SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 05, Issue 01 (January. 2015), ||V1|| PP 40-43
International organization of Scientific Research 40 | P a g e
Computerized network security and cryptography
Motea Abdelaziz Mohammed Noman1,Saifeldeen Fatooh2,
Abdelrasoul Jabar Alzubaidi 3
1 PHD candidate motiea@hotmail.com , 2 Dean of Emarat college , 3 Sudan University of science and
Technology- Engineering College- Electronics Department Rasoul46@live.com
Abstract: For the first few decades of their existence, computer networks were primarily used by university
researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security
did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping,
and filing their tax returns, network security is looming on the horizon as a potentially massive problem .The
requirements of information security within an organization have undergone major changes in the last several
decades .With the introduction of computer the need for automated tools for protecting files and other
information stored on the computer became an evident .This is especially the case for a shared system, such as
time sharing system and the need is even more acute for systems that can be accessed by any user . This paper
deals with building a secured algorithm to ensure data security in the computer network.
Keywords: encryption, data, algorithm, computer network,
I. INTRODUCTION
Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with
making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients.
It is concerned with people trying to access remote services that they are not authorized to use. Most security
problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm
someone. Network security problems can be divided roughly into four closely intertwined areas: secrecy,
authentication, nonrepudiation, and integrity control. Secrecy, also called confidentiality, has to do with keeping
information out of the hands of unauthorized users. This is what usually comes to mind when thinking about
network security. Authentication deals with determining whom you are talking to before revealing sensitive
information or entering into a business deal. Nonrepudiation deals with signatures.
Secrecy means that only the sender and intended receiver should be able to understand the contents of
the transmitted message. Because eavesdroppers may intercept the message, this necessarily requires that the
message be somehow encrypted (disguise data) so that an intercepted message can not be decrypted
(understood) by an interceptor. This aspect of secrecy is probably the most commonly perceived meaning of the
term "secure communication." Note, however, that this is not only a restricted definition of secure
communication, but a rather restricted definition of secrecy as well.
Authentication means that both the sender and receiver need to confirm the identity of other party
involved in the communication - to confirm that the other party is indeed who or what they claim to be. Face-to-
face human communication solves this problem easily by visual recognition. When communicating entities
exchange
messages over a medium where they can not "see" the other party, authentication is not so simple. For instance,
a received email containing a text string saying that the email came from a friend , should be assured that it is
indeed came from that friend. Figure (1) below demonstrated data hacking by an intruder.
Figure (1) data hacking by intruder
Computerized network security and cryptography
International organization of Scientific Research 41 | P a g e
II. METHODOLOGY
The system design is divided into parts; hardware and software. In the hardware, two sets of personnel
computers interfaced to RF transceivers are used . The two sets are linked by an RF media for the data
communication. The two sets of the personnel computer plus the RF transceiver form a model for a secured
data exchange.
A software code is developed in the personnel computer to encrypt the data . The code of encryption is written
in Turbo C++ language (TC++). A decryption code is implemented in the receiving part based on the
encryption technique used .
III. SYSTEM LAYOUT
The aim of the hardware and software design is to illustrate the usage of the encryption and decryption
processes in the computer networks..The electronic devices required to construct the encryption and decryption
system is a personnel computer, RF transceiver , plus interconnection links and lab link cables. The block
diagram of the hardware implementation of the entire system is shown in Figure (2) below.
Figure (2) Block diagram of the system
The input system consists of two sets of electronic blocks. Each set consists of a personnel computer plus an
RF transceiver The mechanism of the system operation is based on XORing a group of four bytes with a
predefined table containing four ASCII coded bytes. The encryption operations are illustrated in equations (1)
to (3) below:
Encrypte-byte1 = (byte-1) XOR (ASCII of M) ..……… …………… (1)
Encrypte-byte2 = (byte-2) XOR (ASCII of A) ..……… …………… (2)
Encrypte-byte3 = (byte-3) XOR (ASCII of M) ..……… …………… (3)
Encrypte-byte4 = (byte-4) XOR (ASCII of N) ..……… …………… (4)
The hardware components are :
- Personnel computer (PC) :
A PC furnished with a serial and parallel ports is used for interfacing with the RF transceiver.
- RF transceiver:
The RF transceiver performs the task of data transmission and reception.
- Lab links :
Lab links are sort of cables that connects the computer port to external electronic devices .They are used for
conveying the stream of data from the PC to the RF transceiver.
IV. SOFTWARE PROGRAM AND ALGORITHM
To achieve the objective of the real time encryption procedure , we need to go through three steps as follows:
1. Step one is developing a Turbo C++ program in the computer .
2. Step two includes implementing the encryption strategy.
3. Step three includes activation of the RF transceiver..
Similar steps should be conducted for the decryption procedure.
Computerized network security and cryptography
International organization of Scientific Research 42 | P a g e
The algorithm performs a real time encryption. The algorithm contains two subroutines . The
subroutines are called one after the other. The first subroutine processes the data encryption strategy. The
second subroutine outputs a byte from the data register of the LPT plus transmission of the encrypted byte by
the RF transceiver..The execution of the two subroutines means performing a complex encryption procedure
based on a set of four bytes table. The processing is repeated till the end of the data stream coming from the PC.
The star ‘*’ in the plain text table denotes the bytes termination. The algorithm is :
Start
Initialization :
… Program LPT port as output..
… Clear the data register of the LPT port.
... Generate ASCII coded four bytes table.(M , A , M , N)
… ASCII coded bytes table Pointer = 1.
... Generate a hundred bytes plain text table ended with ‘*’.
… Plain text table pointer = 1 .
… Reserve a byte location for the (encrypted byte).
… Disable the RF transceiver.
Encryption strategy:
…Access the first byte in the plan text table.
Byte encryption :
.. If a byte is star ‘*’ go to end of program.
.. Call byte encryption subroutine.
.. Call encrypted byte output subroutine.
.. If (ASCII code table pointer > 4) , then put ASCII code table pointer to location 1.
.. Go to byte encryption .
End
Byte encryption subroutine :
.. Encrypted byte = ( Plain text byte) XOR ( ASCII code byte)
.. Increment pain text table pointer.
.. Increment ASCII code table pointer.
Return.
Encrypted byte output subroutine:
.. Output the encrypted byte to the data register of the LPT port (address 378 Hexadecimal).
.. Enable the RF transceiver for byte transmission.
RF transceiver:
.. If byte transmission is not acknowledged , then go to RF transceiver.
.. Disable the RF transceiver.
Return.
V. RESULTS
The system performs a complex non standard data encryption strategy. The generated four ASCII code
bytes table is considered the essential part in the adapted encryption strategy..Table (1) below shows the results
when operating the system .
Table (1) The results when operating the system
Plain text byte
in (HEX)
(Byte) XOR
( first byte in
ASCII table
‘M’)
(Byte) XOR (
second byte in
ASCII table
‘A’)
(Byte) XOR (
third byte in
ASCII table
‘M’)
(Byte) XOR (
fourth byte in
ASCII table
‘N’)
Encrypted byte
in (HEX)
41 0C 0C
4F 10 10
4C 01 01
5A 14 14
The processing indicated in table (1) will be repeated 25 times. The 25 times repetition comes from dividing
(100) by (4) .
Computerized network security and cryptography
International organization of Scientific Research 43 | P a g e
VI. CONCLUSION
The system design that enabled the data encryption and transmission adapted a non standard
encryption strategy. The number of bytes in the generated ASCII code table equals four bytes while the
assumed number of bytes in the plain text equals hundred..The assumed byte numbers in the two tables can be
changed as well as the gate used in the algorithm .This means that the strategy is flexible and any change will
not affect its principle .This type of encryption carries a high degree of data transmission security.
REFERENCES
[1] C. Gentry, Fully homomorphic encryption using ideal lattices, Symposium on the Theory of Computing
(STOC), 2009, pp. 169-178.
[2] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in
Cryptology EUROCRYPT’99, LNCS 1592, pp. 223–238,
[3] Springer, New York, NY, USA, 1999.
[4] Josh Benaloh, Dense Probabilistic Encryption, SAC 94, pages 120–128, 1994.
[5] I. Damg˚ard and M. Jurik. A Length-Flexible Threshold Cryptosystem with Applications.ACISP ’03, pp.
350–356.
[6] A. Kawachi, K. Tanaka, K. Xagawa. Multi-bit cryptosystems based on lattice problems. PKC ’07, pp.
315–329.
[7] C.A. Melchor, G. Castagnos, and P. Gaborit. Lattice-based homomorphic encryption of vector spaces.
ISIT ’08, pp. 1858–1862.
[8] Craig Gentry Shai Halevi, Implementing Gentry’s Fully-Homomorphic Encryption Scheme Preliminary
Report, August 5, 2010. https://researcher.ibm.com/ researcher/files/us-shaih/fhe-implementation.pdf
[9] Frederiksen, T.K., A Practical Implementation of Regev’s LWE-based Cryptosystem,2010.
[10] William Stallings, Cryptography and Network Security Principles and Practice, 5th Edition , Prentice
Hall , 2011.

More Related Content

What's hot

Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routingVikas Jagtap
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer NetworksJanki Shah
 
Basic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBasic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBharathKumarRaju DasaraRaju
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
ITFT - IP adressing
 ITFT - IP adressing ITFT - IP adressing
ITFT - IP adressingNavneet Kaur
 
Ip address and subnet masking final
Ip address and subnet masking finalIp address and subnet masking final
Ip address and subnet masking finalNeerajBhardwaj57
 
Easy and simple concept of IP Address
Easy and simple concept of IP AddressEasy and simple concept of IP Address
Easy and simple concept of IP AddressLearn with Arsl khan
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingBisrat Girma
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 

What's hot (20)

Ip addressing
Ip addressingIp addressing
Ip addressing
 
ip addressing & routing
 ip addressing & routing ip addressing & routing
ip addressing & routing
 
MAC & IP addresses
MAC & IP addressesMAC & IP addresses
MAC & IP addresses
 
Addressing in Computer Networks
Addressing in Computer NetworksAddressing in Computer Networks
Addressing in Computer Networks
 
Basic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing systemBasic Understanding about TCP/IP Addressing system
Basic Understanding about TCP/IP Addressing system
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Ip address
Ip addressIp address
Ip address
 
IP and MAC Address
IP and MAC AddressIP and MAC Address
IP and MAC Address
 
ITFT - IP adressing
 ITFT - IP adressing ITFT - IP adressing
ITFT - IP adressing
 
Ip address and subnet masking final
Ip address and subnet masking finalIp address and subnet masking final
Ip address and subnet masking final
 
Cn ipv4 addressing
Cn ipv4 addressingCn ipv4 addressing
Cn ipv4 addressing
 
Easy and simple concept of IP Address
Easy and simple concept of IP AddressEasy and simple concept of IP Address
Easy and simple concept of IP Address
 
Ip address
Ip addressIp address
Ip address
 
Ipv4 Final
Ipv4 FinalIpv4 Final
Ipv4 Final
 
Renas Rajab Asaad
Renas Rajab AsaadRenas Rajab Asaad
Renas Rajab Asaad
 
IP-Subnetworking
IP-SubnetworkingIP-Subnetworking
IP-Subnetworking
 
Ip address
Ip address Ip address
Ip address
 
Computer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP AddressingComputer Networking: Internet Protcol (IP) and IP Addressing
Computer Networking: Internet Protcol (IP) and IP Addressing
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 

Similar to G05114043

A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
 
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption AlgorithmsDesign Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption AlgorithmsIOSRjournaljce
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmIAEME Publication
 
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization MethodsIRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization MethodsIRJET Journal
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hackingphanleson
 
Web security
Web securityWeb security
Web securityLayla Tk
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography WorkbookArthyR3
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 
Network security
Network securityNetwork security
Network securityanoop negi
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2IAEME Publication
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452IOSR Journals
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 

Similar to G05114043 (20)

A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
 
Design Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption AlgorithmsDesign Package to Build and Evaluate Encryption Algorithms
Design Package to Build and Evaluate Encryption Algorithms
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Wireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption Model
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
15-105 v6
15-105 v615-105 v6
15-105 v6
 
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization MethodsIRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
IRJET- Enhanced Image Encryption System using Blowfish and Randomization Methods
 
Notes On N + N
Notes On N + NNotes On N + N
Notes On N + N
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hacking
 
Web security
Web securityWeb security
Web security
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
Network security
Network securityNetwork security
Network security
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 

More from IOSR-JEN

More from IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

G05114043

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), ||V1|| PP 40-43 International organization of Scientific Research 40 | P a g e Computerized network security and cryptography Motea Abdelaziz Mohammed Noman1,Saifeldeen Fatooh2, Abdelrasoul Jabar Alzubaidi 3 1 PHD candidate motiea@hotmail.com , 2 Dean of Emarat college , 3 Sudan University of science and Technology- Engineering College- Electronics Department Rasoul46@live.com Abstract: For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem .The requirements of information security within an organization have undergone major changes in the last several decades .With the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident .This is especially the case for a shared system, such as time sharing system and the need is even more acute for systems that can be accessed by any user . This paper deals with building a secured algorithm to ensure data security in the computer network. Keywords: encryption, data, algorithm, computer network, I. INTRODUCTION Security is a broad topic and covers a multitude of sins. In its simplest form, it is concerned with making sure that nosy people cannot read, or worse yet, secretly modify messages intended for other recipients. It is concerned with people trying to access remote services that they are not authorized to use. Most security problems are intentionally caused by malicious people trying to gain some benefit, get attention, or to harm someone. Network security problems can be divided roughly into four closely intertwined areas: secrecy, authentication, nonrepudiation, and integrity control. Secrecy, also called confidentiality, has to do with keeping information out of the hands of unauthorized users. This is what usually comes to mind when thinking about network security. Authentication deals with determining whom you are talking to before revealing sensitive information or entering into a business deal. Nonrepudiation deals with signatures. Secrecy means that only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message, this necessarily requires that the message be somehow encrypted (disguise data) so that an intercepted message can not be decrypted (understood) by an interceptor. This aspect of secrecy is probably the most commonly perceived meaning of the term "secure communication." Note, however, that this is not only a restricted definition of secure communication, but a rather restricted definition of secrecy as well. Authentication means that both the sender and receiver need to confirm the identity of other party involved in the communication - to confirm that the other party is indeed who or what they claim to be. Face-to- face human communication solves this problem easily by visual recognition. When communicating entities exchange messages over a medium where they can not "see" the other party, authentication is not so simple. For instance, a received email containing a text string saying that the email came from a friend , should be assured that it is indeed came from that friend. Figure (1) below demonstrated data hacking by an intruder. Figure (1) data hacking by intruder
  • 2. Computerized network security and cryptography International organization of Scientific Research 41 | P a g e II. METHODOLOGY The system design is divided into parts; hardware and software. In the hardware, two sets of personnel computers interfaced to RF transceivers are used . The two sets are linked by an RF media for the data communication. The two sets of the personnel computer plus the RF transceiver form a model for a secured data exchange. A software code is developed in the personnel computer to encrypt the data . The code of encryption is written in Turbo C++ language (TC++). A decryption code is implemented in the receiving part based on the encryption technique used . III. SYSTEM LAYOUT The aim of the hardware and software design is to illustrate the usage of the encryption and decryption processes in the computer networks..The electronic devices required to construct the encryption and decryption system is a personnel computer, RF transceiver , plus interconnection links and lab link cables. The block diagram of the hardware implementation of the entire system is shown in Figure (2) below. Figure (2) Block diagram of the system The input system consists of two sets of electronic blocks. Each set consists of a personnel computer plus an RF transceiver The mechanism of the system operation is based on XORing a group of four bytes with a predefined table containing four ASCII coded bytes. The encryption operations are illustrated in equations (1) to (3) below: Encrypte-byte1 = (byte-1) XOR (ASCII of M) ..……… …………… (1) Encrypte-byte2 = (byte-2) XOR (ASCII of A) ..……… …………… (2) Encrypte-byte3 = (byte-3) XOR (ASCII of M) ..……… …………… (3) Encrypte-byte4 = (byte-4) XOR (ASCII of N) ..……… …………… (4) The hardware components are : - Personnel computer (PC) : A PC furnished with a serial and parallel ports is used for interfacing with the RF transceiver. - RF transceiver: The RF transceiver performs the task of data transmission and reception. - Lab links : Lab links are sort of cables that connects the computer port to external electronic devices .They are used for conveying the stream of data from the PC to the RF transceiver. IV. SOFTWARE PROGRAM AND ALGORITHM To achieve the objective of the real time encryption procedure , we need to go through three steps as follows: 1. Step one is developing a Turbo C++ program in the computer . 2. Step two includes implementing the encryption strategy. 3. Step three includes activation of the RF transceiver.. Similar steps should be conducted for the decryption procedure.
  • 3. Computerized network security and cryptography International organization of Scientific Research 42 | P a g e The algorithm performs a real time encryption. The algorithm contains two subroutines . The subroutines are called one after the other. The first subroutine processes the data encryption strategy. The second subroutine outputs a byte from the data register of the LPT plus transmission of the encrypted byte by the RF transceiver..The execution of the two subroutines means performing a complex encryption procedure based on a set of four bytes table. The processing is repeated till the end of the data stream coming from the PC. The star ‘*’ in the plain text table denotes the bytes termination. The algorithm is : Start Initialization : … Program LPT port as output.. … Clear the data register of the LPT port. ... Generate ASCII coded four bytes table.(M , A , M , N) … ASCII coded bytes table Pointer = 1. ... Generate a hundred bytes plain text table ended with ‘*’. … Plain text table pointer = 1 . … Reserve a byte location for the (encrypted byte). … Disable the RF transceiver. Encryption strategy: …Access the first byte in the plan text table. Byte encryption : .. If a byte is star ‘*’ go to end of program. .. Call byte encryption subroutine. .. Call encrypted byte output subroutine. .. If (ASCII code table pointer > 4) , then put ASCII code table pointer to location 1. .. Go to byte encryption . End Byte encryption subroutine : .. Encrypted byte = ( Plain text byte) XOR ( ASCII code byte) .. Increment pain text table pointer. .. Increment ASCII code table pointer. Return. Encrypted byte output subroutine: .. Output the encrypted byte to the data register of the LPT port (address 378 Hexadecimal). .. Enable the RF transceiver for byte transmission. RF transceiver: .. If byte transmission is not acknowledged , then go to RF transceiver. .. Disable the RF transceiver. Return. V. RESULTS The system performs a complex non standard data encryption strategy. The generated four ASCII code bytes table is considered the essential part in the adapted encryption strategy..Table (1) below shows the results when operating the system . Table (1) The results when operating the system Plain text byte in (HEX) (Byte) XOR ( first byte in ASCII table ‘M’) (Byte) XOR ( second byte in ASCII table ‘A’) (Byte) XOR ( third byte in ASCII table ‘M’) (Byte) XOR ( fourth byte in ASCII table ‘N’) Encrypted byte in (HEX) 41 0C 0C 4F 10 10 4C 01 01 5A 14 14 The processing indicated in table (1) will be repeated 25 times. The 25 times repetition comes from dividing (100) by (4) .
  • 4. Computerized network security and cryptography International organization of Scientific Research 43 | P a g e VI. CONCLUSION The system design that enabled the data encryption and transmission adapted a non standard encryption strategy. The number of bytes in the generated ASCII code table equals four bytes while the assumed number of bytes in the plain text equals hundred..The assumed byte numbers in the two tables can be changed as well as the gate used in the algorithm .This means that the strategy is flexible and any change will not affect its principle .This type of encryption carries a high degree of data transmission security. REFERENCES [1] C. Gentry, Fully homomorphic encryption using ideal lattices, Symposium on the Theory of Computing (STOC), 2009, pp. 169-178. [2] P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in Advances in Cryptology EUROCRYPT’99, LNCS 1592, pp. 223–238, [3] Springer, New York, NY, USA, 1999. [4] Josh Benaloh, Dense Probabilistic Encryption, SAC 94, pages 120–128, 1994. [5] I. Damg˚ard and M. Jurik. A Length-Flexible Threshold Cryptosystem with Applications.ACISP ’03, pp. 350–356. [6] A. Kawachi, K. Tanaka, K. Xagawa. Multi-bit cryptosystems based on lattice problems. PKC ’07, pp. 315–329. [7] C.A. Melchor, G. Castagnos, and P. Gaborit. Lattice-based homomorphic encryption of vector spaces. ISIT ’08, pp. 1858–1862. [8] Craig Gentry Shai Halevi, Implementing Gentry’s Fully-Homomorphic Encryption Scheme Preliminary Report, August 5, 2010. https://researcher.ibm.com/ researcher/files/us-shaih/fhe-implementation.pdf [9] Frederiksen, T.K., A Practical Implementation of Regev’s LWE-based Cryptosystem,2010. [10] William Stallings, Cryptography and Network Security Principles and Practice, 5th Edition , Prentice Hall , 2011.