SlideShare a Scribd company logo
siri-bhoovalaya.org
Presentation on 6th January 2020
at
107th Indian Science Congress, 3-7 January, 2020 at Bengaluru
Kumudendu Encryption Scheme
An Efficient & Versatile Indian Cryptographic System
Kumudendu Encryption Scheme:
An Efficient and Versatile Indian
Cryptographic System
by
Er. Anil Kumar Jain
FIETE, FIE(I), SMCSI, LM-ISCA
email: jain.anilk@gmail.com
web-site: siri-bhoovalaya.org
107th Indian Science Congress, 3-7 January, 2020 at
Bengaluru
Siri Bhūvalaya manuscript at National Archives of India
siri-bhoovalaya.org
Siri Bhūvalaya :Historical Backdrop
Period : about 1000 years ago
Setting : Ancient Karnataka, Near Bengaluru
Focal Characters :
Muni Kumudendu - The Outstanding inimitable
Genius who scripted this inimitable epic.
Mahamata Mallikabbe - The Ardent Benefactor who
distributed copies of Siri Bhūvalaya – one of these
copies survived to be discovered in twentieth century.
End of Scene: Wonderful Masterpiece laid into oblivion for
next 1000 years
siri-bhoovalaya.org
“
Siri Bhūvalaya: Resurrection
Period : Early 20th Century
Setting : Modern Karnataka
Focal Characters :
Dharnendra Pandit - The Protector of the
Precious Treasure
Yellappa Shastri - The arduous Redeemer who
strived resurrection efforts till his death
Karlamangalam Srikantaiah & Anantha Subba
Rao - Genuine associates of Yellappa Shastri
siri-bhoovalaya.org
Basic Elements of Siri Bhūvalaya
• Cakra : One Cakra is arrangement of numbers (in range 1 to 64) in a
matrix of 27 rows and 27 columns. This represents one page of
encrypted text, which when decrypted results in verses and shlokas.
• Bandha : A Bandha is manner in which contents from a Cakra is
revealed. Bandha basically describes the method to traverse the
27x27 matrix and substitute respective numbers into letters to
uncover the Shlokas or verses hidden therein the Cakra. There are
many Bandhas which are identified as Cakra-Bandha, Navmaank-
Bandh, Shreni-Bandha, Hans-Bandha, Anu-Bandha, Mayur-Bandha,
Saras-Bandha, Padma-Bandha etc. etc.
• Kumudendu Code Table (KCT): This table is used for substituting
Numerals in all the Chakras into corresponding Phonetic Alphabet
Characters (Mūla Varṇas)
siri-bhoovalaya.org
Basic Building Blocks of KES framework
siri-bhoovalaya.org
Kumudendu Encryption System (KES) framework of Siri
Bhūvalaya” primarily consists of two symmetric encryption
ciphers :
Mono Alphabetic Substitution Cipher : Key here is identified as
‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet
or Mūla Varṇa of the script is assigned an integer numeric value
in range 1 to 64.
Transposition Cipher : Here key is named as ‘Bandha Traversal
Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector
of 729 integers. Here each element is a distinct integer in the
range 1 to 729, which is indicative of place of the transposed
phonetic alphabets in corresponding Cakra matrix (27x27).
Substitution Cipher Key (KCT) for different scripts
कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर
siri-bhoovalaya.org
Transposition Key :BTPM for Cakra-Bandha
siri-bhoovalaya.org
l l
2 3 4 5 6
1
2
3
4
5
6
1
2
3
4
5
6
First Chakra of Siri Bhūvalaya
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60
2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1
3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52
4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13
5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1
6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1
7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4
8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43
9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7
10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45
11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1
12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16
13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28
14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1
15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60
16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13
17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1
18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1
19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1
20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1
21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53
22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58
23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45
24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43
25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55
26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60
27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60siri-bhoovalaya.org
Estimated Robustness of KES against Brute Force
Attacks
siri-bhoovalaya.org
In proposed KES, depending on the security requirements, this substitution
table can be altered in size and assignment of integers. Thus even with 64
element KCT, there are possible Factorial (64) permutations resulting in a
number with 89 digits.
Size of Transposition key can be adjusted to thwart anticipated brute-force
attacks. Preliminary estimations reveal that possible Transposition schemes
of 729 elements, of 27x27 matrix as deployed in “Siri Bhūvalaya”, amount to
Factorial (729) permutations and that results in massive number of
approximately 1772 digits. That means a brute-force attacker will have to
find correct Transposition Key out of so many possible ones. This will require
massive computational resources which is highly impractical.
Current cryptographic standards of symmetric key encryption recommend
key length of 256 bits, wherein possible key combinations are of the order
78 digits only for a brute-force attack.
Applications of KES
siri-bhoovalaya.org
KES is inherently suitable for Information Security applications on
variety of platforms using Indian Languages and Scripts.
With its variable length dual key symmetric encryption scheme, KES
can be customised for Information Security requirements of wide-
range of systems and applications.
Since it requires relatively smaller computational overhead, KES can
be efficiently deployed on systems with nominal computing
resources or even in circumstances with no machine assistance i.e.
in Manual-Mode.
A formal Comprehensive study of KES is yet to be done and all
concerned persons / organisation are invited to contribute.
siri-bhoovalaya.org
ತ ುಂಬ ಧನ್ಯವಾದಗಳು
धन्यवाद

More Related Content

Similar to Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru

"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
Anil Jain
 
Naskah soal uas statistik 2014
Naskah soal uas statistik 2014Naskah soal uas statistik 2014
Naskah soal uas statistik 2014
MTs Nurul Huda Sukaraja
 
Ujian tengah semester 2014
Ujian tengah semester 2014Ujian tengah semester 2014
Ujian tengah semester 2014
MTs Nurul Huda Sukaraja
 
CTET 20th September 2015 Paper-2 Answer Key by Success Mantra
CTET 20th September 2015 Paper-2 Answer Key by Success MantraCTET 20th September 2015 Paper-2 Answer Key by Success Mantra
CTET 20th September 2015 Paper-2 Answer Key by Success Mantra
SuccessMantraInstitute
 
Time optimization & improvement quality product
Time optimization & improvement quality productTime optimization & improvement quality product
Time optimization & improvement quality product
AbhayJain139414
 
Oracle cloudworld な〜んでだ?#3
Oracle cloudworld な〜んでだ?#3Oracle cloudworld な〜んでだ?#3
Oracle cloudworld な〜んでだ?#3
Hiroshi Sekiguchi
 

Similar to Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru (6)

"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
"Introduction to Siribhūvalaya" - Talk at Jain Academy of Scholars
 
Naskah soal uas statistik 2014
Naskah soal uas statistik 2014Naskah soal uas statistik 2014
Naskah soal uas statistik 2014
 
Ujian tengah semester 2014
Ujian tengah semester 2014Ujian tengah semester 2014
Ujian tengah semester 2014
 
CTET 20th September 2015 Paper-2 Answer Key by Success Mantra
CTET 20th September 2015 Paper-2 Answer Key by Success MantraCTET 20th September 2015 Paper-2 Answer Key by Success Mantra
CTET 20th September 2015 Paper-2 Answer Key by Success Mantra
 
Time optimization & improvement quality product
Time optimization & improvement quality productTime optimization & improvement quality product
Time optimization & improvement quality product
 
Oracle cloudworld な〜んでだ?#3
Oracle cloudworld な〜んでだ?#3Oracle cloudworld な〜んでだ?#3
Oracle cloudworld な〜んでだ?#3
 

More from Anil Jain

Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020
Anil Jain
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3
Anil Jain
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2
Anil Jain
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-Bhoovalaya
Anil Jain
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
Siribhoovalaya pustak shakti
Siribhoovalaya pustak shaktiSiribhoovalaya pustak shakti
Siribhoovalaya pustak shakti
Anil Jain
 

More from Anil Jain (6)

Symposium on Jainism and Mathematics - presentation : 2020
Symposium on  Jainism and Mathematics  - presentation : 2020 Symposium on  Jainism and Mathematics  - presentation : 2020
Symposium on Jainism and Mathematics - presentation : 2020
 
Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3Siri bhoovalaya workshop-session-3
Siri bhoovalaya workshop-session-3
 
Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2Siri bhoovalaya workshop-session-2
Siri bhoovalaya workshop-session-2
 
Some Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-BhoovalayaSome Structural Aspects of Siri-Bhoovalaya
Some Structural Aspects of Siri-Bhoovalaya
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Siribhoovalaya pustak shakti
Siribhoovalaya pustak shaktiSiribhoovalaya pustak shakti
Siribhoovalaya pustak shakti
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Kumudendu Encryption System (KES) Talk at Indian Science Congress : 2020 at Bengaluru

  • 1. siri-bhoovalaya.org Presentation on 6th January 2020 at 107th Indian Science Congress, 3-7 January, 2020 at Bengaluru Kumudendu Encryption Scheme An Efficient & Versatile Indian Cryptographic System
  • 2. Kumudendu Encryption Scheme: An Efficient and Versatile Indian Cryptographic System by Er. Anil Kumar Jain FIETE, FIE(I), SMCSI, LM-ISCA email: jain.anilk@gmail.com web-site: siri-bhoovalaya.org 107th Indian Science Congress, 3-7 January, 2020 at Bengaluru
  • 3. Siri Bhūvalaya manuscript at National Archives of India siri-bhoovalaya.org
  • 4. Siri Bhūvalaya :Historical Backdrop Period : about 1000 years ago Setting : Ancient Karnataka, Near Bengaluru Focal Characters : Muni Kumudendu - The Outstanding inimitable Genius who scripted this inimitable epic. Mahamata Mallikabbe - The Ardent Benefactor who distributed copies of Siri Bhūvalaya – one of these copies survived to be discovered in twentieth century. End of Scene: Wonderful Masterpiece laid into oblivion for next 1000 years siri-bhoovalaya.org
  • 5. “ Siri Bhūvalaya: Resurrection Period : Early 20th Century Setting : Modern Karnataka Focal Characters : Dharnendra Pandit - The Protector of the Precious Treasure Yellappa Shastri - The arduous Redeemer who strived resurrection efforts till his death Karlamangalam Srikantaiah & Anantha Subba Rao - Genuine associates of Yellappa Shastri siri-bhoovalaya.org
  • 6. Basic Elements of Siri Bhūvalaya • Cakra : One Cakra is arrangement of numbers (in range 1 to 64) in a matrix of 27 rows and 27 columns. This represents one page of encrypted text, which when decrypted results in verses and shlokas. • Bandha : A Bandha is manner in which contents from a Cakra is revealed. Bandha basically describes the method to traverse the 27x27 matrix and substitute respective numbers into letters to uncover the Shlokas or verses hidden therein the Cakra. There are many Bandhas which are identified as Cakra-Bandha, Navmaank- Bandh, Shreni-Bandha, Hans-Bandha, Anu-Bandha, Mayur-Bandha, Saras-Bandha, Padma-Bandha etc. etc. • Kumudendu Code Table (KCT): This table is used for substituting Numerals in all the Chakras into corresponding Phonetic Alphabet Characters (Mūla Varṇas) siri-bhoovalaya.org
  • 7. Basic Building Blocks of KES framework siri-bhoovalaya.org Kumudendu Encryption System (KES) framework of Siri Bhūvalaya” primarily consists of two symmetric encryption ciphers : Mono Alphabetic Substitution Cipher : Key here is identified as ‘Kumudendu Code Table’ (KCT). Here each of phonetic alphabet or Mūla Varṇa of the script is assigned an integer numeric value in range 1 to 64. Transposition Cipher : Here key is named as ‘Bandha Traversal Path Matrix’ (BTPM). It is a matrix of 27x27 integers or a vector of 729 integers. Here each element is a distinct integer in the range 1 to 729, which is indicative of place of the transposed phonetic alphabets in corresponding Cakra matrix (27x27).
  • 8. Substitution Cipher Key (KCT) for different scripts कु मुदेन्दु कोड सारणी में देवनागरी, कन्नड़ एवं ब्राह्मी लिपि के ध्वन्याक्षर siri-bhoovalaya.org
  • 9. Transposition Key :BTPM for Cakra-Bandha siri-bhoovalaya.org l l 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6
  • 10. First Chakra of Siri Bhūvalaya 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 1 59 23 1 16 1 28 28 1 1 56 59 4 56 1 1 47 16 34 1 7 16 1 1 7 56 1 60 2 53 54 47 28 1 47 45 28 7 4 59 41 4 45 1 30 47 47 45 42 53 28 51 1 52 1 1 3 1 22 1 30 2 1 2 55 30 1 7 45 47 52 1 4 1 47 1 1 1 1 53 1 52 59 52 4 59 30 2 55 55 13 16 2 53 60 1 4 16 47 48 45 16 56 56 43 45 1 56 1 4 1 13 5 47 45 1 1 22 30 51 1 2 56 38 30 4 1 1 56 1 1 16 1 57 7 56 56 1 22 1 6 54 52 52 45 1 7 55 48 1 58 52 35 28 55 1 38 45 30 55 4 47 7 45 38 45 38 1 7 1 1 1 28 13 56 55 51 54 1 1 1 1 42 2 4 4 1 43 16 47 7 1 13 4 51 4 8 28 53 47 22 8 1 53 59 38 7 43 40 1 52 59 54 30 1 45 16 1 28 23 50 7 43 43 9 1 2 45 51 30 1 52 58 48 59 47 54 4 4 1 47 45 47 56 28 1 45 1 13 7 7 7 10 55 1 53 47 56 1 1 7 1 1 2 60 48 56 1 1 16 1 1 54 1 52 17 30 54 45 45 11 59 56 52 1 45 1 55 28 52 28 1 2 1 52 54 4 43 60 48 28 1 16 23 8 53 7 1 12 2 1 53 52 43 23 2 4 16 52 44 54 1 2 42 7 1 7 47 30 28 48 47 1 54 52 16 13 45 54 23 4 28 45 45 30 1 59 1 56 28 2 54 53 38 2 2 1 28 55 40 60 4 50 28 14 2 13 47 1 1 4 17 45 1 56 1 52 56 51 1 47 55 55 45 7 2 54 1 56 7 1 1 15 23 4 53 54 59 48 13 56 1 47 23 1 2 55 16 1 1 47 40 54 16 52 1 47 60 43 60 16 45 16 43 1 7 47 1 7 1 4 54 54 1 43 28 28 7 1 2 7 52 30 1 4 47 4 13 17 42 1 54 13 1 28 1 45 42 5 48 56 1 1 1 52 54 7 1 1 2 56 56 2 43 1 1 18 56 43 22 45 56 43 2 2 56 1 8 48 59 59 7 16 53 55 53 48 1 1 46 2 30 53 1 19 47 45 1 2 54 56 56 2 55 51 4 16 7 13 30 16 1 1 4 52 52 4 54 47 2 38 1 20 1 54 60 56 54 1 60 1 1 16 40 38 17 1 47 56 33 55 1 1 59 48 1 53 7 1 1 21 1 52 16 1 60 1 30 53 30 7 47 13 13 22 8 13 45 59 54 1 2 42 54 47 53 52 53 22 16 30 1 4 52 47 56 1 28 16 1 22 59 51 1 1 7 28 53 60 7 1 16 16 1 1 58 23 4 53 56 1 52 2 13 52 38 30 45 7 1 30 56 16 1 1 1 30 48 56 54 54 55 28 45 24 1 47 47 1 28 22 1 47 1 1 45 46 1 1 47 53 55 52 1 1 7 43 2 1 1 1 43 25 1 4 53 1 45 43 16 55 52 4 47 55 45 22 51 56 1 38 13 30 2 28 56 13 56 28 55 26 4 16 46 1 1 16 1 1 1 1 1 47 59 4 8 38 58 1 1 48 1 7 22 1 1 1 60 27 52 4 30 56 53 52 54 1 30 52 1 16 54 7 58 1 30 54 1 56 51 53 56 57 56 4 60siri-bhoovalaya.org
  • 11. Estimated Robustness of KES against Brute Force Attacks siri-bhoovalaya.org In proposed KES, depending on the security requirements, this substitution table can be altered in size and assignment of integers. Thus even with 64 element KCT, there are possible Factorial (64) permutations resulting in a number with 89 digits. Size of Transposition key can be adjusted to thwart anticipated brute-force attacks. Preliminary estimations reveal that possible Transposition schemes of 729 elements, of 27x27 matrix as deployed in “Siri Bhūvalaya”, amount to Factorial (729) permutations and that results in massive number of approximately 1772 digits. That means a brute-force attacker will have to find correct Transposition Key out of so many possible ones. This will require massive computational resources which is highly impractical. Current cryptographic standards of symmetric key encryption recommend key length of 256 bits, wherein possible key combinations are of the order 78 digits only for a brute-force attack.
  • 12. Applications of KES siri-bhoovalaya.org KES is inherently suitable for Information Security applications on variety of platforms using Indian Languages and Scripts. With its variable length dual key symmetric encryption scheme, KES can be customised for Information Security requirements of wide- range of systems and applications. Since it requires relatively smaller computational overhead, KES can be efficiently deployed on systems with nominal computing resources or even in circumstances with no machine assistance i.e. in Manual-Mode. A formal Comprehensive study of KES is yet to be done and all concerned persons / organisation are invited to contribute.