SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 68 | P a g e
Implementation of Dynamic Hill Cipher with
Message Digest Concatenation
Encryption Technique in Cloud Computing
*Muskaan Gupta, **Zatin Gupta , ***Ashish Gupta
Abstract— The data security in cloud computing is the core problem. Single security method cannot solve the security problem in
cloud computing. To advance cloud computing measures to ensure security is important. The solution is the data encryption. Before
storing it at virtual location, encrypt the data with keys. User selects the public key to encrypt data and upload the encrypted data to
the cloud. This Paper introduces a strong cryptography algorithm that provides the security of the data in cloud computing. The
proposed algorithm is based on encryption algorithm the hill cipher which was analyzed to be easily breakable if the matrix is known
due to its short key length and does not provide any message integrity. So there is the need to make it more typical for the intruder to
break it. To make data secure we implement a new security system using the strong secured algorithm Dynamic Hill Cipher With
Message Digest Concatenation which ensure message authentication, confidentiality and integrity of the data. Confidentiality provides
protection of transmitted data from passive attacks. The authentication service assures that a communication is authentic. The data
integrity is the assurance that data contain no modification.
Keywords: Cryptography, MD5, Digital signature, Hill cipher technique, Plain texts, Cipher text, ID.
——————————  ——————————
1 INTRODUCTION
loud computing, a rapidly developing information
technology, has aroused the concern of the whole
world. Cloud computing is Internet-based computing,
whereby shared resources, software and information, are
provided to computers and devices on-demand [3]. Cloud
computing is the product of the fusion of traditional
computing technology and network technology like grid
computing, distributed computing, parallel computing and
so on. However, there still exist many problems in cloud
computing today, a recent survey shows that data security
and privacy risks have become the primary concern for
people to shift to cloud computing. To advance cloud
computing, measures to ensure security is important.
Traditionally information security was provided by physical
(for e.g. rugged filing cabinets with locks) and
administrative mechanisms (for e.g. Personnel screening
procedures during hiring process).Growing computer use
implies a need for automated tools for protecting files and
other information stored on it. This is especially the case for
a shared system, such as a time-sharing system, and even
more so for systems that can be accessed over a public
telephone network, data network, or the Internet.
Information security requirements have changed in recent
times. Computer use requires automated tools to protect
files and other stored information. Use of networks and
communications links requires measures to protect data
during transmission. In the new world of computers and
electronics the electronic communication plays a vital role.
There is the basic need for security of data. Security is the
term that comes into the picture when some important or
sensitive information must be protect from an unauthorized
access. Hence there must be some way to protect the data
from them and even if he hack the information, he should
not be able to understand what the actual information in the
file is. It is essential to protect the sensitive information.
There are many chances that an unauthorized person can
have an access over the information in some way and can
access this sensitive information. There are many attackers
who can still break the code to find the message. These data
are important which when in wrong hands can create a lot
of damage to the company. To protect these damages we
need some method to protect our data. Cryptography is
used to protect data from these damages. There is no doubt
that the cloud computing is the development trend in the
future. Cloud computing brings us the approximately
infinite computing capability, good scalability ,service on-
demand and so on, also challenges at security, privacy, legal
issues and so on. With the fast development and widespread
applications of cloud computing, the management and
security of the network virtual access become increasingly
important. To assure security of data from any change done
by the intruder, we implement a new security system using
the strong secured algorithm-DYNAMIC HILL CIPHER
WITH MESSAGE DIGEST CONCATENATION that enables
and guarantees the security of the information. The
proposed system provides the facility to the receiver that
message is same as sent by the sender otherwise if a change
is done then the message will not be received by receiver.
The system is based on encryption and decryption, so it also
facilitates data confidentiality. Only the authorized users of
the system can send and receive the messages. The system
provides message authentication, confidentiality and
integrity of the data which are the necessary requirements
for secure electronic communication between sender and
receiver.
C
____________________________________
*M.Tech Scholar, RPIIT, Karnal, Haryana, India,
Muskaan.gupta31@gmail.com
**Assistant Professor, RKGIT, Ghaziabad, UP, India,
zatin.gupta2000@gmail.com
*** Assistant Professor, RPIIT, Karnal, Haryana, India,
mtech.ashish@yahoo.in
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 69 | P a g e
2 THEORETICAL BACKGROUND
ENCRYPTION
Encryption is a procedure that involves a mathematical
transformation of information into scrambled information,
called “cipher text”. The computational process (an
algorithm) uses a key to compute or convert plain text into
cipher text with numbers or strings of characters. The
resulting encrypted text is decipherable only by the holder
of the corresponding key. This deciphering process is also
called decryption. There are many different and
incompatible encryption techniques available, and not all
the software we need to use implements a common
approach. One very important feature of a good encryption
scheme is the ability to specify a key or password of some
kind, and have the encryption method alter itself such that
each key or password produces a different encrypted
output, which requires a unique ‘key’ or ‘password’ to
decrypt. We are using symmetric block cipher which works
as follows:
`
Figure 1: Symmetric Encryption
The Hill Cipher was developed by Lester Hill in 1929. The
encryption algorithm takes m successive plaintext letters
and substitutes for them m cipher text letters. The
substitution is determined by m-linear equations in which
each character is assigned a numerical value (a = 0, b = 1 ... z
= 25). For m= 3, the system can be described as follows:
c1 = (k11P1 + k12P2 +k13P3) mod 26
c2 = (k21P1 +k22P2 + k23P3) mod 26
c3 = (k31P1 + k32P2 +k33P3) mod 26
This can be expressed as : C = KP mod 26where C and P are
column vectors of length 3, representing the plaintext and
cipher text, and K is a 3 x 3 matrix, representing the
encryption key. Operations are performed mod 26.
Decryption requires using the inverse of the matrix K. The
inverse K-1of a matrix K is defined by the equation KK-1=
K-1 K = I, where I is the matrix that is all zeros except for
ones along the main diagonal from upper left to lower right.
The inverse of a matrix does not always exist, but when it
does, it satisfies the preceding equation.
MD5 (Message Digest 5) Ron Rivest, who has been
designed this algorithm in 1991 to replace an earlier hash
function, MD4 (Message-digest protocol 4). It is a widely
used algorithm in cryptography and often used to check the
integrity of a file. An MD5 hash is typically expressed as a 32
digit hexadecimal number. MD5 processes a variable-length
message into a fixed-length output of 128 bits. The input
message is broken up into chunks of 512-bit blocks (sixteen
32- bit little endian integers); the message is padded so that
its length is divisible by 512. The padding works as follows:
first a single bit, 1, is appended to the end of the message.
This is followed by as many zeros as are required to bring
the length of the message up to 64 bits less than a multiple of
512. The remaining bits are filled up with a 64-bit integer
representing the length of the original message, in bits. The
main MD5 algorithm operates on a 128-bit state, divided
into four 32-bit words, denoted A, B, C and D. These are
initialized to certain fixed constants. The main algorithm
then operates on each 512-bit message block in turn, each
block modifying the state. The 128- bit (16-byte) MD5 hashes
(also termed message digests) are typically represented as a
sequence of 32 hexadecimal digits.
3 PROPOSED METHODOLOGY
Our proposed secured electronic transaction methodology is
dynamic hill cipher and message digest concatenation.
Now here we try to use the concept of dynamic key size that
will be selected by the user one who encrypts the message.
Any security system performs the fundamental security
services: confidentiality, authentication, integrity checking
and non repudiation. The proposed methodology performs
all the security operations and is given in table.
Systems Confidentiality Authentication Integrity
Message
authentica
tion with
encryption
Yes Yes No
Message
authentica
tion with
message
digest
no Yes Yes
Proposed
system
yes yes Yes
Table 1: Comparative analysis for different message
transaction
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 70 | P a g e
3.1 ALGORITHMIC APPROACHES
The algorithm has been divided into two phases. In the 1st
phase, Sender Generates the message to send through some
steps of encryption and in the 2nd phase the receiver
receives the message and decrypt with some methods. The
authentication process is done in the receiver end, if the
authentication is done properly then the message is
displayed or else it is damaged or dropped.
Figure 2: Flow Diagram
The complete algorithm is given below:
Phase - 1: (Sender Site)
1. The sender selects a key length that is used as the length
of the key matrix.
2. Generate a square matrix (M) of length K which has an
inverse matrix (M-1) with the property that the product of
the key matrix and the inverse matrix with modulo
operation produces identity matrix (I). That is, M x M-1 = I.
The matrix M is used as the K in the encryption process and
the inverse matrix M-1 is sent to the destination to use for
decryption.
3. Enter the transmitting message (P) and perform Hill
cipher encryption technique to produce cipher text (C).That
is, C = EK (P).
4. To generate message digest (D), performs the bit-wise
XOR operation in the equal two halves of the message P.
Then again perform the bit-wise XOR operation in the equal
halves of the produced previous output and again perform
the same operation in the last output and final output is the
digest D.
5. The generated message digest D is concatenated to the
cipher text (C) and is sent to the destination B
Phase - 2: (Receiver Site)
6. In the destination, receiver B first decrypts the cipher text
C using the received inverse matrix M-1 and the decryption
algorithm Hill Cipher method to produce the plaintext P.
7. Receiver B then performs the same operations bit-wise
XOR on the plaintext and calculates new message digest
MD’ and compare it with the received message digest MD
and determine the integrity of the message
4 IMPLEMENTATION
The proposed electronic message transaction system has
been implemented using java programming.
 The login interface is in form of textboxes and buttons
where the user has to fill up the user id and password. If
the user is authorized, then only he or she can access the
software.
 After the login window, a new window is designed that
tells how the software works by giving directions. This
window also has three options. These are encryption,
decryption and exit.
 There is an encryption button.
 On click of encryptions button, several other buttons and
two editors will be shown. One of the editors is for writing
or getting of plain text and other is for getting of
encrypted data.
 The various buttons are generate_key, reset_data, encrypt,
save_encrypted_text, back, exit, check_key_validity and
open_file.
 There is a decryption button. On click of this button,
several other buttons and two editors will be shown. One
of the editors is for getting of encrypted text and other is
for gettingof plain text.
 The various buttons are get_data, reset_data, decrypt,
save_encrypted_text, back and exit.
 On clicking of back button, three options again will
reappear. These options are encryption, decryption and
exit.
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 71 | P a g e
Figure 3: ENCRYPTION WINDOW
Figure 4: ENTERING THE KEY SIZE
Figure 5: PLAIN TEXT AND ENCRYPTED TEXT
Figure 6: PLAIN TEXT FROM ENCRYPTED TEXT
5 FUTURE SCOPE
The main achievement is the correctly functional tool itself.
Unfortunately time constraints have meant that not all the
originally mentioned objectives were accomplished. The
various compression techniques may be applied for efficient
utilization of bandwidth and storage. This system can be
extended to work on the files containing Unicode characters
as well. This application can be extended to work with other
file formats. By addition of transferring of data from one
system to another, system can be enhanced.
6 CONCLUSION
We can conclude that representation of dynamic hill cipher
and message digest concatenation is more secure than hill
cipher using dynamic key .This algorithm provides high
security in terms of authentication, confidentiality and
integrity of data. The chances of breaking the encrypted data
in cloud computing will decrease too many folds due to the
use of dynamic key length and concatenated message digest.
The reason being, the intruder does not have the dynamic
value of key size. The algorithm is efficient, requires low
maintenance, secure and highly reliable security provider
that protects the valuable data of the users and curbs the
intruder’s attempts to attack that data in cloud computing.
ACKNOWLEDGEMENT
I wish to thank to Mr. Zatin Gupta, Assistant Professor, Raj
Kumar Goel Institute of Engineering & Technology,
Ghaziabad, U.P., India for his valuable guidance and
motivation, throughout the thesis period. Without his
guidance it is not possible for me to complete this work on
time.
REFERENCES
[1] Andrew S. Tanenbaum, Computer Networks, 4th edition,
Prentice-Hall, Inc 2003, ISBN- 81-203-2175-8, pp. 731- 732,
749-755,433-437
[2] Cryptographic Algorithms: http://www.eskimo.com/
~weidai/algorithms.html
[3] Zatin Gupta, Ashish Gupta, Saurabh Agrawal “ Cloud
Computing: A Promising Expertise” International Journal
of Research Review in Engineering Science and Technology
(ISSN 2278- 6643) | Volume-1 Issue-3, December 2012
[4] RSA Key Generator for default keys used:
http://crypto.cs.mcgill.ca/~crepeau
/RSA/generator_frame.html
[5] The Hill Cipher, http://www.math.sunysb.edu/~scott/
papers/MSTP/crypto/8Hill_Cipher.html
[6] Shahrokh Saeednia, How to Make the Hill Cipher Secure,
Cryptologia, 24(4), October 2000, pp353–360.
[7] "Hill Cipher Deciphered" provides an excellent explanation
of computing matrix inverses with regard to the Hill
cipher.
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 72 | P a g e
[8] An Introduction to Cryptology Prentice-Hall, ISBN 0-13-
030369-0web services
[9] William Stallings, Cryptography and Network Security
Principles and Practices, Fourth Edition
[10] Java Cryptography Architecture: Available at
http://www.tucows.apollo.lv/javacorner/jdk1.1.6/docs/g
uide/security/C ryptoSpec.html
[11] M. Ismail Jabiullah1, Md. Zakaria Sarker 2, Anisur Rahman
3 and M. Lutfar Rahman 4 1Department of Software
Engineering, Daffodil International University,2Institute of
Science and Technology, National University, Dhanmondi,
Dhaka.3Department of Computer Science and Engineering,
Daffodil International University 4Department of
Computer Science and Engineering, Dhaka University,
Bangladesh. E-mail: mijjabi@daffodilvarsity.edu.bd “A
SECURED MESSAGE TRANSACTION APPROACH BY
DYNAMIC HILL CIPHER GENERATION AND
MESSAGE DIGEST CONCATENATION” DAFFODIL
INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE
AND TECHNOLOGY, VOLUME 5, ISSUE 1, JANUARY
2010
[12] James Martin, Telecommunication And The Computer,3
ed, Prentice- Hall, Englewood Cliffs, N.J., 2001, pp.29-
135,137-142
[13] RSA Laboratories, http://www.rsasecurity.com
[14] On the Key of the Hill Cipher, http://jeff.over.bz/papers/
undergrad/on- the-keyspace-of-the-hill-cipher.pdf
[15] Dobbertin, Hans (1996). "The Status of MD5 after a recent
attack". CryptoBytes 2.
[16] “Hill Cipher Deciphered" provides an excellent explanation
of computing matrix inverses with regard to the Hill
cipher.
[17] Farzad Sabahi ,Faculty of Computer Engineering Azad
University Iran fsabahi@ieee.org “cloud Computing
Security Threats and Responses”2011 IEEE
[18] Security Threats in Cloud Computing(Engr: Farhan Bashir
Shaikh Department of Computing & Technlogy SZABIST
Islamabad, Pakistan Shaikh.farhan@live.com ,Sajjad Haider
IT Department NUML Islamabad, Pakistan
Sajjadhyder@hotmail.com ”Security Threats in Cloud
Computing” presented at 6th international confrence on
internet technology,11-14 December 2011 IEEE
[19] Jianfeng Yang College of Computer Science and
Technology Sichuan University Chengdu, China E-mail:
jefferyang.yjf@gmail.com Zhibin Chen College of
Computer Science and Technology Sichuan University
Chengdu, China E-mail: 724086085@qq.com “Cloud
Computing Research and Security Issues”2010 IEEE
[20] Qunying Sun, Zhiyuan Hu Department of Strategy Alcatel-
Lucent Shanghai Bell, Co., Ltd, Shanghai, 201206, Chinae-
mail: Qunying.a.Sun@alcatel-sbell.com.cn ”Security for
Networks Virtual Access of Cloud Computing” presented
at “2012 Fourth International Conference on Multimedia
Information Networking and Security”
[21] Gurudatt Kulkarni & Jayant Gambhir Tejswini Patil
Amruta Dongare “A Security Aspects in Cloud
Computing”2012 IEEE

More Related Content

What's hot

Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environmentpaperpublications3
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 

What's hot (20)

Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
C0281010016
C0281010016C0281010016
C0281010016
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 

Viewers also liked

Physica b 08
Physica b 08Physica b 08
Physica b 08aman2395
 
Tugas Akhir Semester TI (Teknologi Informasi)
Tugas Akhir Semester TI (Teknologi Informasi) Tugas Akhir Semester TI (Teknologi Informasi)
Tugas Akhir Semester TI (Teknologi Informasi) Lee Gorgeouz
 
Manajer dan Manajemen
Manajer dan ManajemenManajer dan Manajemen
Manajer dan ManajemenLee Gorgeouz
 
ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013Ashish Gupta
 
Example an op amp circuit analysis lecture
Example an op amp circuit analysis lectureExample an op amp circuit analysis lecture
Example an op amp circuit analysis lectureaman2395
 

Viewers also liked (7)

CV Sofia Eskilsdotter en
CV Sofia Eskilsdotter enCV Sofia Eskilsdotter en
CV Sofia Eskilsdotter en
 
Physica b 08
Physica b 08Physica b 08
Physica b 08
 
Tugas Akhir Semester TI (Teknologi Informasi)
Tugas Akhir Semester TI (Teknologi Informasi) Tugas Akhir Semester TI (Teknologi Informasi)
Tugas Akhir Semester TI (Teknologi Informasi)
 
Electro Textile
Electro TextileElectro Textile
Electro Textile
 
Manajer dan Manajemen
Manajer dan ManajemenManajer dan Manajemen
Manajer dan Manajemen
 
ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013
 
Example an op amp circuit analysis lecture
Example an op amp circuit analysis lectureExample an op amp circuit analysis lecture
Example an op amp circuit analysis lecture
 

Similar to ijrrest_vol-2_issue-2_015

Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherBRNSSPublicationHubI
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
 
Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...TELKOMNIKA JOURNAL
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsIRJET Journal
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networksIAEME Publication
 

Similar to ijrrest_vol-2_issue-2_015 (20)

Fog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish CipherFog and Internet of Things Network Security through Blowfish Cipher
Fog and Internet of Things Network Security through Blowfish Cipher
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
D018141922
D018141922D018141922
D018141922
 
Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...Power analysis attack against encryption devices: a comprehensive analysis of...
Power analysis attack against encryption devices: a comprehensive analysis of...
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
Data security framework for cloud computing networks
Data security framework for cloud computing networksData security framework for cloud computing networks
Data security framework for cloud computing networks
 

ijrrest_vol-2_issue-2_015

  • 1. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 68 | P a g e Implementation of Dynamic Hill Cipher with Message Digest Concatenation Encryption Technique in Cloud Computing *Muskaan Gupta, **Zatin Gupta , ***Ashish Gupta Abstract— The data security in cloud computing is the core problem. Single security method cannot solve the security problem in cloud computing. To advance cloud computing measures to ensure security is important. The solution is the data encryption. Before storing it at virtual location, encrypt the data with keys. User selects the public key to encrypt data and upload the encrypted data to the cloud. This Paper introduces a strong cryptography algorithm that provides the security of the data in cloud computing. The proposed algorithm is based on encryption algorithm the hill cipher which was analyzed to be easily breakable if the matrix is known due to its short key length and does not provide any message integrity. So there is the need to make it more typical for the intruder to break it. To make data secure we implement a new security system using the strong secured algorithm Dynamic Hill Cipher With Message Digest Concatenation which ensure message authentication, confidentiality and integrity of the data. Confidentiality provides protection of transmitted data from passive attacks. The authentication service assures that a communication is authentic. The data integrity is the assurance that data contain no modification. Keywords: Cryptography, MD5, Digital signature, Hill cipher technique, Plain texts, Cipher text, ID. ——————————  —————————— 1 INTRODUCTION loud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand [3]. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing, parallel computing and so on. However, there still exist many problems in cloud computing today, a recent survey shows that data security and privacy risks have become the primary concern for people to shift to cloud computing. To advance cloud computing, measures to ensure security is important. Traditionally information security was provided by physical (for e.g. rugged filing cabinets with locks) and administrative mechanisms (for e.g. Personnel screening procedures during hiring process).Growing computer use implies a need for automated tools for protecting files and other information stored on it. This is especially the case for a shared system, such as a time-sharing system, and even more so for systems that can be accessed over a public telephone network, data network, or the Internet. Information security requirements have changed in recent times. Computer use requires automated tools to protect files and other stored information. Use of networks and communications links requires measures to protect data during transmission. In the new world of computers and electronics the electronic communication plays a vital role. There is the basic need for security of data. Security is the term that comes into the picture when some important or sensitive information must be protect from an unauthorized access. Hence there must be some way to protect the data from them and even if he hack the information, he should not be able to understand what the actual information in the file is. It is essential to protect the sensitive information. There are many chances that an unauthorized person can have an access over the information in some way and can access this sensitive information. There are many attackers who can still break the code to find the message. These data are important which when in wrong hands can create a lot of damage to the company. To protect these damages we need some method to protect our data. Cryptography is used to protect data from these damages. There is no doubt that the cloud computing is the development trend in the future. Cloud computing brings us the approximately infinite computing capability, good scalability ,service on- demand and so on, also challenges at security, privacy, legal issues and so on. With the fast development and widespread applications of cloud computing, the management and security of the network virtual access become increasingly important. To assure security of data from any change done by the intruder, we implement a new security system using the strong secured algorithm-DYNAMIC HILL CIPHER WITH MESSAGE DIGEST CONCATENATION that enables and guarantees the security of the information. The proposed system provides the facility to the receiver that message is same as sent by the sender otherwise if a change is done then the message will not be received by receiver. The system is based on encryption and decryption, so it also facilitates data confidentiality. Only the authorized users of the system can send and receive the messages. The system provides message authentication, confidentiality and integrity of the data which are the necessary requirements for secure electronic communication between sender and receiver. C ____________________________________ *M.Tech Scholar, RPIIT, Karnal, Haryana, India, Muskaan.gupta31@gmail.com **Assistant Professor, RKGIT, Ghaziabad, UP, India, zatin.gupta2000@gmail.com *** Assistant Professor, RPIIT, Karnal, Haryana, India, mtech.ashish@yahoo.in
  • 2. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 69 | P a g e 2 THEORETICAL BACKGROUND ENCRYPTION Encryption is a procedure that involves a mathematical transformation of information into scrambled information, called “cipher text”. The computational process (an algorithm) uses a key to compute or convert plain text into cipher text with numbers or strings of characters. The resulting encrypted text is decipherable only by the holder of the corresponding key. This deciphering process is also called decryption. There are many different and incompatible encryption techniques available, and not all the software we need to use implements a common approach. One very important feature of a good encryption scheme is the ability to specify a key or password of some kind, and have the encryption method alter itself such that each key or password produces a different encrypted output, which requires a unique ‘key’ or ‘password’ to decrypt. We are using symmetric block cipher which works as follows: ` Figure 1: Symmetric Encryption The Hill Cipher was developed by Lester Hill in 1929. The encryption algorithm takes m successive plaintext letters and substitutes for them m cipher text letters. The substitution is determined by m-linear equations in which each character is assigned a numerical value (a = 0, b = 1 ... z = 25). For m= 3, the system can be described as follows: c1 = (k11P1 + k12P2 +k13P3) mod 26 c2 = (k21P1 +k22P2 + k23P3) mod 26 c3 = (k31P1 + k32P2 +k33P3) mod 26 This can be expressed as : C = KP mod 26where C and P are column vectors of length 3, representing the plaintext and cipher text, and K is a 3 x 3 matrix, representing the encryption key. Operations are performed mod 26. Decryption requires using the inverse of the matrix K. The inverse K-1of a matrix K is defined by the equation KK-1= K-1 K = I, where I is the matrix that is all zeros except for ones along the main diagonal from upper left to lower right. The inverse of a matrix does not always exist, but when it does, it satisfies the preceding equation. MD5 (Message Digest 5) Ron Rivest, who has been designed this algorithm in 1991 to replace an earlier hash function, MD4 (Message-digest protocol 4). It is a widely used algorithm in cryptography and often used to check the integrity of a file. An MD5 hash is typically expressed as a 32 digit hexadecimal number. MD5 processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks (sixteen 32- bit little endian integers); the message is padded so that its length is divisible by 512. The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits less than a multiple of 512. The remaining bits are filled up with a 64-bit integer representing the length of the original message, in bits. The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C and D. These are initialized to certain fixed constants. The main algorithm then operates on each 512-bit message block in turn, each block modifying the state. The 128- bit (16-byte) MD5 hashes (also termed message digests) are typically represented as a sequence of 32 hexadecimal digits. 3 PROPOSED METHODOLOGY Our proposed secured electronic transaction methodology is dynamic hill cipher and message digest concatenation. Now here we try to use the concept of dynamic key size that will be selected by the user one who encrypts the message. Any security system performs the fundamental security services: confidentiality, authentication, integrity checking and non repudiation. The proposed methodology performs all the security operations and is given in table. Systems Confidentiality Authentication Integrity Message authentica tion with encryption Yes Yes No Message authentica tion with message digest no Yes Yes Proposed system yes yes Yes Table 1: Comparative analysis for different message transaction
  • 3. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 70 | P a g e 3.1 ALGORITHMIC APPROACHES The algorithm has been divided into two phases. In the 1st phase, Sender Generates the message to send through some steps of encryption and in the 2nd phase the receiver receives the message and decrypt with some methods. The authentication process is done in the receiver end, if the authentication is done properly then the message is displayed or else it is damaged or dropped. Figure 2: Flow Diagram The complete algorithm is given below: Phase - 1: (Sender Site) 1. The sender selects a key length that is used as the length of the key matrix. 2. Generate a square matrix (M) of length K which has an inverse matrix (M-1) with the property that the product of the key matrix and the inverse matrix with modulo operation produces identity matrix (I). That is, M x M-1 = I. The matrix M is used as the K in the encryption process and the inverse matrix M-1 is sent to the destination to use for decryption. 3. Enter the transmitting message (P) and perform Hill cipher encryption technique to produce cipher text (C).That is, C = EK (P). 4. To generate message digest (D), performs the bit-wise XOR operation in the equal two halves of the message P. Then again perform the bit-wise XOR operation in the equal halves of the produced previous output and again perform the same operation in the last output and final output is the digest D. 5. The generated message digest D is concatenated to the cipher text (C) and is sent to the destination B Phase - 2: (Receiver Site) 6. In the destination, receiver B first decrypts the cipher text C using the received inverse matrix M-1 and the decryption algorithm Hill Cipher method to produce the plaintext P. 7. Receiver B then performs the same operations bit-wise XOR on the plaintext and calculates new message digest MD’ and compare it with the received message digest MD and determine the integrity of the message 4 IMPLEMENTATION The proposed electronic message transaction system has been implemented using java programming.  The login interface is in form of textboxes and buttons where the user has to fill up the user id and password. If the user is authorized, then only he or she can access the software.  After the login window, a new window is designed that tells how the software works by giving directions. This window also has three options. These are encryption, decryption and exit.  There is an encryption button.  On click of encryptions button, several other buttons and two editors will be shown. One of the editors is for writing or getting of plain text and other is for getting of encrypted data.  The various buttons are generate_key, reset_data, encrypt, save_encrypted_text, back, exit, check_key_validity and open_file.  There is a decryption button. On click of this button, several other buttons and two editors will be shown. One of the editors is for getting of encrypted text and other is for gettingof plain text.  The various buttons are get_data, reset_data, decrypt, save_encrypted_text, back and exit.  On clicking of back button, three options again will reappear. These options are encryption, decryption and exit.
  • 4. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 71 | P a g e Figure 3: ENCRYPTION WINDOW Figure 4: ENTERING THE KEY SIZE Figure 5: PLAIN TEXT AND ENCRYPTED TEXT Figure 6: PLAIN TEXT FROM ENCRYPTED TEXT 5 FUTURE SCOPE The main achievement is the correctly functional tool itself. Unfortunately time constraints have meant that not all the originally mentioned objectives were accomplished. The various compression techniques may be applied for efficient utilization of bandwidth and storage. This system can be extended to work on the files containing Unicode characters as well. This application can be extended to work with other file formats. By addition of transferring of data from one system to another, system can be enhanced. 6 CONCLUSION We can conclude that representation of dynamic hill cipher and message digest concatenation is more secure than hill cipher using dynamic key .This algorithm provides high security in terms of authentication, confidentiality and integrity of data. The chances of breaking the encrypted data in cloud computing will decrease too many folds due to the use of dynamic key length and concatenated message digest. The reason being, the intruder does not have the dynamic value of key size. The algorithm is efficient, requires low maintenance, secure and highly reliable security provider that protects the valuable data of the users and curbs the intruder’s attempts to attack that data in cloud computing. ACKNOWLEDGEMENT I wish to thank to Mr. Zatin Gupta, Assistant Professor, Raj Kumar Goel Institute of Engineering & Technology, Ghaziabad, U.P., India for his valuable guidance and motivation, throughout the thesis period. Without his guidance it is not possible for me to complete this work on time. REFERENCES [1] Andrew S. Tanenbaum, Computer Networks, 4th edition, Prentice-Hall, Inc 2003, ISBN- 81-203-2175-8, pp. 731- 732, 749-755,433-437 [2] Cryptographic Algorithms: http://www.eskimo.com/ ~weidai/algorithms.html [3] Zatin Gupta, Ashish Gupta, Saurabh Agrawal “ Cloud Computing: A Promising Expertise” International Journal of Research Review in Engineering Science and Technology (ISSN 2278- 6643) | Volume-1 Issue-3, December 2012 [4] RSA Key Generator for default keys used: http://crypto.cs.mcgill.ca/~crepeau /RSA/generator_frame.html [5] The Hill Cipher, http://www.math.sunysb.edu/~scott/ papers/MSTP/crypto/8Hill_Cipher.html [6] Shahrokh Saeednia, How to Make the Hill Cipher Secure, Cryptologia, 24(4), October 2000, pp353–360. [7] "Hill Cipher Deciphered" provides an excellent explanation of computing matrix inverses with regard to the Hill cipher.
  • 5. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 72 | P a g e [8] An Introduction to Cryptology Prentice-Hall, ISBN 0-13- 030369-0web services [9] William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition [10] Java Cryptography Architecture: Available at http://www.tucows.apollo.lv/javacorner/jdk1.1.6/docs/g uide/security/C ryptoSpec.html [11] M. Ismail Jabiullah1, Md. Zakaria Sarker 2, Anisur Rahman 3 and M. Lutfar Rahman 4 1Department of Software Engineering, Daffodil International University,2Institute of Science and Technology, National University, Dhanmondi, Dhaka.3Department of Computer Science and Engineering, Daffodil International University 4Department of Computer Science and Engineering, Dhaka University, Bangladesh. E-mail: mijjabi@daffodilvarsity.edu.bd “A SECURED MESSAGE TRANSACTION APPROACH BY DYNAMIC HILL CIPHER GENERATION AND MESSAGE DIGEST CONCATENATION” DAFFODIL INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE AND TECHNOLOGY, VOLUME 5, ISSUE 1, JANUARY 2010 [12] James Martin, Telecommunication And The Computer,3 ed, Prentice- Hall, Englewood Cliffs, N.J., 2001, pp.29- 135,137-142 [13] RSA Laboratories, http://www.rsasecurity.com [14] On the Key of the Hill Cipher, http://jeff.over.bz/papers/ undergrad/on- the-keyspace-of-the-hill-cipher.pdf [15] Dobbertin, Hans (1996). "The Status of MD5 after a recent attack". CryptoBytes 2. [16] “Hill Cipher Deciphered" provides an excellent explanation of computing matrix inverses with regard to the Hill cipher. [17] Farzad Sabahi ,Faculty of Computer Engineering Azad University Iran fsabahi@ieee.org “cloud Computing Security Threats and Responses”2011 IEEE [18] Security Threats in Cloud Computing(Engr: Farhan Bashir Shaikh Department of Computing & Technlogy SZABIST Islamabad, Pakistan Shaikh.farhan@live.com ,Sajjad Haider IT Department NUML Islamabad, Pakistan Sajjadhyder@hotmail.com ”Security Threats in Cloud Computing” presented at 6th international confrence on internet technology,11-14 December 2011 IEEE [19] Jianfeng Yang College of Computer Science and Technology Sichuan University Chengdu, China E-mail: jefferyang.yjf@gmail.com Zhibin Chen College of Computer Science and Technology Sichuan University Chengdu, China E-mail: 724086085@qq.com “Cloud Computing Research and Security Issues”2010 IEEE [20] Qunying Sun, Zhiyuan Hu Department of Strategy Alcatel- Lucent Shanghai Bell, Co., Ltd, Shanghai, 201206, Chinae- mail: Qunying.a.Sun@alcatel-sbell.com.cn ”Security for Networks Virtual Access of Cloud Computing” presented at “2012 Fourth International Conference on Multimedia Information Networking and Security” [21] Gurudatt Kulkarni & Jayant Gambhir Tejswini Patil Amruta Dongare “A Security Aspects in Cloud Computing”2012 IEEE