SlideShare a Scribd company logo
21st Century is a digital age where need for computers is paramount.
From education and research to infrastructure and defence, the use of
computers has eventually spread into everything. Every day billions of
bits of data are being passed from one end of the world to other. With
this volume of data being transferred from one place to other, the need
for securing the data has become paramount. This is where the role of
Cryptography and Information Security plays an important part.
The Secure Encryption Technique (SET) brings about such an algorithm
which depends completely upon the design and the form of the Key used
by the user to encrypt the message. The more complex the key becomes,
the more difficult the cipher text becomes to analyse. According to the
test results prepared from the testing between the plain text files and
the cipher text files, SET has given approximately 25% better results in
terms of Chi-Square values and Encryption--Decryption Time.
 In cryptography, a cipher (or cypher) is an algorithm
for performing encryption or decryption—a series of
well-defined steps that can be followed as a
procedure.
 Cipher text is also known as encrypted or encoded
information because it contains a form of the
original plaintext that is unreadable by a human or
computer without the proper cipher to decrypt
it. Decryption, the inverse of encryption, is the
process of turning cipher text into readable plaintext.
 When same key is used to encrypt and
decrypt the message it is called Symmetric
Cipher.
 The keys may be identical or there may be a
simple transformation to go between the
two keys.
 Asymmetric Encryption is a form of Encryption where
keys come in pairs. What one key encrypts, only the
other can decrypt.
 In Asymmetric Cryptography two different types of
keys are used for encryption and decryption. One is
public key and another one is private key.
There are two types of
keys:
 Public Key
 Private Key
 The Public Key is what its name suggests - Public. It is
made available to everyone via a publicly accessible
repository or directory.
 On the other hand, the Private Key must remain
confidential to its respective owner.
Because the key pair is mathematically related,
whatever is encrypted with a Public Key may only be
decrypted by its corresponding Private Key and vice
versa.
 The Secure Encryption Technique (SET) is a Private Key
Block Cipher Cryptosystem which has been modified on
the platform of Triple SV.
 This cryptosystem inherits its basic architecture and
function from TSV and then it has been developed
further to provide better security with the ease of use
for even the basic requirements of encryption system.
 The key is a 27 bit (128 bit) key and the encryption is
based completely on the key provided .
Key words: TSV, Private Key Cryptosystem, Block Cipher.
 The Triple SV is a block cipher that uses secret
key encryption.
 This algorithm (SET) takes a fixed-length
string of plaintext bits and transforms it
through a series of complicated operations
into another cipher-text bit string of the
same length.
 The proposed block size is 256 bits. The key
comprises 128 bits .
 At the end of the encryption operation, the
result will be a cipher-text of the same
number of bits as the plain-text in a file of
designated type.
 The encryption is based on 2^7 (128) times,
i.e. the encryption has 7 levels with each level
containing the operations of encryption or
decryption.
 The key, i.e. Private Key is generated with the help
of a passcode accepted from the user as input. In
this case the passcode has been restricted to 7
characters only.
 The key is stored in a file of designated type in
respective archives.
 It can be shared after being encrypted with light
encryption algorithms like RSA, SHA, etc.
Algorithm of SET during Encryption
The encryption
levels include
three levels:
 Near swapping,
 Far swapping
and
 Bitwise XOR
operation.
Algorithm of SET during Decryption
n-bit Near Swapping Operation
 The Near Swapping is another protocol where the string of
data is swapped on a running pair basis.
 The first set of pair would include a swap between the first two
(i.e. 1st and 2nd)bits.
 The next swap would be between the next pair of bits (i.e.
3rd and 4th) bits and so on till the nth bit is swapped with (n-1)th
bit.
 The resultant array would have a jumbled up set of Messages.
n-bit Far Swapping Operation
 The Far Swapping is a simple substitution protocol whereby
the furthest of the bits in an array are swapped.
 This means in an array of n bits, the 1st and the nth bit will be
swapped in the first iteration and so on till n/2 bits. At the end
of the entire operation, the initial string would be reversed.
 This operation will be performed till the counter reaches n/2th
bit.
 The bitwise XOR operation is performed after the near
swapping stage . This protocol requires the use of a bit of
the key. For each level, a bit of the key is selected and the
XOR operation is performed with each character of the data
string.
 The result of the
operation will be stored
in the same array. The
operation is repeated
the number of times as
the quantity of the level.
n-bit Encryption Stages
 The key is the second most important part of
this encryption technique.
 It is taken from the user as an input. After
encryption, this key is stored in binary form in
a .dll file.
 This key can be shared after using light
encryption like RSA, SHA,
 Symmetric Key Distribution Using
Symmetric Encryption.
 Symmetric Key Distribution Using
Asymmetric Encryption.
A way to analyse the technique is to test
the non-homogeneity of the source and
encrypted file .
 The Chi-Square test has been performed
for this purpose. The results are compared
to some of the most popular encryption
techniques.
Comparison of Chi-Square Values of ROBAST, RSA,TMAT, TMAT, TPRT, SRAT, TSV, SET
 The encryption time is the time required to
convert a plaintext into a cipher text .
 The SET being on the same platform as that of
the TSV (Triple SV), has similar characteristics;
however, on further evaluation, it was found
that the SET has lower encryption time than
that of TSV.
Encryption Time of ROBAST, RSA, TMAT, TPRT, SRAT, TSV, SET
 The decryption time is the time required to convert a
cipher text into a plaintext .
 The SET being on the same platform as that of the TSV
(Triple SV), has similar characteristics; however, on
further evaluation, it was found that the SET has slightly
higher decryption time than that of TSV.
 The main difference in the decryption sequence
between TSV and the SET remains is the presence of
unique and user key based initialization vector.
Decryption Time of ROBAST, RSA, TMAT,, TPRT, SRAT, TSV, SET
 The Avalanche Ratio test is perhaps the most
comprehensive test when it comes to analysis of a
Cryptographic Algorithm.
 The Avalanche Test is the ratio of difference
between the simple encrypted file and one bit
modified source key/file.
 The Avalanche Ratio is the key of measure of
cryptanalysis. In general terms, it is the measure
that in what extent the characters/bits in the
encrypted file will differ if we modify some
characters/bits in the source file or in the session
key.
0
50
100
1 3 5 7 9
AvalanceRatioValues
File Number
Avalanche Ratio
ROBAST
RSA
TPRT
TMAT
SRAT
TSV
SET
Chart comparing the Avalanche Ratio values of
ROBAST, RSA, TPRT, TMAT, SRAT, TSV and SET
 Thus, the SET is a symmetric block cipher using a 256-bit
block and 128-bit key.
 From the above stated facts, it can be inferred that SET is a
promising new cryptosystem which can be used in various
fields such as tele-communications, data security, cloud
computing, etc.
 The 128-bit standard encryption key length along with its
Avalanche Ratio makes it safe against brute force attacks.
Even the time complexity of this algorithm is proved to be
better than the existing major cryptosystems such as RSA
and TMAT.
Secure Encryption Technique (SET): A Private Key Cryptosystem

More Related Content

What's hot

Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
Encryption
EncryptionEncryption
Encryption
Nitin Parbhakar
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
Soma Subbama
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
Rashmi Burugupalli
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Day5
Day5Day5
Day5
Jai4uk
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Encryption
EncryptionEncryption
Encryption
keith dias
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Cryptography
CryptographyCryptography
Encryption
EncryptionEncryption
Encryption
Mahmoud Abdeen
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
 
RC 4
RC 4 RC 4
RC 4
Sovan Paul
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 

What's hot (20)

Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
 
Encryption
EncryptionEncryption
Encryption
 
Sunanda cryptography ppt
Sunanda cryptography pptSunanda cryptography ppt
Sunanda cryptography ppt
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Day5
Day5Day5
Day5
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption
EncryptionEncryption
Encryption
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
RC 4
RC 4 RC 4
RC 4
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 

Viewers also liked

Linkedin slides april 2015 pm
Linkedin slides april 2015 pmLinkedin slides april 2015 pm
Linkedin slides april 2015 pm
Peter Mayo
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
Priyanka Aash
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
Anjali Agrawal
 
One-Time Password
One-Time PasswordOne-Time Password
One-Time Password
Ata Ebrahimi
 
Vpn
VpnVpn
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
LinkedIn
 

Viewers also liked (7)

Linkedin slides april 2015 pm
Linkedin slides april 2015 pmLinkedin slides april 2015 pm
Linkedin slides april 2015 pm
 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
 
One-Time Password
One-Time PasswordOne-Time Password
One-Time Password
 
Vpn
VpnVpn
Vpn
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to Secure Encryption Technique (SET): A Private Key Cryptosystem

presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standards
Swati Sharma
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Cryptography
CryptographyCryptography
Cryptography
amiable_indian
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Unit 2
Unit 2Unit 2
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
jibonjibon5
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
mariuse18nolet
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
AFRINIC
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
O017128591
O017128591O017128591
O017128591
IOSR Journals
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
ShaikSameena24
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
magoigamtatiro1
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Gayathridevi120
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 

Similar to Secure Encryption Technique (SET): A Private Key Cryptosystem (20)

presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standards
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Unit 2
Unit 2Unit 2
Unit 2
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography  Week4 Part1-ISrevisionSu.docxIntroduction to Cryptography  Week4 Part1-ISrevisionSu.docx
Introduction to Cryptography Week4 Part1-ISrevisionSu.docx
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
O017128591
O017128591O017128591
O017128591
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Unit-2-IS (1).pdf
Unit-2-IS (1).pdfUnit-2-IS (1).pdf
Unit-2-IS (1).pdf
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 

Recently uploaded

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 

Recently uploaded (20)

Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 

Secure Encryption Technique (SET): A Private Key Cryptosystem

  • 1.
  • 2.
  • 3. 21st Century is a digital age where need for computers is paramount. From education and research to infrastructure and defence, the use of computers has eventually spread into everything. Every day billions of bits of data are being passed from one end of the world to other. With this volume of data being transferred from one place to other, the need for securing the data has become paramount. This is where the role of Cryptography and Information Security plays an important part. The Secure Encryption Technique (SET) brings about such an algorithm which depends completely upon the design and the form of the Key used by the user to encrypt the message. The more complex the key becomes, the more difficult the cipher text becomes to analyse. According to the test results prepared from the testing between the plain text files and the cipher text files, SET has given approximately 25% better results in terms of Chi-Square values and Encryption--Decryption Time.
  • 4.
  • 5.  In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.  Cipher text is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning cipher text into readable plaintext.
  • 6.  When same key is used to encrypt and decrypt the message it is called Symmetric Cipher.  The keys may be identical or there may be a simple transformation to go between the two keys.
  • 7.  Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.  In Asymmetric Cryptography two different types of keys are used for encryption and decryption. One is public key and another one is private key.
  • 8. There are two types of keys:  Public Key  Private Key
  • 9.  The Public Key is what its name suggests - Public. It is made available to everyone via a publicly accessible repository or directory.  On the other hand, the Private Key must remain confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa.
  • 10.  The Secure Encryption Technique (SET) is a Private Key Block Cipher Cryptosystem which has been modified on the platform of Triple SV.  This cryptosystem inherits its basic architecture and function from TSV and then it has been developed further to provide better security with the ease of use for even the basic requirements of encryption system.  The key is a 27 bit (128 bit) key and the encryption is based completely on the key provided . Key words: TSV, Private Key Cryptosystem, Block Cipher.
  • 11.  The Triple SV is a block cipher that uses secret key encryption.  This algorithm (SET) takes a fixed-length string of plaintext bits and transforms it through a series of complicated operations into another cipher-text bit string of the same length.  The proposed block size is 256 bits. The key comprises 128 bits .
  • 12.  At the end of the encryption operation, the result will be a cipher-text of the same number of bits as the plain-text in a file of designated type.  The encryption is based on 2^7 (128) times, i.e. the encryption has 7 levels with each level containing the operations of encryption or decryption.
  • 13.  The key, i.e. Private Key is generated with the help of a passcode accepted from the user as input. In this case the passcode has been restricted to 7 characters only.  The key is stored in a file of designated type in respective archives.  It can be shared after being encrypted with light encryption algorithms like RSA, SHA, etc.
  • 14. Algorithm of SET during Encryption The encryption levels include three levels:  Near swapping,  Far swapping and  Bitwise XOR operation.
  • 15. Algorithm of SET during Decryption
  • 16. n-bit Near Swapping Operation  The Near Swapping is another protocol where the string of data is swapped on a running pair basis.  The first set of pair would include a swap between the first two (i.e. 1st and 2nd)bits.  The next swap would be between the next pair of bits (i.e. 3rd and 4th) bits and so on till the nth bit is swapped with (n-1)th bit.  The resultant array would have a jumbled up set of Messages.
  • 17. n-bit Far Swapping Operation  The Far Swapping is a simple substitution protocol whereby the furthest of the bits in an array are swapped.  This means in an array of n bits, the 1st and the nth bit will be swapped in the first iteration and so on till n/2 bits. At the end of the entire operation, the initial string would be reversed.  This operation will be performed till the counter reaches n/2th bit.
  • 18.  The bitwise XOR operation is performed after the near swapping stage . This protocol requires the use of a bit of the key. For each level, a bit of the key is selected and the XOR operation is performed with each character of the data string.  The result of the operation will be stored in the same array. The operation is repeated the number of times as the quantity of the level. n-bit Encryption Stages
  • 19.  The key is the second most important part of this encryption technique.  It is taken from the user as an input. After encryption, this key is stored in binary form in a .dll file.  This key can be shared after using light encryption like RSA, SHA,
  • 20.  Symmetric Key Distribution Using Symmetric Encryption.  Symmetric Key Distribution Using Asymmetric Encryption.
  • 21. A way to analyse the technique is to test the non-homogeneity of the source and encrypted file .  The Chi-Square test has been performed for this purpose. The results are compared to some of the most popular encryption techniques.
  • 22. Comparison of Chi-Square Values of ROBAST, RSA,TMAT, TMAT, TPRT, SRAT, TSV, SET
  • 23.  The encryption time is the time required to convert a plaintext into a cipher text .  The SET being on the same platform as that of the TSV (Triple SV), has similar characteristics; however, on further evaluation, it was found that the SET has lower encryption time than that of TSV.
  • 24. Encryption Time of ROBAST, RSA, TMAT, TPRT, SRAT, TSV, SET
  • 25.  The decryption time is the time required to convert a cipher text into a plaintext .  The SET being on the same platform as that of the TSV (Triple SV), has similar characteristics; however, on further evaluation, it was found that the SET has slightly higher decryption time than that of TSV.  The main difference in the decryption sequence between TSV and the SET remains is the presence of unique and user key based initialization vector.
  • 26. Decryption Time of ROBAST, RSA, TMAT,, TPRT, SRAT, TSV, SET
  • 27.  The Avalanche Ratio test is perhaps the most comprehensive test when it comes to analysis of a Cryptographic Algorithm.  The Avalanche Test is the ratio of difference between the simple encrypted file and one bit modified source key/file.  The Avalanche Ratio is the key of measure of cryptanalysis. In general terms, it is the measure that in what extent the characters/bits in the encrypted file will differ if we modify some characters/bits in the source file or in the session key.
  • 28. 0 50 100 1 3 5 7 9 AvalanceRatioValues File Number Avalanche Ratio ROBAST RSA TPRT TMAT SRAT TSV SET Chart comparing the Avalanche Ratio values of ROBAST, RSA, TPRT, TMAT, SRAT, TSV and SET
  • 29.  Thus, the SET is a symmetric block cipher using a 256-bit block and 128-bit key.  From the above stated facts, it can be inferred that SET is a promising new cryptosystem which can be used in various fields such as tele-communications, data security, cloud computing, etc.  The 128-bit standard encryption key length along with its Avalanche Ratio makes it safe against brute force attacks. Even the time complexity of this algorithm is proved to be better than the existing major cryptosystems such as RSA and TMAT.