This document proposes a new technique to solve the key exchange problem in cryptography. It discusses existing key exchange methods that rely on additional encryption processes or pre-shared secrets. The proposed method mixes the cipher key with the encrypted data block such that only the intended receiver can extract both the key and data. This allows key exchange without pre-sharing secrets or additional encryption steps. It aims to provide a more efficient and secure key exchange technique compared to traditional methods.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
Abstract In this modern era, with the vast improvement in the field of internet, security is a major issue at hand. A lot of crimes, or to say, hacking is prevalent. This system "Safe Exchange of Encrypted Data (SEED)" handles sharing secret data between the sender and receiver in a cryptic manner by providing a new approach to symmetric encryption with ensured confidentiality, authenticity, integrity and availability of a secure communication, and protection against Man-in-the-Middle attacks even without a Public Key Infrastructure (PKI) or endpoint certificates, in the unprotected network space. This system makes use of an efficient concept called 'ephemeral shared session key', which being a combination of public and private keys can only be generated at both ends and negates the need of having to transmit a symmetric key between the users. The text data is encrypted using a new symmetric key algorithm known as “Xenacrypt” which is more secure than any other existing symmetric key algorithms. This system provides integrity through an efficient algorithm which we have implemented to indicate data thefts by any malicious attacks or threats. Application of this crypto-system will have a huge impact in the future of transmitting secure data especially in the field of business transaction and military operations. Keywords:-encryption;signed diffie hellman;signature;VOIP Integrity,verification,decryption,authentication.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Computer Security : Introduction, Need for security, Principles of Security,
Types of Attacks
Cryptography : Plain text and Cipher Text, Substitution techniques, Caesar
Cipher, Mono-alphabetic Cipher, Polygram, Polyalphabetic Substitution,
Playfair, Hill Cipher, Transposition techniques, Encryption and Decryption,
Symmetric and Asymmetric Key Cryptography, Steganography, Key Range and
Key Size,
Possible Types of Attacks
Symmetric Key Algorithms and AES: Algorithms types and modes, Overview
of Symmetric key Cryptography, Data Encryption Standard (DES), International
Data Encryption Algorithm (IDEA), RC4, RC5, Blowfish, Advanced Encryption
Standard (AES)
Asymmetric Key Algorithms, Digital Signatures and RSA: Brief history of
Asymmetric Key Cryptography, Overview of Asymmetric Key Cryptography,
RSA algorithm, Symmetric and Asymmetric key cryptography together, Digital
Signatures, Knapsack Algorithm, Some other algorithms (Elliptic curve
cryptography, ElGamal, problems with the public key exchange)
1 Symmetric Encryption
2 Message Authentication and Hash Functions
3 Public-Key Encryption
4 Digital Signatures and Key Management
5 Random and Pseudo random Numbers
6 Practical Application: Encryption of Stored Data
7 Symmetric vs Asymmetric
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
Abstract In this modern era, with the vast improvement in the field of internet, security is a major issue at hand. A lot of crimes, or to say, hacking is prevalent. This system "Safe Exchange of Encrypted Data (SEED)" handles sharing secret data between the sender and receiver in a cryptic manner by providing a new approach to symmetric encryption with ensured confidentiality, authenticity, integrity and availability of a secure communication, and protection against Man-in-the-Middle attacks even without a Public Key Infrastructure (PKI) or endpoint certificates, in the unprotected network space. This system makes use of an efficient concept called 'ephemeral shared session key', which being a combination of public and private keys can only be generated at both ends and negates the need of having to transmit a symmetric key between the users. The text data is encrypted using a new symmetric key algorithm known as “Xenacrypt” which is more secure than any other existing symmetric key algorithms. This system provides integrity through an efficient algorithm which we have implemented to indicate data thefts by any malicious attacks or threats. Application of this crypto-system will have a huge impact in the future of transmitting secure data especially in the field of business transaction and military operations. Keywords:-encryption;signed diffie hellman;signature;VOIP Integrity,verification,decryption,authentication.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Computer Security : Introduction, Need for security, Principles of Security,
Types of Attacks
Cryptography : Plain text and Cipher Text, Substitution techniques, Caesar
Cipher, Mono-alphabetic Cipher, Polygram, Polyalphabetic Substitution,
Playfair, Hill Cipher, Transposition techniques, Encryption and Decryption,
Symmetric and Asymmetric Key Cryptography, Steganography, Key Range and
Key Size,
Possible Types of Attacks
Symmetric Key Algorithms and AES: Algorithms types and modes, Overview
of Symmetric key Cryptography, Data Encryption Standard (DES), International
Data Encryption Algorithm (IDEA), RC4, RC5, Blowfish, Advanced Encryption
Standard (AES)
Asymmetric Key Algorithms, Digital Signatures and RSA: Brief history of
Asymmetric Key Cryptography, Overview of Asymmetric Key Cryptography,
RSA algorithm, Symmetric and Asymmetric key cryptography together, Digital
Signatures, Knapsack Algorithm, Some other algorithms (Elliptic curve
cryptography, ElGamal, problems with the public key exchange)
1 Symmetric Encryption
2 Message Authentication and Hash Functions
3 Public-Key Encryption
4 Digital Signatures and Key Management
5 Random and Pseudo random Numbers
6 Practical Application: Encryption of Stored Data
7 Symmetric vs Asymmetric
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
In the today’s world of digital communication networks, the privacy and security of the transmitted data has become a basic necessity for communication. Data Security is the science and study of techniques of securing data in computer and communication systems from unknown users, disclosures and modifications. Cyber security issues plays a vital role in moving towards digital information age. Therefore, the encryption and decryption systems have been implemented for protecting information. The internet users are rapidly increasing day by day which causes a lot of cyber-criminals. The security of not only the single system but the entire systems will be ensured by the task of network security and controlled by network administrator. In this paper, an attempt has been made to review the various methods of Cryptography and how these methods will help to secure data from unauthenticated users. This paper has primarily focused on Cyber Security and Cryptographic concepts. This paper has also discusses the various attacks and cryptographic algorithms that are used in various applications of cyber security.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
In the today’s world of digital communication networks, the privacy and security of the transmitted data has become a basic necessity for communication. Data Security is the science and study of techniques of securing data in computer and communication systems from unknown users, disclosures and modifications. Cyber security issues plays a vital role in moving towards digital information age. Therefore, the encryption and decryption systems have been implemented for protecting information. The internet users are rapidly increasing day by day which causes a lot of cyber-criminals. The security of not only the single system but the entire systems will be ensured by the task of network security and controlled by network administrator. In this paper, an attempt has been made to review the various methods of Cryptography and how these methods will help to secure data from unauthenticated users. This paper has primarily focused on Cyber Security and Cryptographic concepts. This paper has also discusses the various attacks and cryptographic algorithms that are used in various applications of cyber security.
— The automation of fault detection in material
science is getting popular because of less cost and time. Steel
plates fault detection is an important material science problem.
Data mining techniques deal with data analysis of large data.
Decision trees are very popular classifiers because of their simple
structures and accuracy. A classifier ensemble is a set of
classifiers whose individual decisions are combined in to classify
new examples. Classifiers ensembles generally perform better
than single classifier. In this paper, we show the application of
decision tree ensembles for steel plates faults prediction. The
results suggest that Random Subspace and AdaBoost.M1 are the
best ensemble methods for steel plates faults prediction with
prediction accuracy more than 80%. We also demonstrate that if
insignificant features are removed from the datasets, the
performance of the decision tree ensembles improve for steel
plates faults prediction. The results suggest the future
development of steel plate faults analysis tools by using decision
tree ensembles.
We present a case of murder with a blunt object.
On the body of the deceased were identified specific traces in
the form of suffusions. Four people were suspected for the
murder. During the investigative four pairs of sneakers were
obtained. A full forensic examination was performed which
excluded three of the four pairs of suspected shoes. The forth
pair was a match. This kind of research is extremely important
in forensic practice and theory, as they allow forensic experts
to identify the objects that left specific traces on the body of a
victim or deceased. They are also extremely important during
investigation of criminal offenses, especially when there is more
than one suspect.
The present study was attempted to examine the role of
paternal and maternal parenting styles as predictor of students’
academic achievement. Parental Authority Questionnaire (Buri,
1991) further translated in Urdu by (Babree, 1997) was used to
collect the information from participants. Student’s result of
previous final Exam was taken as Academic Achievement.
Sample of the present study was consist on the F.A/F.Sc students
(N= 350) of final year. Simple linear regression analysis was
applied to test the hypothesis. The result of the study showed that
maternal and paternal authoritative style was a positive predictor
of academic achievement of adolescent. While maternal and
paternal authoritarian styles of parents was found to be a
negative predictor of academic achievement. The results for
permissive parenting style of both mother and father were nonsignificant.
The present study provided an insight to the roles of
parenting to academic achievement
The quality of any body of surface or ground water
is a function of either both natural influences and human
influences. Without human influences water quality would be
determined by the weathering of bedrock minerals, by the
atmospheric processes of evaporation, transpiration and the
deposition of dust and salt by wind, by the natural leaching of
organic matter and nutrients from soil, by hydrological factors
that lead to runoff, and by biological processes within the aquatic
environment that can alter the physical and chemical
composition of water. Declining water quality has become a
global issue of concern as human populations griesrow, industrial
and agricultural activities expand, and climate change threatens
to cause major alterations to the hydrological cycle.
The protection of multimedia data is becoming very
important. The protection of this multimedia data can be done
with encryption or data hiding algorithms. To decrease
transmissions time the data transmission necessary.
Recently, more and more attention is paid to reversible data
hiding (RDH) in encrypted image. It maintains original area
could be perfectly restored after extraction of the hidden
message. In previous method embed data by reversibly vacating
area from the encrypted images, which may be subject to some
errors on data extraction and/or image restoration. A novel
method by reserving area before encryption with a traditional
RDH algorithm, and thus it is easy for the data hider to
reversibly embed data in the encrypted image. The proposed
method can achieve real reversibility, that is data extraction and
image recovery are free of any error. The hidden data can be
retrieved as and when required. The methods that are used in
reversible data hiding techniques like Lossless embedding and
encryption.
This deals with the image steganography as well as with the
different security issues, general overview of cryptography
approaches and about the different steganography
algorithms like Least Significant Bit (LSB) algorithm ,
JSteg, F5 algorithms. It also compares those algorithms in
means of speed, accuracy and security.
The purpose of paper is to recommend strategies to
increase customer loyalty through complaint management and as
a tool to manage risk. The paper encompasses the theoretical
concepts which emerge from the extensive review of literature on
complaints and risk. It was found that complaints and risk have a
significant relation and through complaint management, risk can
be reduced. The study has proposed COMPSAT Grid (reinforced
with literature review) demonstrating the state of Banks based on
no. of complaints and loyalty of customers. COMPSAT Grid can
become a base to design the strategies to increase customer’s
loyalty. The study is limited to the customer’s perceived risk. The
paper stresses on the importance of complaints in managing the
risk. Through COMPSAT grid the service providers may
modulate existing strategies to increase customer loyalty. The
concepts will establish complaint management as a basis of
marketing strategy modulation. The model is a theoretical
approach which is based on the concepts
Baylis-Hillman reaction has been achieved on
different organic motifs but with completion times of three to
six days. Micellar medium of CTAB in water along with the
organic base DABCO has been used to effect the BaylisHillman
reaction on a steroidal nucleus of Withaferin-A for the
first time with different aromatic aldehydes within a day to
synthesize a library of BH adducts (W1a –W14a) and (W1bW14b)
as a mixture of two isomers and W15 as a single
compound. The isomers were separated on column and the
major components were chosen for bio-evaluation. Cytotoxic
activity of the synthesized compounds was screened against a
panel of four cancer cell lines Lung A-549, Breast MCF-7,
Colon HCT-116 and Leukemia THP-1 along with 5-florouracil
and Mitomycin-C as references. All the compounds exhibited
promising activity against screened cell lines and were found to
possess enhaunced activity than parent compound. BH adducts
with aromatic systems having methoxy and nitro groups were
found to be more active.
Attitudes toward suicide may influence the
treatment content and outcomes. Hence, this study aimed to
investigate how public attitudes toward suicide were influenced
by (1) their degree of idealism; and (2) their degree of
relativism. A questionnaire survey with Suicide Perception
Scale and Ethic Position Questionnaire was carried out on 50
male and 50 female participants (aged 21 and above) from
Klang Valley, Malaysia to obtain answer. The findings
supported both hypotheses, indicated that (1) higher idealism is
associated with lower level of acceptance toward suicide; and
(2) higher relativism is associated with higher level of
acceptance toward suicide. In sum, variations in public’s
attitude toward suicide were related to individual differences in
personal ethical ideologies and moral philosophies.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
In this paper we study the problem of mining support counts using symmetric-key crypto which is more
efficient than previous work. Consider a scenario that each user has an option (like or unlike) of the
specified product, and a third party wants to obtain the popularity of this product. We design a much more
efficient privacy-preserving scheme for users to prevent the loss of the personal interests. Unlike most
previous works, we do not use any exponential or modular algorithms, but we provide a symmetric-key
based method which can also protect the information. Specifically, our protocol uses a third party that
generates a number of matrixes as each user’s key. Then user uses these key to encrypt their data which is
more efficient to obtain the support counts of a given pattern.
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
Data security for any organization by using public key infrastructure compone...eSAT Journals
Abstract In Digital world all type of information are moved around the whole world in the digital form. Securities of these digital data are very necessary from the intruder, enemies, and unauthorized individuals for any government and non-government organizations. Security is the protection against danger, criminals and loss. There are many features to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. Cryptography is one essential feature for secure communications. There are two techniques are used in cryptography one is secret key cryptography and another is public key cryptography. A PKI does not a particular business function; it is providing a foundation for other security services. The primary function of a PKI is to allow the distribution and use of public keys and certificates with security and integrity. The components of public key infrastructure are certification authority (CA), certificate revocation, registration authority (RA) and digital certificate. PKI contain complete information and identifications of there sender and receiver for authentication. In the basis of these identities PKI provide certificates and authentication for secure communication. In this paper study different components of PKI and there uses for secure any type of data. This paper presents the performance of a secure application for private organizations that offers services to both owner and other members of the same organization. The primary focus of this paper is better implementation of PKI with the help of there algorithms. Index Terms: Security, Cryptography, Encryption, Decryption, Public key, Private key, Public Key Infrastructure (PKI), Digital Certificate, Certification Authority (CA), Revocation, Registration Authority (RA).
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
Recent joint surgery studies reveal increased
revisions and resurfacing of the metal on metal hip joints. Metal
on metal hip implants were developed more than thirty years ago
and their application has been refined because of availability of
advanced manufacturing techniques and partly by advancements
in material science and engineering. Development of composite
materials may provide greater durability to metal-on-metal hip
implants .This review article is a study of the latest literature of
metal-on-metal hip implants and its various modeling techniques.
Numbers of methods are used for convergence and numerical
solution to investigate the performance of metal-on-metal hip
implant for accurate stable solution. This paper presents analysis
done by various researchers on metal-on-metal hip implants for
wear, lubrication, fatigue, bio-tribo-corrosion, design, toxicity
and resurfacing. After in vivo and in vitro studies, it is found that
all these methods have limitations. There is a need of more
insight for lubrication analysis, geometry of bearings, materials
and input parameters. The information provided in this work is
intended as an aid in the assessment of metal-on-metal hip joints.
Background Hospital contributes significantly tangible and intangible resources on a concurred plan by the scheduling of surgery on the OT list. Postponement decreases efficiency by declining throughput leads to wastage of resources hence burden to the nation. Patients and their family face economic and emotional implication due to the postponement. Postponement rate being a quality indicator controls check mechanism could be developed from the results. Postponement of elective scheduled operations results in inefficient use of the operating room (OR) time on the day of surgery. Inconvenience to patients and families are also caused by postponements. Moreover, the day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extent of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology A cross-sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from March 1st to September 30th, 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (surgeons, Anesthetist, Nursing Officer) and they were further evaluated time series analysis of scheduling of Operation Theater for moving average technique. Results Total 958 surgeries were scheduled and 772 surgeries performed were and 186 surgeries were postponed with a postponement rate of 19.42% in the cardiac surgery department during the study period. Month-wise postponement Rate exponential smoothing of time series data shows the dynamic of operating suits. To test throughput Postponement rate was plotted the postponed surgeries and on regression analysis is in a perfect linear relationship.
Introduction: Postponement of elective scheduled operations results in inefficient use of operating room (OR) time on the day of surgery. Inconvenience to patients and families also caused by postponements. Moreover, day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extend of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology: A cross sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from march 1st to September 30th 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (Surgeons, Anesthetist, Nursing officer) and they were further evaluated Time series analysis of scheduling of Operation Theater for Moving average Technique. Results: total 2,466 surgeries were scheduled and 1,980 surgeries were performed and 486 surgeries were postponed in the general surgery department during the study period. Month wise postponement forecast was in accordance with the performed surgeries and on regression analysis postponed surgeries were in perfect linear relationship with the postponement Rate.
In the present paper the experimental study of
Nanotechnology involves high cost for Lab set-up and the
experimentation processes were also slow. Attempt has also
been made to discuss the contributions towards the societal
change in the present convergence of Nano-systems and
information technologies. one cannot rely on experimental
nanotechnology alone. As such, the Computer- simulations and
modeling are one of the foundations of computational
nanotechnology. The computer modeling and simulations
were also referred as computational experimentations. The
accuracy of such Computational nano-technology based
experiment generally depends on the accuracy of the following
things: Intermolecular interaction, Numerical models and
Simulation schemes used. The essence of nanotechnology is
therefore size and control because of the diversity of
applications the plural term nanotechnology is preferred by
some nevertheless they all share the common feature of control
at the nanometer scale the latter focusing on the observation
and study of phenomena at the nanometer scale. In this paper,
a brief study of Computer-Simulation techniques as well as
some Experimental result
Solar cell absorber Kesterite- type Cu2ZnSnS4 (CZTS) thin films have been prepared by Chemical Bath Deposition (CBD). UV–vis absorption spectra measurement indicated that the band gap of as-synthesized CZTS was about1.68 eV, which was near the optimum value for photovoltaic solar conversion in a single-band-gap device. The polycrystalline CZTS thin films with kieserite crystal structure have been obtained by XRD. The average of crystalline size of CZTS is 27 nm
Multilevel inverters play a crucial part in the
areas of high and medium voltage applications. Among the three
main multilevel inverters used, the capacitor clamped multilevel
inverter(CCMLI) has advantage with respect to voltage
redundancies. This work proposes a switching pattern to improve
the performance of chosen H-bridge type CCMLI over
conventional CCMLI. The PWM technique used in this work is
Phase Opposition Disposition PWM(PODPWM). The
performance of proposed H-bridge type CCMLI is verified
through MATLAB-Simulink based simulation. It has been
observed that the THD is low in chosen CCMLI compared to
conventional CCMLI.
- In this paper, we introduce a practical mechanism of
compressing a binary phase code modulation (BPCM) signal
according to Barker code with 13 chips in presence of additive
white Gaussian noise (AWGN) by using a digital matched filter
(DMF) corresponding to time domain convolution algorithm of
input and reference signals using Cyclone II EP2C70F896C6
FPGA from ALTERA placed on education and development
board DE2-70 with the following parameters: frequency of
BPCM signal fIF=2 MHz, sampling frequency
f MHz SAM 50
,pulse period
T 200s
, pulse width
S 13sc
, chip width
CH 1sc
, compressing factor
KCOM 13
, SNRinp=1/1, 1/2, 1/3, 1/4, 1/5 and processing
gain factor SNRout/SNRinp=11.14 dB.
The results of filter operation are evaluated using a digital
oscilloscope GDS-1052U to display the input and output signals
for different SNRinp.
Flooding is one of the most devastating natural
disasters in Nigeria. The impact of flooding on human activities
cannot be overemphasized. It can threaten human lives, their
property, environment and the economy. Different techniques
exist to manage and analyze the impact of flooding. Some of these
techniques have not been effective in management of flood
disaster. Remote sensing technique presents itself as an effective
and efficient means of managing flood disaster. In this study,
SPOT-10 image was used to perform land cover/ land use
classification of the study area. Advanced Space borne Thermal
Emission and Reflection Radiometer (ASTER) image of 2010 was
used to generate the Digital Elevation Model (DEM). The image
focal statistics were generated using the Spatial Analyst/
Neighborhood/Focal Statistics Tool in ArcMap. The contour map
was produced using the Spatial Analyst/ Surface/ Contour Tools.
The DEM generated from the focal statistics was reclassified into
different risk levels based on variation of elevation values. The
depression in the DEM was filled and used to create the flow
direction map. The flow accumulation map was produced using
the flow direction data as input image. The stream network and
watershed were equally generated and the stream vectorized. The
reclassified DEM, stream network and vectorized land cover
classes were integrated and used to analyze the impact of flood on
the classes. The result shows that 27.86% of the area studied will
be affected at very high risk flood level, 35.63% at high risk,
17.90% at moderate risk, 10.72% at low risk, and 7.89% at no
risk flood level. Built up area class will be mostly affected at very
high risk flood level while farmland will be affected at high risk
flood level. Oshoro, Imhekpeme, and Weppa communities will be
affected at very high risk flood inundation while Ivighe, Uneme,
Igoide and Iviari communities will be at risk at high risk flood
inundation level. It is recommended among others that buildings
that fall within the “Very High Risk” area should be identified
and occupants possibly relocated to other areas such as the “No
Risk” area.
Without water, humans cannot live. Since time began,
we have lived by the water and vast tracts of waterless land have
been abandoned as it is too difficult to inhabit. At any given
moment, the earth’s atmosphere contains 4,000 cubic miles of
water, which is just 0.000012% of the 344 million cubic miles of
water on earth. Nature maintains this ratio via evaporation and
condensation, irrespective of the activities of man.
There is a certain need for an alternative to solve the water
scarcity. Obtaining water from the atmosphere is nothing new -
since the beginning of time, nature’s continuous hydrologic cycle
of evaporation and condensation in the form of rain or snow has
been the sole source and means of regenerating wholesome water
for all forms of life on earth.
An effective method to generate water is by the separation of
moisture present in air by condensation. In this study, the water
present in air is condensed on the surface of a container and then
collected in an external jacket provided on the container.
Insulations are provided to optimize the inner temperature of the
container.
The method is although uncommon but has certain advantages
which make it a success. The process is economical and does not
require a lot of utilities. It also helps in further reducing the
carbon footprint.
In every moment of functioning the Li-Ion
battery must provide the power required by the user, to have a
long operating life and to and to provide high reliability in
operation. The methods for analysis and testing batteries are
ensuring that all these conditions imposed to the batteries are
met by being tested depending on their intended use.
The success rate of real estate project is
decreasing as there is large scale of project and participation of
entities. It is necessary to study the risk factors involved in the
project. This paper focused on types of risks involved in the
project, risk factors, risk management tools & techniques.
Identification of risk of the project in terms of the total cost of the
project has been divided under Technical, Financial, Sociopolitical
and Statutory cost centers. Large real estate projects
have to tackle the following issues: land acquisition, skilledlabour
shortage, non-availability of skilled project managers, and
mechanization of the construction process to cater to the growing
demands. Non- availability of supporting infrastructure, political
issues like instability of the government leading to regulatory
issues, social issues, marketing forms an important part in these
projects as this is a onetime investment and the purchase cycle is
long , long development period makes the same project be at
different points in the real estate value cycle.
- In the present scenario carbon emission and sand
mining are major concern due to its hazardous effect to
environment and making serious imbalance to the ecosystem.
Various studies have been conducted to reduce severe effect on
environment, using byproducts like copper slag as partial
replacement of fine aggregate. Different researchers have also
revealed numerous uses of copper slag as a replacing agent in
determining the strength of concrete. A comprehensive review of
studies has been presented in this paper for scope of replacement
of fine aggregate from copper slag in concrete
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
Background: Septoplasty is a common surgical
procedure performed by otolaryngologists for the correction of
deviated nasal septum. This surgery may be associated with
numerous complications. To minimize these complications,
otolaryngologists frequently pack both nasal cavities with
different types of nasal packing. Despite all its advantages,
nasal packing is also associated with some disadvantages. To
avoid these issues, many surgeons use suturing techniques to
obviate the need for packing after surgery.
Objective: To determine the efficacy and safety of trans-septal
suture technique in preventing complications and decreasing
morbidity after septoplasty in comparison with nasal packing.
Patients and methods: Prospective comparative study. This
study was conducted in the department of Otolaryngology -
Head and Neck Surgery, Rizgary Teaching Hospital - Erbil,
from the 6th of May 2014 to the 30th of November 2014.
A total of 60 patients aged 18-45 years, undergoing septoplasty,
were included in the study. Before surgery, patients were
randomly divided into two equal groups. Group (A) with transseptal
suture technique was compared with group (B) in which
nasal packing with Merocel was done. Postoperative morbidity
in terms of pain, bleeding, postnasal drip, sleep disturbance,
dysphagia, headache and epiphora along with postoperative
complications including septal hematoma, septal perforation,
crustation and synechiae formation were assessed over a follow
up period of four weeks.
Results: Out of 60 patients, 37 patients were males (61.7%)
and 23 patients were females (38.3%). Patients with nasal
packing had significantly more postoperative pain (P<0.05)><0.05). There was no significant difference between
the two groups with respect to nasal bleeding, septal
hematoma, septal perforation, crustation and synechiae
formation.
Conclusion: Septoplasty can be safely performed using transseptal
suturing technique without nasal packing.
The basic reason behind the need to
monitor water quality is to verify whether the examined
water quality is suitable for intended usage or not. This
study is conducted on Al -Shamiya al- sharqi drain in
Diwaniya city in Iraq to make valid assessment for the
level of parameters measured and to realize their effects
on irrigation. In order to assess the drainage water
quality for irrigation purposes with a high accuracy, the
Irrigation Water Quality Index (IWQI) will be examined
and upgraded (integrated with GIS) to make a
classification for drainage water. For this purpose, ten
samples of drainage water were taken from different ten
location of the stuay area. The collected samples were
analyzed chemically for different elements which affect
water quality for irrigation.These elements are :
Calcium(Ca+2), Sodium(Na+
), Magnesium(Mg+2),
Chloride( ), Potassium(K+
), Bicarbonate(HCO3),
Nitrate(NO3), Sulfate( , Phosphate( , Electrical
Conductivity(EC), Total Dissolved Solids (TDS), Total
Suspended Solids (TSS) and pH-values (PH). Sodium
Adsorption Ratio (SAR) and Sodium Content (Na%)
have been also calculated. Results suggest that, the use of
GIS and Water Quality Index (WQI) methods could
provide an extremely interesting as well as efficient tool
to water resource management. The results analysis of
(IWQI) maps confirms that: 52% of the drainage water
in study area falls within the "Low restriction" (LR) and
47%of study area has water with (Moderate
restriction)(MR),While 1% of drainage water in the
study area classified as (Sever restriction) (SR). So, the
drainage water should be used with the soil having high
permeability with some constraints imposed on types of
plant for specified tolerance of salts
The cable-hoisting method and rail cable-lifting
method are widely used in the construction of suspension bridge.
This paper takes a suspension bridge in Hunan as an example,
and expounds the two construction methods, and analyzes their
respective merits and disadvantages.
This paper presents the details on the
experimental investigation carried out to get the desired fresh
properties of the SCC. Tests were performed on various mixtures
to obtain the required SCC. In the present research work we
have replaced 15% of cement with class F fly ash. By varying the
quantity of water and sand the mortar mix was prepared. Later
varying percentage of coarse aggregate was added to the mortar
to obtain the desired SCC.
The batteries used in electric and hybrid vehicles
consists of several cells with voltages between 3.6V battery and
4.2 V in series or parallel combinations of configurations for
obtaining the necessary available voltages in the operation of a
hybrid electric vehicle. How malfunction of a single cell affects
the behavior of the entire battery pack, BMS main function is to
protect individual cells against over-discharge, overload or
overheating. This is done by correct balancing of the cells. In
addition BMS estimates the battery charge status
This project aims at using (PD-MCPWM) Phase
disposition multi carrier pulse width modulation technique to
reduce leakage current in a transformerless cascaded multilevel
inverter for PV systems. Advantages of transformerless PV
inverter topology is as follows, simple structure, low weight and
provides higher efficiency , but however this topology provides a
path for the leakage current to flow through the parasitic
capacitance formed between the PV module and the ground.
Modulation technique reduces leakage current with an added
advantage without adding any extra components.
Many people in Africa depend on water from
rivers and borehole, but purity of the drinking water from these
sources remains questionable. Mudzira River being the longest
River in a village called Vimtim located in Mubi North Local
government area in Adamawa State was studied in the months of
September to December, 2012 to ascertain the suitability of the
water for human consumption and other related uses. Five study
point: inlet (A, B), middle (C) and out let (D, E) were adopted for
monitoring the physico-chemical parameters using standard
procedures. The mean total temperature values were A (25.000C),
B (24.500C), C (25.500C), D (24.000C) and E (24.000C. Average P
H
values were A (8.00), B (7.87), C (8.20) D (8.37) and E (8.13). The
average conductivity values were A (73.90
1 cms
), B
(73.11
1 cms
), D (74.00
1 cms
) and E (73. 80
1 cms
). The
average total dissolves solid value of each sample were A (17.10),
B (17.10), C (20.00) D (21.64) and E (21.60.). The average
turbidity value of sample were A (47.00), B (47.00), C (50.00) D
(53.00) and E (50.00). Average total hardness value are A
(20.00mg/l), B (20.00mg/L) C (24.00mg/L), D (20.00mg/L) and E
(20.00mg/L). The average chloride content were A (12mg/L), B
(16mg/L), C (12 mg/L) D (16mg/L) and E (16mg/L). The average
calcium content were A (0.3mg/L) B (0.4mg/L), C (0.3mg/L), D
(0.3mg/L) and E (0.2mg/L). The average content of magnesium
were A (12mg/L), B (16mg/L), C (16Mg/L), D (12mg/L), E
(12mg/L). The lead content of River Mudzira water was
negligible. The mean coliform count were A (4), B (3), C (6), D
(7), and E (4).The values of the parameters studied were within
the WHO/NAFDAC recommended standards, excepts for total
coliform levels. In conclusion Vimtim residents consuming
untreated water from River Mudzira are potentially exposed to
possible acute, sub chronic or even chronic water borne diseases
like typhoid fever, dysentery, diarrhea etc.
More from International Journal of Technical Research & Application (20)
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
Ijtra150171
1. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 113-115
113 | P a g e
NEW TECHNIQUE TO SOLVE KEY EXCHANGE
PROBLEM
Dr Ghazi. I-Raho1, Adham mohsin saeed2
1
Department of MIS, Amman Arab University, Jordan -Amman
2
Computer Engineer Dept, Al-Rafidain University College, Iraq, Bagdad
1
larsa_rr@hotmail.com, 2
alshamary.adham@yahoo.com
Abstract- Key exchange has been solved using
authentication protocols which add more computations and
ciphering processes as the key is ciphered mostly using public key
cryptosystems. In our proposed solution there would be no
additional ciphering and Moreover Our proposed solution
depends on mixing the cipher key with ciphered block in
ciphering key in a way that only the legitimated receiver can
easily extract the ciphered data and the cipher key and decipher
to get the plain text.
Key words- key broadcast, Rijndael algorithm, key
exchange.
I. INTRODUCTION
The development of software systems inevitably involves
the security of the data which may be used in different stages
of an automated system. A large proportion of software
research has been devoted to securing software and systems
which includes system data. Industrial reality however
suggested that practitioners and their customers live with the
threat of security breaches that might take place. Security is
considered a fundamental aspect of any information
technology system, as a result of growing system penetration
and electronic fraud concerns, and certain fundamental trends
[Ford1994]. However cryptographic knowledge has grown to
the point that an algorithm to protect international commerce
and communications [Landau2000].
Theoretically secure systems are based on the fact that
there are multiple solutions to a cryptogram. Another problem
is that cryptographic systems become impractical when a large
number of users are involved [Leung1978]. Cryptography has
been mainly concerned with the problem of private secure
communication between two parties. However a number of
cipher algorithms significantly solve this problem as these
algorithms use certain secret keys. In commercial data
networks, there is a need for many pairs of users to
communicate in privacy. The classical method of distributing
secret keys over a secure channel to each user pair becomes
very expensive and alternative means have to be explored
[Leung1978].
Symmetric cryptography in the sense that either the same
piece of information cipher key is held in secret by both
communicants, or else that each communicant holds one from
a pair of related keys where either key is easily derivable from
the other [Simmons1979].
In secret key cryptography, system must combine two
elements: private secret key (cipher key), known only to the
authorized communicants, and an algorithm which operates on
this private secret cipher key and the message (plaintext) to
produce the ciphered message (ciphered text) [Bellare1998].
The authorized receiver, knowing the cipher key, must be able
to recover the ciphered text (decrypt the ciphered message);
either an unauthorized receiver or an adversary should not be
able to deduce either the message or the unknown cipher key.
The cipher key as defined here is very general: It is the total
equivocation of everything that is kept secret from an
opposing cryptanalyst [Simmons1979].
II. A SECURE SYSTEM LOG-IN PROCEDURE
The object of secure communications has been to provide
privacy or secrecy, to hide the contents of a publicly exposed
message from unauthorized recipients [Simmons1979].
This method used in computer system for checking the
authenticity of users involves, it the use of passwords. Each
user should have been assigned an account number when user
first joins the system. User should also choose a password
which he /she keeps secret as part of the system and should be
hidden from other users. There is limitation with this approach
as if an intruder who obtains the password can gain easy
access to all the accounts in the system. Moreover clever
cryptanalysts can predict the password to break the system as
end users will choose weak keys as long as they are allowed to
[Schneier1994], so it is actually difficult to prevent the
adversary from guessing a value for the password and using
this value in an attempt to impersonate a player
[Bresson2003]. Password is preferred to be more than 15-
character long, passwords to exploit the serious human
engineering problem since users do not easily remember
random 15-character long passwords [Leung1978].
III. CLASSICAL CRYPTOGRAPHY SYSTEM
The classical design of the cipher system as described in
[Leung1978] is shown in figure 1 aims to transmit the
encrypted text to the receiver privately over an insecure
channel to the legitimate receiver. In this model both sender
and legitimate receiver know the secret cipher key as sender
sends it over secure channel.
IV. THE ENCRYPTION/DECRYPTION CHANNEL
[SIMMONS1979]
The encryption channel also consists of a transmitter who
wishes to send a message M to a receiver. However the
channel is assumed to be under observation by a hostile
adversary. Cryptographic theory seeks to devise codes that
cannot systematically be distinguished from purely random bit
strings by the adversary. The statistical communications
channel of the coding/decoding model has been replaced by a
game theoretic channel; nature has been replaced by an
intelligent adversary. The adversary can have one or more of
the following purposes:
2. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 113-115
114 | P a g e
a) To determine the message M.
b) To alter the message M to some other message M'
and have M' accepted by the receiver as the message
actually sent.
c) To make-believe to be the transmitter.
V. MANAGING THE KEYS SHOULD ACHIEVE
THE FOLLOWING GOALS: [WOOL2000]
Flexibility: application should have the ability to use
as many different keys as can be possible. Moreover
user may share in knowledge to determine part of this
key. Legitimated receiver should not suffer to receive
the secure message. Further it should encrypt
messages of arbitrary length and use a single block-
cipher key [Rogaway2003].
Another aspect of a cipher scheme’s flexibility is the
ability to make the packaging simple and
understandable by user. Moreover, the system should
use many cipher keys as every block may be ciphered
using different cipher key.
Security: the security is very important as
adversary is a major concern, so all the process and
scheme parts should be done in secure. So we can
ensure that it will not be easy to attack and break the
cipher key of the application and the data. In addition
it should be strong enough to resist any tampering
trials.
VI. RIJNDAEL ALGORITHM
It is well known to all of us, the importance of
cryptography, moreover the cryptanalysis is growing rapidly
in parallel to try and catch up with fast changing cryptography.
Furthermore National Institute for Standards and Technology
(NIST) always renews its standard algorithms in public, which
encourages both cryptographers and cryptanalysts to improve
their algorithms and techniques. This means that Rijndael
algorithms is very important since it is considered as US
government official algorithm, this would make it an
interesting research field for both cryptographers and
cryptanalysts. It is surprising that research papers and reports,
which discuss Rijndael algorithm are limited seven areas:
performance comparison between the finalist algorithms,
attacking, hardware implementation and algebraic structure.
Therefore only two papers to the best of our knowledge
discuss the algorithm in details, giving examples with
explanations [Gladman2003] and [AESpage].
It is obvious that there is a shortage in software
engineering analysis and programming papers in this field
moreover, the programs presented are just implementations for
16 bytes in hexadecimal. This also will not be able to cipher
one block unless it is converted to hexadecimal and added to
the source program. This is only useful to beginners in this
field. However the real software application for this important
algorithm was explained by [RashedAjlouniJune2004] and
[RashedAjlouni12004].
As we see, there are many gaps in this field which can be
filled by our proposed system “Intelligent Encryption
Decryption System”.
VII. PROBLEM
The need of private secure communication arises
whenever there are many parties or adversaries who can
receive the private information. So it is necessary to have
conventional ciphers, which allow private communication
only among parties who have already exchanged secret keys
[Leung1978].
The secret keys are used in the encryption process to
introduce uncertainty to the unauthorized receiver, which can
be removed in the process of decryption by an authorized
receiver using his copy of the key or the "inverse key" This
means, that if a key is compromised, further secure
communications are impossible with that key [Simmons1979].
In secret key cryptography, the problem is how to
distribute the shared secret key. The real problem is that both
parties need secure communications to achieve key exchange
operations [Bellare1998]. Gong [Gong1994], uses one way
function and polynomial interpolation to broadcast secret keys
and suggests reducing the use of secure keyed one-way hash
functions as he comments that it is unclear whether his
protocol techniques can be beneficial when clients do not
share secrets with the server but instead register their public
keys. In Eschenauer and Gligor's scheme, key distribution
consists of three phases, namely key pre-distribution, shared-
key discovery, and path key establishment. The two nodes
discover if they share a key, i.e. each node broadcast in clear
text, the list of identifiers of the keys on their key ring. This
approach does not give an adversary any attack opportunity
that he does not already have [Eschenauer2002]. Wool uses
ExtHeader such that cryptographic header information is
attached to each program [Wool2009] in TV broadcast, he
supposes that programs would be split into n blocks and
ciphered by the same key. Parnerkar, Guster and Herath
present a framework that uses hybrid crypto algorithms for
key distribution. A triple DES with a 168-bit key is used to
generate the secret key. This secret key is transferred with the
help of public key cryptography [Parnerkar2003].
Parnerkar, Guster and Herath proposed integrating public-
key cryptography and digital certificates to strengthen
transmission security. The process was implemented by using
a handshaking protocol providing mutual authentication
between two participants. It would be able to send the public
key to the server via secured email or on a diskette
[Parnerkar2003].
VIII. PROPOSED SOLUTION
3. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 113-115
115 | P a g e
Broadcasting the cipher key can be solved by mixing the
cipher key with ciphered block in special way that only the
legitimated receiver can extract both cipher key and ciphered
block to be able to do the inverse cipher phase and get the
plain text. The proposed system can resist a cryptanalytic
attack involving an unlimited amount of computation.
IX. CONCLUSION
In this paper the problems with current cryptography
systems has been highlighted. It has also been shown that all
systems still have noticeable problems in both generating
secure key that is prone to known and unknown attacks by
adversary. It is suggested in this paper to implement different
algorithms which will show simple methods that can be used
to generate keys. Finally a new and novel algorithm should be
designed, which will combine a mixture of both ciphered data
blocks and ciphering key in a single file, which will be called
output file or ciphered file. This will be created in an
intelligent manner, which will add a higher level of security
the ciphered data. A complete set of algorithms for both
ciphering and deciphering for each proposed solution should
be built and mathematical, it is proved.
REFERENCES
[1] [Ford1994] W. Ford, Standardizing Information
Technology Security, Standard View Vol. 2, No. 2, , 2000,
pp:64 -71.
[2] [Landau2000] Susan Landau, Designing Cryptography for
the New Century, Communications of the ACM May
2000/Vol. 43, No. 5 pp: 115-120
[3] [Leung1978] C. Leung, Some Open Problems in
Cryptography, Proceedings of the 1978 annual conference,
December 1978, pp: 471- 475.
[4] [Bellare1998] M. Bellare, R. Canetti and H. Krawczyk, A
Modular Approach to the Design and Analysis of
Authentication and Key Exchange Protocols,
[5] Proceedings of the thirtieth annual ACM symposium on
Theory of computing, May 1998, pp: 419-428.
[6] [Simmons1979] G. Simmons, Symmetric and Asymmetric
Encryption, Computing Surveys, Vol. 11, No. 4, December
1979, pp: 306-330.
[7] [Schneier1994] B. Schneier, Designing Encryption
Algorithms for Real People, Proceedings of the 1994
workshop new security paradigms, 1994, pp: 98-101.
[8] [Wool2009] A. WOOL, Key Management for Encrypted
Broadcast, ACM Transactions on Information and System
Security, Vol. 3, No. 2, May 2000, pp 107–134.
[9] [Rogaway2003] P. Rogaway and J. Black, OCB: A Block-
Cipher Mode of Operation for Efficient Authenticated
Encryption, ACM Transactions on Information and System
Security, Vol. 6, No. 3, August 2003, pp:365–403.
[10] [Gladman2003] B. Gladman, A Specification for Rijndael,
The AES Algorithm 2003, B. Gladman’s AES related home
page http://fp.gladman.plus.com/cryptography_technology/
[11] Brian Gladman. AES Source Code Implementation. At
http://fp.gladman.plus.com/cryptographytechnology/rijndae
l/index.htm
[12] [AESpage] NIST 2001a. Federal Information Processing
Standards Publication (FIPS PUB) 197. NIST, AES page
available via http://www.nist.gov/publications.
[13] [RashedAjlouniJune2004] A. Abdali Rashed, Naim Ajloni,
an extended Rijndael Block Cipher Using Java, the 2004
International Conference on software Engineering Research
and practice, Las Vigas, Nevada USA, June 2004, 21-24.
[14] [RashedAjlouni12004] A. Abdali Rashed, Naim Ajlouni,
RASAN Java Encryption Decryption System, submitted to
Canadian Journal of Computer Science.
[15] [Gong1994] Li Gong, New Protocols for Third-Party-
Based Authentication and Secure Broadcast, Proceedings
of the 2nd ACM Conference on Computer and
communications security, 1994, pp: 176-183.
[16] [Eschenauer2002] L. Eschenauer and V. Gligor, A Key-
Management Scheme for Distributed Sensor Networks,
Proceedings of the 9th ACM conference on Computer and
communications security, 2002, pp:44-47.
[17] [Parnerkar2003] A. Parnerkar, D. Guster, J. Herath, Secret
Key Distribution Protocol Using Public Key Cryptography,
The Journal of Computing in Small Colleges, Vol. 19 No.
1, October 2003, pp:182-192.