This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.
An Unobservable Secure On-Demand Routing With D-Worm Detection In MANETIJRES Journal
Mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices. In wireless communication, the privacy-protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility. Many schemes have been proposed to protect privacy in ad hoc networks. In these schemes, data packets and control packets are not completely unlikable and unobservable, and it will be distinguishable by harm users. An unobservable secure on-demand routing (USOR) protocol provides complete unlinkability and content unobservability for all type of packets using group signature and ID-based encryption. USOR Protocol did not see any worm in the content particularly disguising worm. The proposed scheme is detecting disguised worm using spectrum based scheme. This scheme uses power spectral density and spectral flatness measure. Spectrum based method not only detect disguising worm, but traditional worms as well.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Data Security with Colors using RSA technique that integrates the RGB Color model with the well-known public key cryptographic algorithm RSA (Rivest, Shamir and Adleman). This model provides both confidentiality and authentication to the data sent across the network. RSA algorithm uses public key and private key to encrypt and decrypt the data and thus provides confidentiality. But the public key is known to everyone and so anyone can encrypt the data and send the message. Hence authentication of users is needed. In this technique we use RGB color model to provide authentication. Every user will have a unique color assigned to him. A sender must know the receiver’s color to send a message. The color value is encrypted using a key which is used as a password while decrypting the message. To decrypt the message, the receiver must provide his color values. If the decrypted color values and his color values are equal then the sender and receiver are send to be authentic. The data encryption and decryption follows RSA procedure. Thus both authentication and confidentiality are provided for the data.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Data Security with Colors using RSA technique that integrates the RGB Color model with the well-known public key cryptographic algorithm RSA (Rivest, Shamir and Adleman). This model provides both confidentiality and authentication to the data sent across the network. RSA algorithm uses public key and private key to encrypt and decrypt the data and thus provides confidentiality. But the public key is known to everyone and so anyone can encrypt the data and send the message. Hence authentication of users is needed. In this technique we use RGB color model to provide authentication. Every user will have a unique color assigned to him. A sender must know the receiver’s color to send a message. The color value is encrypted using a key which is used as a password while decrypting the message. To decrypt the message, the receiver must provide his color values. If the decrypted color values and his color values are equal then the sender and receiver are send to be authentic. The data encryption and decryption follows RSA procedure. Thus both authentication and confidentiality are provided for the data.
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
RSA is one of the most popular Public Key Cryptography based algorithm mainly used for digital
signatures, encryption/decryption etc. It is based on the mathematical scheme of factorization of very large
integers which is a compute-intensive process and takes very long time as well as power to perform.
Several scientists are working throughout the world to increase the speedup and to decrease the power
consumption of RSA algorithm while keeping the security of the algorithm intact. One popular technique
which can be used to enhance the performance of RSA is parallel programming. In this paper we are
presenting the survey of various parallel implementations of RSA algorithm involving variety of hardware
and software implementations.
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
Enhancement in data security and integrity using minhash techniquenooriasukmaningtyas
Data encryption process and key generation techniques protect sensitive data against any various attacks. This paper focuses on generating secured cipher keys to raise the level of security and the speed of the data integrity checking by using the MinHash function. The methodology is based on applying the cryptographic algorithms rivest-shamir-adleman (RSA) and advanced encryption standard (AES) to generate the cipher keys. These keys are used in the encryption/decryption process by utilizing the Pearson Hash and the MinHash techniques. The data is divided into shingles that are used in the Hash function to generate integers and in the MinHash function to generate the public and the private keys. MinHash technique is used to check the data integrity by comparing the sender’s and the receiver’s encrypted digest. The experimental results show that the RSA and AES algorithms based on the MinHash function have less encryption time compared to the normal hash functions by 17.35% and 43.93%, respectively. The data integrity between two large sets is improved by 100% against the original algorithm in terms of completion time, and 77% for small/medium data and 100% for large set data in terms of memory utilization.
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
Security is one of the most important concern to the information and data sharing for companies, banks, organizations and government facilities. RSA is a public cryptographic algorithm that is designed specifically for authentication and data encryption. One of the most powerful reasons makes RSA more secure is that the avoidance of key exchange in the encryption and decryption processes. Standard RSA algorithm depends on the key length only to protect systems. However, RSA key is broken from time to another due to the development of computers hardware such as high speed processors and advanced technology. RSA developers have increased a key length or size of a key periodically to maintain a high security and privacy to systems that are protected by the RSA. In this paper, a method has been designed and implemented to strengthen the RSA algorithm by using multiple public and private keys. Therefore, in this method the security of RSA not only depends on the key size, but also relies on the multiplicity of public and private keys.
Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
Data security is an important issue in modern era. In this paper, we use both symmetric and asymmetric key for encryption and decryption for data security. In our technique, two phases are used. In the 1st phase symmetric key encryption is used and in 2nd phase asymmetric key encryption like RSA is used.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
Transferring the secure data becomes vital for the important data of every days life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard AES and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receivers public key. The encrypted data file and encrypted key file are combined to form an output file to send to the receiver. The file at the receivers side is separated into two files, the encrypted data file and encrypted key file. The encrypted key file is decrypted by RSA method using the receivers private key. The AES key is acquired, the encrypted data file is then decrypted by AES method using the acquired AES key. The system includes file transferring process based on the Java socket technology. Khet Khet Khaing Oo | Yan Naung Soe "Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29243.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29243/encryption-data-measurement-and-data-security-of-hybrid-aes-and-rsa-algorithm/khet-khet-khaing-oo
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
To enhance the security of data transmission in Mobile communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric block cipher. In the proposed hybrid encryption algorithm, DES algorithm is used for data transmission because of its higher efficiency in block encryption, encryption speed of DES algorithm is faster than RSA algorithm for long plaintext, and RSA algorithm distribute key safely and easily also RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in mobile communication system will be more secure. Meanwhile, it is clear that the procedure of the entire encryption is still simple and efficient. Digital abstract algorithm MD5 is adopted in this mechanism. Through comparing the digital signature which is transmitted by dispatcher and digital signature result of plaintext which is got by receiver through MD5 algorithm, data security can be guaranteed. This mechanism realizes the confidentiality, completeness, authentication and non- repudiation.
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir– Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.
Similar to ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION (20)
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
1. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
DOI : 10.5121/ijnsa.2011.3503 33
ENHANCED SECURE ALGORITHM FOR
MESSAGE COMMUNICATION
Shaik Rasool1
, G. Sridhar2
, K. Hemanth Kumar3
, P. Ravi Kumar4
1
Dept. of Computer Science & Engg, S.C.E.T., Hyderabad, India
shaikrasool@live.in
2
Dept. of Computer Science & Engg, S.C.E.T., Hyderabad, India
gsridhar@live.in
3
Dept. of Computer Science & Engg, S.C.E.T., Hyderabad, India
khemanth@live.in
4
Dept. of Computer Science & Engg, S.C.E.T., Hyderabad, India
pravi@hotmail.co.in
ABSTRACT
This paper puts forward a safe mechanism of data transmission to tackle the security problem of
information which is transmitted in Internet. The encryption standards such as DES (Data Encryption
Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely
used to solve the problem of communication over an insecure channel. With advanced technologies in
computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret
key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over
traditional schemes. First, the encryption and decryption procedures are much simpler, and
consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature
of the substitution mapping method used here, together with the translation and transposition operations
performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this
paper a detailed report of the process is presented and analysis is done comparing our proposed
technique with familiar techniques
KEYWORDS
Cipher text, Encryption, Decryption, Substitution, Translation.
1. INTRODUCTION
In open networked systems, information is being received and misused by adversaries by means
of facilitating attacks at various levels in the communication. The encryption standards such as
DES (Data Encryption Standard) [6], AES (Advanced Encryption Standard) [7], and EES
(Escrowed Encryption Standard) [8] are used in Government and public domains. With today’s
advanced technologies these standards seem not to be as secure and fast as one would like. High
throughput encryption and decryption are becoming increasingly important in the area of high-
speed networking [9].With the ever-increasing growth of multimedia applications, security is an
important issue in communication and storage of images, and encryption is one the ways to
ensure security. Image encryption has applications in inter-net communication, multimedia
systems, medical imaging, telemedicine, and military communication. There already exist
several image encryption methods. They include SCAN-based methods, chaos-based methods,
tree structure-based methods, and other miscellaneous methods. However, each of them has its
strength and weakness in terms of security level, speed, and resulting stream size metrics. We
hence proposed the new encryption method to overcome these problems [1].
Communication is a major impact in today's business. The communication devices transmit
large amount of data with high security. In business, the amount approximately worth over $1
2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
34
trillion is being transacted every week on the Net. But, unfortunately, the cyber-crimes are
nearly 97% and such crimes are undetected [10]. The security is still remains a risky one. At
present, various types of cryptographic the algorithms provide high security in information,
computer and network-related activities. These algorithms are required to protect the data,
integrity and authenticity from various attacks.
This paper discusses a new technique of encryption algorithm which combines a symmetric
algorithm FSET (Fast and Secure Encryption Technique) proposed by Varghese Paul [2] with
extra features and asymmetric algorithm RSA with Hash Coding (SHA -2). The FSET
algorithm is a direct mapping poly alphabetic Symmetric-key encryption algorithm. Here, direct
substitution mapping and subsequent translation and transposition operations using X-OR logic
and circular shifts that results in higher conversion speed are used. The block size is 128 bits (16
characters) and the key size is also 128 bits (16 characters). A comparison of the proposed
encryption method with DES and AES is shown in table. 2. The asymmetric RSA algorithm is
developed by MIT professors: Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977
[5]. RSA gets its security from factorization problem. Difficulty of factoring large numbers is
the basis of security of RSA.
In this Paper the actual message to be sent is encrypted and decrypted using the FSET algorithm
which has been modified accordingly for higher efficiency. RSA is used for encryption and
decryption of the secret key which is used in the encryption (FSET) of the actual data to be
transmitted. All the limitations in FSET are overcome in this implementation. The security of
the secret key is handled by the by the RSA. Here the FSET can handle multimedia data also.
Multimedia files like images, videos, audios etc. can be effectively encrypted. Also other files
like MS word, PDF, almost all files can be transmitted securely using the FSET proposed. The
hash function is used for providing authentication. The detailed implementation is explained in
the later sections.
2. THE ENCRYPTION ALGORITHM
An encryption algorithm has the advantages of both the symmetric and asymmetric algorithms.
The complete process can be viewed in the figure 1. This process involves the fallowing steps
Step 1:- Finding Hash of message (hm) using SHA-2 (H)
Step 2:- Encryption of message using FSET with Secret key (Ks)
Step 3:- Perform XOR operation on hm and ks
Step 4:- Using RSA Encrypting the secret key and hnk (output of step 3) with Public key PU=
{e, n}.
Step 5:- Using RSA, Decryption of hmk and encrypted secret key using Private Key PR= {d, n}
Step 6:- Perform XOR operation on Ks and hmk to get hm
Step 7:- Decryption of Message using FSET with Ks
Step 8:- Finding the Hash of decrypted message and comparing it with hm (output of step 6) to
authenticate the message
3. THE ENCRYPTION PROCESS
The encryption process starts with the key generation process at the receiver side. The receiver
generates two keys public and private key. The public key is sent to the sender and it is not
necessarily to be kept secret. The secret key is used by the sender to encrypt the original
message. The sender then generates hash code of original message and XOR with Secret key to
get ‘hmk’ value. The sender then uses the public key and encrypts the secret key and ‘hmk’
using RSA. He then sends the encrypted message, encrypted hmk and the encrypted secret key
to the receiver. The receiver first decrypts the secret key and hmk using RSA with private key.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
35
The secret key must be decrypted first as the encrypted message can only be decrypted with the
original secret key. After the secret key is decrypted it is then used in the FSET algorithm to get
back the original message using the FSET decryption algorithm. All the procedure is explained
clearly in the fallowing sub sections.
Figure 1: Implementation of the Algorithm
3.1 THE KEY GENERATION PROCESS
RSA involves a public key and a private key. The public key can be known to everyone and is
used for encrypting messages. Messages encrypted with the public key can only be decrypted
using the private key [3]. The keys for the RSA algorithm are generated the following way:
1. Choose two distinct large random prime numbers and
2. Compute n=p*q n is used as the modulus for both the public and private keys
3. Compute the totient: f (n)=(p-1)(q-1).
4. Choose an integer e such that 1 < e <f (n) , and share no factors other than 1 (i.e. e and φ(n)
are co-prime) e is released as the public key exponent
5. Compute d to satisfy the congruence relation de=1(mod f (n)); i.e. de=1+kf (n) for some
integer. d is kept as the private key exponent
The public key consists of the modulus and the public (or encryption) exponent. The private
key consists of the modulus and the private (or decryption) exponent which must be kept secret.
Recipient after calculating public key PU= {e , n} and private key PR= {d, n} sends the public
key value i.e., PU= {e ,n} value to sender.
3.2 SECRET KEY AND HMK ENCRYPTION USING RSA ALGORITHM
Receiver B transmits his public key to Sender and keeps the private key secret. Sender then
wish to encrypt message M and hmk . He first turns M and hmk into a number m<n and hmk<n
by using an agreed-upon reversible protocol known as a padding scheme. He then computes the
cipher text corresponding to:
c=me
mod n
This can be done quickly using the method of exponentiation by squaring. Sender then transmits
to Receiver. Hmk is obtained by XOR operation on hash code obtained by performing hash
function on message and the secret key.
4. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
36
3.3 FSET ENCRYPTION ALGORITHM AND HASHING OF MESSAGE
The encryption, C = E(K,P), using the proposed encryption algorithm consists of three steps.
1. The first step involves initialization of a matrix with ASCII code of characters, shuffled
using a secret key, K. This initialization is required only once before the beginning of
conversion of a plaintext message into corresponding cipher text message.
2. The second step involves mapping, by substitution using the matrix, each character in
every block of 16 characters into level-one cipher text character.
3. The third step involves translation and transposition of level-one cipher text characters
within a block, by X-OR and circular shift operations, using arrays, in 8 rounds.
Figure 2 shows simplified block diagram of the encryption and decryption scheme.
3.3.1 MATRIX FOR SUBSTITUTION MAPPING
A matrix M with 16 rows and 256 columns initialized with ASCII codes of characters using
secret key is used for mapping the plaintext characters into level one cipher text characters.
During encryption, a block of 16 plaintext characters in the message is taken into a buffer. The
ASCII code of the character P(i) is obtained. The resulting integer is used as column number j
of ith
row of the matrix M. The element contained in this cell which is an ASCII code of a
character, is taken as the level-one cipher text character CL1(i) corresponding to the plaintext
character P(i). In this way all the characters in a block are mapped into level-one cipher text
characters and all plaintext character blocks are
Figure 2: Block Diagram of Encryption & Decryption
5. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
37
3.3.2 MATRIX INITIALIZATION
A matrix M with sixteen rows and two hundred fifty six columns is defined. Columns in every
row of the matrix is filled with ASCII codes of characters starting from NULL (ASCII = 0) in
column zero to BLANK (ASCII = 255) in column two hundred fifty five representing elements
of the matrix. A 16 character (128 bits) secret key K, with key characters K(0) through K(15), is
used for encryption and decryption. The ith row of the matrix is given an initial right circular
shift, as many number of times as equal to the ASCII code of (i+1)th key character to shuffle the
contents of the matrix M, for i = 0 to 14. For example, if K(1), is .a. whose ASCII code is 97,
row 0 of the matrix M is right circular shifted 97 times. If K(2) is .h. whose ASCII code is 104,
the second row of the matrix M is right circular shifted 104 times and so on. The row 15 of
matrix M is right circular shifted as many number of times as equal to ASCII value of the key
character K(0).
Further, the ith row of the matrix is given a second right circular shift as many number of times
as equal to ASCII (K(i)) to shuffle the contents of the matrix M, for i = 0 to 15. For example, the
row 0 of M is right circular shifted as many number of times as equal to the ASCII value of key
character K(0). The row 1 of the matrix M is given a right circular shift as many number of
times as equal to the ASCII value of the key character K(1) and so on.
3.3.2 SUBSTITUTION MAPPING PROCEDURE
A given message is broken into blocks of sixteen plaintext characters P(0) through P(15).
Plaintext character P(i) is taken and a number j is calculated such that j = ( ASCII code of
plaintext character P(i)). This number, j, is used as column number of the matrix M. Using j as
column number we proceed to find the element in the ith
row of the matrix M. This element
(ASCII code of a character) is used as level-one cipher text character CL1(i) for a given
plaintext character P(i). For example, for the plaintext character P(0) in a block, i = 0, j = (
ASCII code of plaintext character P(0)) is used as column number of row 0 of the matrix M to
obtain level-one cipher text character corresponding to P(0). Similarly for character P(1) in the
plaintext character block, i = 1 and j = ( ASCII code of plaintext character P(1)) where j is used
as column number of the row 1 of the matrix to obtain level-one cipher text character
corresponding to P(1). In this way, all the 16 plaintext characters in a block are mapped into 16
level one cipher text characters denoted by CL1(i), i = 0 to 15. The characters of level 1 cipher
text character block (CL1(0) through CL1(15)) are transferred to a 16 element array A1.
3.3.3 SUB-KEY SET GENERATION
One set of eight sub-keys Kts_0, Kts_1, Kts_2, .. Kts_7 are generated using the secret key K
such that: Kts_n = characters in columns 0 through column 15 in row n of matrix M
concatenated. These keys are used in translation rounds. Another set of sub-keys Ktp_n0,
Kps_n1, Ktp_n2 and Ktp_n3 are generated such that Ktp_n0 = character of matrix M with row
number n and column number 0. Here, each key is a character represented by the corresponding
element in the matrix M. These keys are used in transposition rounds.
3.3.3 TRANSLATION AND TRANSPOSING
Eight rounds of translation and transposition operations are performed on the level 1 cipher text
character block. The translation operations are done using XOR operation performed on the
cipher text character block using sub key, Kts_n in the nth round. The translated cipher text
character block is transposed using four arrays whose elements are circular shifted using sub-
keys Ktp_n0, Ktp_n1, Ktp_n2, Ktp_n3 used in that round. These operations make the resulting
6. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
38
output cipher text characters extremely difficult to decrypt by any adversary without having the
secret key. The translation and transposition produce the effect of diffusion.
Translation of cipher text characters
The contents of array A1 is XOR with sub key Kts_n in the nth round. The 16 characters of each
block of cipher text are XOR with 16 characters of sub key Ks_n
Transposing of cipher text characters
The XOR level-one cipher text characters available in array A1 are bifurcated and transposed
using four arrays. For the nth round, array A1 is right circular shifted as many number of times
as equal to the integer value of Ktp_n0. After this operation, the first eight elements of A1 (left
most elements) are transferred to another array A2 having 8 element positions. Then, A2 is right
circular shifted as many number of times as equal to the integer value of Ktp_n1. The other
eight elements of the array A1 (rightmost elements) are transferred to another 8 element array
A3 which is left circular shifted as many number of times as equal to integer value of Ktp_n2.
Then A2 and A3 are concatenated and transferred to the 16 element array A1. This 16 element
array, A1, is right circular shifted as many number of times as equal to the integer value of
Ktp_n3. After this operation, the contents of A1 represent the cipher text characters in a given
block. The elements of array A1 are moved to the cipher text block C(0) through C(15). The
cipher text blocks are used to create the output cipher text message file.
3.3.4 HASHING OF MESSAGE
At this stage hash code of the message is found using the Secure Hash Algorithm (SHA -2)
3.4 SECRET KEY AND HMK DECRYPTION USING RSA ALGORITHM
Receiver b can recover m and hmk by using her private key exponents d by the following
computation:
M=C^d mod n.
Given m, he can recover the original message key Ks and hmk. Here M may original be hmk
and Ks and C is their respective encrypted form. Once hmk is decrypted it is then XOR-ed with
Ks to get hm.
3.5 THE DECRYPTION PROCESS AND AUTHENTICATION
The decryption algorithm performs the reverse operations of encryption such that P = D(K,C).
This is done in three steps. Here, cipher text character C(i), in blocks of 16 are processed using
arrays and matrix. The first step involves initialization of a matrix with ASCII codes of
characters, shuffled using the secret key. In the second step, the cipher text characters are de-
transposed using circular shift operation of array and de-translated by XOR logic using sub-keys
in multiple rounds. With this operation we get back the level-one cipher text characters. In the
third step, these level-one cipher text characters are inverse-mapped into plaintext characters
using the matrix. In the decryption algorithm, sub-keys are generated from the secret key in the
same way as in the case of encryption algorithm. The detailed procedure is explained in the
fallowing sections.
7. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
39
3.5.1 MATRIX INITIALIZATION
An identical matrix M, used for mapping the plaintext characters into level-one cipher text
characters, is used here for inverse mapping of the level-one cipher text characters into plaintext
characters during decryption. At the decryption site, this matrix is created using the secret key K
in the same way as in the case of encryption.
3.5.2 DE-TRANSPOSING OF CIPHER TEXT CHARACTERS
The cipher text character block from the cipher text file is brought in to a 16 element array A1.
For the nth round, array A1 is left circular shifted as many number of times as equal to the
integer value of Ktp_n3. After this operation, the first eight elements of A1 (left most elements)
are transferred to another array A2 having 8 element positions. Then, A2 is left circular shifted
as many number of times as equal to the integer value of Ktp_n2. The other eight elements of
the array A1 (rightmost elements) are transferred to another 8 element array A3 which is right
circular shifted as many number of times as equal to integer value of Ktp_n1. Then A2 and A3
are concatenated and transferred to the 16 element array A1. This array is left circular shifted as
many number of times as equal to the integer value of Ktp_n0.
3.5.3 DE-TRANSLATION OF CIPHER TEXT CHARACTERS
The contents of array A1 is X-ORed with the bits of sub key Kts_n in the nth round. After this
operation, the contents of the array A corresponds to the level one cipher text character block
corresponding to the one obtained after the mapping operation done at the encryption side using
the matrix. The contents of array A1 is moved to level 1 cipher text block, CL1.
3.5.4 INVERSE MAPPING USING MATRIX
If CL1(i) is the level-one cipher text character in a block, the inverse mapping is such that P(i) =
char((column number j of ith
row of matrix M where CL1(i) is the element)). For example, let
the 1st level-one cipher text character, CL1(1), in a block be .#.. We proceed to search. #. in the
matrix M to find the column number j in the 1st row where CL1(1) = M[1][j]. Then we
determine the character whose ASCII = (j) which gives the plaintext character P(1)
corresponding to CL1(1). Let the 2nd
level-one cipher text character, CL1(2), in a block be .%..
We proceed to search .%. in the matrix M to find the column number j in the 2nd row where
CL1(2) = M[2][j]. Then we determine the character whose ASCII = (j) which gives the
plaintext character P(2) corresponding to CL1(2). In this way we can inverse map every cipher
text character in every block into plaintext characters to get back the original message file.
3.5.5 AUTHENTICATION PROCEDURE
Once the message is decrypted, hash function (SHA-2) is used to calculate the hash code of the
original message and it is compared with hm. The message is authentic if the comparison result
is true. If the result of comparision of result is false the authentication fails.
4. SIMULATION AND EXPERIMENTAL RESULTS
In this section we have shown the encryption of an image file. The key generation process can
be seen in the figure 3. It shows the selected prime numbers and generated public and private
key values. A secret key is chosen “encryption algorithm” which can be seen in the figure 4.
8. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
40
Figure 3: Key Generation process
Figure 4: Secret key
The public key is used in RSA algorithm to encrypt the secret key file and hmk. The
encrypted secret key can be seen in figure 4. The secret key is used for encrypting the
image file suing FSET algorithm. The encrypted image cannot be opened. It’s highly
secure.
Performance comparison of various popular secret key algorithms, such as DES, AES and
Blowfish running on a Pentium-4, 2.4 GHz machine, discussed in the literature [9] shows that
Blowfish is the fastest among these algorithms. The throughputs of these algorithms are
respectively 4,980 bytes/sec, 2,306 bytes/sec and 5,167 bytes/sec. The proposed FSET
Symmetric-key Encryption algorithm is subjected to performance evaluation using a Pentium-4,
2.4 GHz machine. Execution time taken by the algorithm was measured using a image file and
the throughput calculated. The time between two test points in the algorithm during execution
was measured with the help of system clock.
The number of bytes (in the plaintext file) required for an execution time of one second during
encryption was ascertained. The comparison of performance of this encryption algorithm with
the performance of popular secret key algorithms given in [4] is made. The throughput of
Blowfish algorithm is only 5,167 bytes per second whereas FSET encryption algorithm provides
70,684 bytes per second. Thus this Encryption algorithm is 8 times faster than Blowfish
algorithm.
9. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
41
5. CONCLUSION
The proposed encryption technique has the advantages of both symmetric and asymmetric
algorithms. Symmetric algorithm is used for encryption of messages rather than asymmetric
because the asymmetric algorithms are slower compared to symmetric algorithms. Thus
Asymmetric algorithm RSA is used here to safeguard the secret key which solves the problem
of key exchange as the secret key can be sent securely. The secret key can’t be decrypted unless
a private key is obtained and since it is at receiver side it is highly secured. Hashing provides
authentication to the messages sent.
The FSET Encryption algorithm, presented above, is a simple, direct mapping algorithm using
matrix and arrays. Consequently, it is very fast and suitable for high speed encryption
applications. The matrix based substitution resulting in poly alphabetic cipher text generation
followed by multiple round arrays based transposing and XOR logic based translations give
strength to this encryption algorithm. The combination of poly alphabetic substitution,
translation and transposition makes the decryption extremely difficult without having the secret
key. Decryption of cipher text messages created using this encryption is practically impossible
by exhaustive key search as in the case of other algorithms using 128 bits secret key. The cipher
text generated by this algorithm does not have one to one correspondence in terms of position of
the characters in plaintext and cipher text. This feature also makes decryption extremely
difficult by brute force. The performance test shows that this encryption is a fast algorithm
compared to the popular Symmetric-key algorithms. The algorithm is enhanced so that it can
handle various kinds of data like images, videos, PDF etc.
REFERENCES
[1] Chao-Shen Chen, and Rong-Jian Chen, (2006) “Image Encryption and Decryption Using SCAN
Methodology”, Proceedings of the Seventh International Conference on Parallel and Distributed
Computing, Applications and Technologies (PDCAT'06)
[2] Paul. A.J, Varghese Paul, P. Mythili, (2007) “A Fast and Secure Encryption Algorithm For
Message Communication”, IET-UK International Conference on Information and
Communication Technology in Electrical Sciences (ICTES 2007), Dr. M.G.R. University,
Chennai, Tamil Nadu, India. pp. 629-634
[3] Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek, (2007) “Dual RSA and Its
Security Analysis”, IEEE Transactions on Information Theory, VOL. 53, NO. 8, pp. 2922-2933
[4] Aameer Nadeem, Dr. M. Younus Javed, (2005) “A Performance Comparison of Data Encryption
Algorithms”., 0-7803-9421-6 / IEEE
[5] William Stallings, .Network Security Essentials (Applications and Standards). Pearson
Education, 2004, pp. 2.80
[6] Data Encryption Standard: http://csrc.nist.gov/publications/fips/fips 46- 3/fips- 46-3.pdf
[7] Advanced Encryption Standard http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
[8] Escrowed Encryption Standard http://csrc.nist.gov/publications/fips/fips1185/fips-185.txt
[9] Adam J. Elbirt, Christof Paar, (2005)”An Instruction-Level Distributed Processor for
Symmetric-Key Cryptography”, IEEE Transactions on Parallel and distributed Systems, Vol. 16,
No. 5
[10] Ramaraj.E and Karthikeyan, (2006) “A Design of Enhanced Security Protocol for Wireless
Communication Using Hybrid Encryption Technique (AES-Rijndael and RSA)”, Indian Journal
of Computing Technology, IJCT 1(1): 22-29
[11] William Stallings, .Cryptography and Network Security (Applications and Standards). Pearson
Education, Fourth Edition 2009, pp. 351- 375
10. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011
42
Authors
Shaik Rasool1
received the Bachelor of Technology in Computer Science &
Engineering from Jawaharlal Nehru Technological University, Hyderabad, India
in 2008. He is currently pursuing Master of Technology in Computer Science &
Engineering from Jawaharlal Nehru Technological University and also working
as Assistant Professor at the Department of Computer Science & Engineering in
S.C.E.T., Hyderabad, India. His main research interest includes Network
Security, Biometrics, Data Mining, and Information Security, Programming
Language and security and Artificial Intelligence.
G. Sridhar2
received his B.S. in Computer Science & Information Technology
and M.S. in Computer Science and Information Technology from State
Engineering University of Armenia, Yerevan, Armenia. He is currently working
as Associate Professor at the Department of Computer Science & Engineering in
S.C.E.T., Hyderabad, India. His main research interest includes Information
Security, Software Testing Methodologies and Software Models.
K. Hemanth Kumar3
received the Bachelor of Technology in Computer Science
& Engineering from Jawaharlal Nehru Technological University, Hyderabad,
India in 2005 and Master of Technology in Computer Science & Engineering
from Jawaharlal Nehru Technological University, Kakinada, India in 2010 and
also working as Assistant Professor at the Department of Computer Science &
Engineering in S.C.E.T., Hyderabad, India. His main research areas are
Information Security and Computer Networks.
P. Ravi Kumar4
received the Master of Technology in Computer Science &
Engineering from Bharat University, Chennai, India in 2008 and also working as
Assistant Professor at the Department of Computer Science & Engineering in
S.C.E.T., Hyderabad, India. His main research interest includes Data Mining, and
Information Security.