuscript wherein we can identify one matrix of size 27x27 and another matrix of size 3x3 near top left corner. Elements in both of these matrix contains integer numerals in Kannada script. On minute observation one can identify partitioning of 27x27 matrix into nine sub-matrices of size 9x9 each. 3x3 matrix at the top left corner provides vital clue in construction of key for the Transposition Cipher. It is to be noted that concept of structuring and processing of data elements in matrix form is quite recent in modern mathematics, about 150 years old only. It is not yet known whether any of mathematicians prior to Acarya Kumudendu has deployed matrices so creatively.
  4. This slide exhibits Schematic of General Secrecy System of Claude E. Shannon which is also termed as Symmetric Key Cipher Model in Modern Cryptography. References for this model are mentioned on this slide. Kindly note that Shannon was an alumni and later a faculty member at MIT. Noticeable on this schematic are two transformation processors namely Encipherer and Decipherer which are complimentary to each other. Message source sends message to Encipherer which transforms message into a cryptogram. This transformation function has two parameters – the message M and a Key from Key source. The cryptogram is decrypted at the recipient’s end by Decipherer Transformation Processor which operates with two parameters, namely Cryptogram and the same key K from the Key Source. This model represents Symmetric Key Cryptography mechanism and is very widely deployed in modern Information Security Application. DES, 3DES, AES, IDEA are few examples of this.
  5. This slide brings forth the resemblance of Kumudendu Encryption System with Shannon’s Model of General Secrecy System. In this model Message source is Text in Mula Varnas, Key Source contains two keys one for Transposition Cipher and Another one for Substitution Cipher. Encipherer transforms message using Transposition and Substitution mechanisms and the Output is a CAKRA which is termed a Cryptogram by Shannon. Decipherer Transformation converts CAKRA into a string of Mula Varnas using the same Keys from Key Source.
  6. Slide Nos 9 to 12 describe in mathematical terms the Deciphering mechanism as applied to a CAKRA in Siribhuvalaya. Detailed description of Deciphering and Enciphering is presented in the Full Length Paper submitted for the Symposium. Here is representation of CAKRA and BTPM (Transposition Cipher Key) as 27x27 matrices respectively. Deciphering of Transposed Matrix is basically a transformation function to convert CAKRA matrix into a row-vector of 729 elements as per transpositions scheme contained in BTPM.
  7. This slide describes the transformation of CAKRA matrix into a row-vector - cell by cell – in accordance to place value and its location in BTPM. As an example first CAKRA of Siribhūvalaya is referred in the slide.
  8. This slide describes KCT - the Key for Substitution Cipher. KCT is basically an ordered row-vector of 64 elements containing Mula Varnas of the target script. KCT for Devanagari Script is taken as an example. Substitution of integers in the transposed row-vector of 729 elements results in string of Mula Varnas in target script.
  9. This slide represents final outcome of Deciphering. Resultant text after conjoining or assimilating phonetic alphabets into words, phrases results finally in verses. Shown in this slide is First verse of Siribhuvalaya – which the Mangalacharan and is dedicated to Eight Jina. अष्ट महाप्रातिहार्य वय्भवदिन्द | अष्ट गुणन्गळौल् ओोम्दं || स्र्ष्टिगे मन्गळ पर्यायदिनित | अष्टम जिनगेर गुवेनु || Herein, Overwhelmed with immense external grandeur of eight Mahāprātihāryas - which are attributed to Arihanta Paramēṣṭhī - Ācārya Kumudēndu envisages internal majesty of Aṣṭaguṇas i.e. eight infinite qualities which are derivatives of ‘ŌM’ and are attributed to Siddha Parameśṭhī. He pronounces that these two forms i.e. Arihanta & Siddha are enormous benefactor for the well-being of whole of the universe. Ācārya Kumudēndu thus commences Maṅgala Prābhr̥ta of Siribhūvalaya by bowing down to pay humble homage to Eighth Jina i.e. Lord Candra Prabhu or Candra Nāth.