SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
DOI:10.5121/ijcsa.2015.5403 29
TECHNIQUES OF LATTICE BASED
CRYPTOGRAPHY STUDIED ON A
PERVASIVE COMPUTING ENVIRONMENT
Divyajyothi M G1
,Rachappa2
and Dr. D H Rao3
1
Research Scholar, Department of Computer Science, Jain University, Bangalore
2
Research Scholar, Department of Computer Science, Jain University, Bangalore
3
Principal and Director, Jain College of Engineering, Belgaum
ABSTRACT
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing
environments has put forth a question on the degree of security of such devices. Security being a unique
challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of
the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory
problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an
alternate security mechanism which is as hard as the existing number theoretic approaches. In this work,
we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose
strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on
high lattice dimension.
KEYWORDS
Pervasive computing, Lattices, Cryptography, Security
1.INTRODUCTION
Integrating smart technology into people’s lives and environments encompasses work from lot of
computing devices that needs to act intelligently. Since most of the emerging wireless
technologies (sensors, processors, and actuators) are used in pervasive computing, security
becomes a challenging task. Security solutions must be able at effectively address the most
common forms of vulnerabilities such as physical jamming, DoS attacks, message interception,
active eavesdropping. In any techno-rich environment, aspects of privacy and security draw
utmost attention. Most recent work shows use of cryptography for achieving the desired degree
of security [8, 9, 10, 11]. Most of the number-theoretic cryptographic security solutions have an
average case hardness. Using lattice based schemes have proven to be quantum secure and more
efficient than RSA and Elliptical Curves based Schemes [13], because of its worst case hardness
and versatility. Polynomial multiplication is another added advantage in ideal lattices and due to
this property most of the semantic situation management is being done using ideal lattices. There
has not been any algorithm yet which can break the lattice based schemes. Lately these schemes
are widely being used in constrained pervasive devices.
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
30
1.1.Related Work
A power efficient authentication protocol for an RFID tag was designed based on LWE
cryptosystem which consisted of only one round of LWE encryption [14]. NTRU encryption was
implemented on several hand held devices [15] [16]. The LLL algorithm is being widely used for
public key cryptanalysis and IBE schemes are being used for security against Chosen-Ciphertext
Attacks [17].
2.SECURITY REQUIREMENTS OF A PERVASIVE COMPUTING
ENVIRONMENT
2.1.Scalability
Scalability becomes very important requirement when more than one operating domain is
involved. A person may want to sit in his home and communicate with his office, kid’s school;
when the number of operating domains increase, a security solution should be feasible with all the
domains. Achieving scalability can be challenging due to lack of central authority in some
environments such as wireless sensor networks [1] [2].
2.2.Access Control
Though there are several methods to protect information from malicious attacks, a good control
model is essential which can protect all the services and devices used in pervasive computing
[12].
2.3.Trust
With the advent of new network paradigms, Traditional security authentication mechanisms are
inadequate to meet the security challenges imposed by pervasive computing environments.
Developing a trust model must be robust, flexible and reputation based.
2.4.Heterogeneity
Though a number of middleware solutions have been proposed for data, service management, lot
of coordination problems exist due to the wide heterogeneity of network resources involved in
pervasive computing environment. As a result a secured single middleware solution is very much
needed.
2.5.Entity Authentication
Service Providers are looking for a sound authentication mechanism for comfortable and
convenient information exchange in a pervasive environment, so that all authorized users enjoy
access to data in a secured way
2.6.Context Awareness
Due to the large amount of information which comes from various devices are involved in
pervasive computing, extracting and providing user services based on their needs efficiently and
accurately is a daunting task. A sound mathematical abstraction is needed for the same. Situation
lattices for context awareness have been widely discussed to study the semantics in pervasive
computing due to its ability of managing the semantics of sensor data.
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
31
2.7.Mobile Code Security
Since most of the devices used for pervasive computing have different configuration and
interfaces there is a need to implement mobile code that can be used by different smart devices.
The security of such a mobile code is very much desirable.
3.LATTICE BASED CRYPTOGRAPHY
3.1.Lattices
A lattice consists of linearly independent vectors that are linearly combined with each other and
thereby generate lattice points. The difference between lattices and a "normal" vector space is the
fact that the vectors are multiplied with integer factors instead of real factors.
All the vectors form a so called basis for the lattice. This basis can be written in the form of a
matrix. The vectors can be written down in column notation, this is the most common way in
papers. The vectors define so-called parallelepipeds, in the two-dimensional case these are
parallelograms. The volume of this parallelepiped is equal to the absolute value of the
determinant.
3.1.1.Lattice Problems
An important characteristic of lattices is the fact that they can have different bases producing the
same lattice. The determinants of all these bases have the same value. Regarding lattices, vectors
with minimum length are interesting. The problem to find these vectors is called the Shortest
Vector Problem (SVP) and relates to the search for "successive minima".The first minimum is the
shortest vector. All other vectors are linearly independent to this and to each other; they are also
as short as possible. An upper bound for the shortest vector is determined by the Hermite
constant. The shortest vector is also interesting for the packing density of a lattice. Here circles
are constructed around each Lattice point being as large as possible without overlapping each
other (both the Hermite circuit and the package circuits can be enabled in the settings). It can be
easily observed that after reduction the vectors are very much orthogonal to each other, ideally
they even have the angle of 90. Another interesting problem is the Closest Vector Problem
(CVP). Here an arbitrary point is specified and then we search for a lattice point which is closest
to this arbitrary point
.
3.1.2.Lattice Reduction
There are two important methods that implement the search for shortest vectors. One of these is
the Gaussian algorithm for dimension 2 and secondly the LLL algorithm, named after Arjen
Lenstra, Hendrik Lenstra for an arbitrary lattice dimension. The Gaussian algorithm works similar
to the Euclidean algorithm for searching the greatest common divisor (gcd) of two integers. By
combining and subtracting of two vectors the basis improves after each iteration with a shorter
vector. The LLL algorithm works similar to the Gauss algorithm, but for higher dimensions it
produces only an approximation to the shortest vector. An important part of the algorithm is the
Gram-Schmidt orthogonalization.
3.1.3.Cryptanalysis
After the publication of the LLL algorithm in 1982, many possible applications were found for it,
cryptanalysis being one of them. The Merkle-Hellman knapsack cryptosystem, designed in 1978
and named after its two inventors Ralph C. Merkle and Martin E. Hellman, could impressively be
broken with the help of lattices. This cryptosystem is based on the knapsack problem, for which a
general solution is difficult to find. But it could be demonstrated, that the problem of decrypting a
ciphertext can be reformulated as a search for a shortest vector.The well-known asymmetric
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
32
encryption scheme RSA (named after its inventors Ronald L. Rivest, Adi Shamir and Leonard
Adleman) was developed at about the same time as the Merkle-Hellman cryptosystem. It is based
on the problem of the prime factorization of big integers. Using lattices, Don Coppersmith was
able to show that certain messages, for which a part of the plaintext is known, can be deciphered.
The messages in this case are so called "stereotypical messages", for example "Your new PIN is:
****". The first part of the messages, which is always the same, must be known to the attacker. A
prerequisite for this attack is that the public exponent e is very small,
Another attack scenario that uses lattices involves a partially known private key. In contrast to the
Merkle-Hellman cryptosystem, RSA was not broken and can as yet be considered safe, provided
some constraints on the parameters are respected.
3.1.4.Lattice Based Cryptosystems
Cryptosystems that are based on lattices exploit the hardness of certain lattice problems, in
particular the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP). As in the
case of RSA, these cryptosystems are asymmetric public-key cryptosystems.
The foundations for lattice-based cryptography were laid by Miklos Ajtai in 1986, when he
demonstrated how lattices could be used for cryptography.
In cooperation with Cynthia Dwork, Ajtai published the Ajtai-Dwork cryptosystem a short time
later in 1997. Its security is based on the hardness of SVP. In the same year, Oded Goldreich,
Shafi Goldwasser and Shai Halevi published the GGH cryptosystem. Improvements by Daniele
Micciancio made the system practicable.
The latest lattice-based cryptosystem is Learning With Errors (LWE), which was published by
Oded Regev in 2005. It too is based on hard lattice problems, like SVP. Compared to established
public-key cryptosystems like RSA, lattice-based cryptosystems have to handle larger key sizes
and also larger ciphertexts. On the other hand, they have the advantage of being faster and, in
contrast to RSA; they are not (yet) vulnerable to quantum computing attacks.
4.GGH CRYPTOSYSTEM
The GGH cryptosystem is based on the hypothesis, that it is very easy to construct a vector from a
basis B and a small error vector e, which lies in the vector space V and is close to a lattice point in
the lattice L. On the other hand, it is very hard to reconstruct the original lattice point lying close
to the vector if only the vector is known. If one could find a very small basis, the search for the
original lattice point would be much easier. This problem corresponds to the Shortest Basis
Problem (SBP), where, a basis is small if the base vectors are pairwise nearly orthogonal, thus
having a very small orthogonality defect.
Two n x n basis matrices are obligatory for both encryption and decryption. The same full-
dimensional lattice are generated by these matrices over Z^n. The basis matrix B serves as the
public key. By multiplication with a unimodular matrix, B can be transformed into the private key
R. The security of the system relies on a high lattice dimension n and on a parameter. By these
parameters and the lattice dimensions, the error vector e is determined in turn.
With the definition of the private key R, the key generation process starts. It should be seen that
the vectors of the matrix are as orthogonal as possible. Then, a matrix R' is chosen, with random
equal distribution, whose entries are obtained from the set {-l,...,l}. R' is then added with the
product of the value k and the identity matrix I. Thus the resulting private basis is: R := R' + kI,
where k is a natural number.
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
33
The public key B arises from the multiplication of R with a random unimodular transformation
matrix U: B := R * U.
For encrypting a message m in Z^n, the public key B is multiplied with the plaintext vector,
resulting in a new lattice point. The error vector e is added to make the reconstruction of this
lattice point difficult. e is a vector consisting of random values selected with equal distribution
from the set {-Sigma, Sigma} .We assume the value of Sigma=1, in this paper.
The resulting ciphertext is c = Bm + e.
For decrypting a message, the original lattice point has to be reconstructed. In the year 1986,
László Babai came up with an algorithm that produces an approximate lattice point for a given
point of the vector space [3].
For this purpose, the point is regarded as a linear combination of the lattice basis vectors. Later on
the coefficients obtained from the linear combination are then rounded up to the next integer, so
that the result is a vector of the lattice. This method only works, if the basis vectors are nearly
orthogonal. The given target point lies inside a parallelepiped, which is spanned by the basis
vectors.
With Babai's rounding method, the closest vertex of this parallelepiped will be given as the
solution. If the basis vectors are less orthogonal, the rounding error will increase as the
parallelepiped will be more and more elongated and the vertices will move away from the true
closest lattice point [4], showing a basis with less orthogonal vectors and thus unsuitable for
Babai's method).
If the basis is not reduced, the result of the rounding may not be better than a randomly generated
vector and no new information with this method is gained. However, the owner of the private key,
can apply Babai's method, as the private key fulfills the requirements on the orthogonality of the
basis.
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
34
4.1.GGH Security
The security of GGH is based on the hardness of Closest Vector Problem. GGH can also be used
to generate electronic signatures. Both cryptosystems, Ajtai-Dwork and GGH, after having been
successfully attacked and broken, the cryptosystem NTRU (Number Theory Research Unit) was
presented by Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman in 1998. It can encrypt
(NTRUEncrypt) as well as create electronic signatures (NTRUSign).
The security and strength of NTRU depends on the hardness of SVP. The advantages of NTRU
are the fast encryption and decryption speed and the fact that, unlike in the case of RSA, no
quantum algorithm for attacking it in polynomial time is as yet known.
4.2.Example
Plaintext: This text is secret
Ciphertext: {3693, -3355, 4556, -4134, 1713, -1583, 4420, -4014, 4653, -4187, 4556, -
4134, 1709, -1579, 4336, -3930, 4851, -4393, 4525, -4059}
5.LWE CRYPTOSYSTEM
Learning With Errors (LWE) is a problem that was introduced by Oded Regev in the year 2005
[5]. Definition of it is as follows:
Let m, n and q be integers and X a (normal) random distribution over Zq. Given is the pair (A, b),
with a random quadratic matrix A over Zq^(m x n) and a vector b = As + e, where s is a random
vector over Zq^n and e is an error vector over Zq^m, whose elements are selected according to
the distribution X. Then the LWE problem is to determine the vector s.
In other words, from a set of 'approximated' linear equations find the vector s in Zq^n (Consider
an example given below). Suppose that no error vector e was used, then the Gaussian elimination
method could be used to solve the linear equations. However, the approximation makes this
problem much more difficult.
The equations are correct apart from a small error value, for example 1, which was added. In this
example the vector is s = [5 7 11].
The error distribution is a normal distribution that is rounded up to the next integer and taken
modulo q. The standard deviation is sigma = alpha * q, with alpha > 0. For an example of such a
distribution figure below [7],
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
35
The error distribution is given as q = 113 and alpha = 0.05.
The private key is s, the public key is b = As + e, where A is random and the value of e is
produced according to the distribution X. A random vector r in {0,1}^m is generated for
encryption. It is used to determine a subset of A, as not the entire matrix A is used for the
encryption process. In the next step, calculate u = r^T * A. The Ciphertext can be generated based
on the equation; c = r^T * b + Bit * [q / 2] (This is a floor function). The encryption is executed
bitwise. The value of [q / 2] is either added or not added, depending on the value of the plaintext
bit. After that the sender sends the value of (u, c) to the owner of the private key. Now whether c -
u*s is closer to 0 or [q / 2] can be easily determined. The plaintext bit was 0 or 1 can be very
easily identified now. It was 0 if it is closer to 0; otherwise the plaintext bit was 1. The LWE
cryptosystem was designed as a single-bit encryption. This means that when encrypting a
plaintext vector, each bit has to be encrypted separately. Tore Kasper Frederiksen in 2010 [6]
presented a multi-bit variant of the same.
Frederiksen introduces three new parameters t, r and l. For a binary encryption, choose t = 2 and
for the optimization vector let r = 1. The third parameter gives the size of the plaintext vector. If
the message is bigger than l, it must be divided into blocks. In the multi-bit variant, the private
key is no longer a vector s from Zq^n, but a matrix from Zq^(n x l). The error vector e also
becomes a matrix E from Zq^(m x l). The public key is B = As+E mod q. For encryption, a
random vector r from {-1,0,1}^m is generated. Encryption and decryption are then performed
analogously to the single-bit encryption by Regev.
5.1.Example
** Encrypt **
Plaintext: 0
Ciphertext: 0
** Generate new keys **
Private key s: [{0;0;1;1;0;1}]
Public key A:
[{1;0;1;1;2;1},{0;0;2;2;1;1},{1;0;0;0;2;2},{2;2;0;2;0;1},{2;0;2;2;2;0},{1;2;0;2;0;0}]
Alpha: 0.1272
Public key b: [{1;1;0;1;2;0}]
Modulo q: 3
Random vector r: [{1;1;1;1;0;0}]
Subset u = r * A: [{3;4;1;6;6;5}]
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
36
6.LBC APPLICATION AREAS
6.1.Cryptanalysis
Lot of work in the recent years [18] [19] have shown that due to the tangible hardness presented
by lattice problems, lattice based cryptography has started showing its prominence in all modern
research areas. More work is still demanded in order to guarantee its widespread usage.
6.2.Building Robust Cryptosystems
The above presented cryptosystems have a good security proof in the worst-case. Further these
cryptosystems can be improved and made much more efficient in order to generate a standard
model that can be widely accepted and applied.
6.3.Efficient Signature scheme Generation
Usage of ideal lattices can result in an efficient signature scheme that can be provably secure
compared to the existing signature schemes and attacks. Such an ideal lattice based signature
scheme can be very beneficial for an embedded system.
6.4.Quantum algorithms and Lattices
At present there are no quantum algorithms that are capable of solving lattice hard problems and
perform better than the non-quantum algorithms available.
7.CONCLUSION
In this paper we have discussed the various techniques of lattice based cryptography that can be
useful for a pervasive computing environment. We have also discussed the security issues
involved in a pervasive computing environment. The usage of lattices for generating an efficient
cryptosystem has been discussed along with the security issues and examples. In this way lattice
based cryptography can be promising for tackling the security issues in pervasive computing
environment.
8.ACKNOWLEDGMENTS
We extend our thanks to our Prof. Dr. D. H. Rao for his discussions, time and ideas given during
the course of our work.
9.REFERENCES
[1] J Hong and M Langheinrich, "Privacy Challenges in Pervasive Computing," Computing Now, vol. 7,
no. 6, June 2014, IEEE Computer Society
[2] Philip Robinson and Michael Beigl. Trust Context Spaces: An Infrastructure for Pervasive Security.
In First International Conference on Security in Pervasive Computing, 2003.
[3] Babai, L.: On Lovász’, Lattice Reduction and the Nearest Lattice Point Problem. In: Combinatorica
vol. 6, 1986, p. 1-13
[4] Hoffstein, J.; Pipher, J.; Silverman, J. H.: NTRU: A Ring-Based Public Key Cryptosystem. In:
Buhler, J. P. (Hrsg.): Lecture Notes in Computer Science Bd. 1423, Springer, 1998, p. 267-288
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
37
[5] Regev, O.: On Lattices, Learning with Errors, Random Linear Codes, and Cryptography, In:
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, ACM, 2005 (STOC
’05), p. 84-93
[6] Frederiksen, T. K., A Multi-bit Threshold Variant of Regev’s LWE-based Cryptosystem. 2010,
Working Paper, Aarhus University
[7] Regev, O., The Learning with Errors Problem (Invited Survey), In: Proceedings of the 2010 IEEE
25th Annual Conference on Computational Complexity, IEEE Computer Society, 2010 (CCC ’10),
p. 191-204
[8] Ren K, Lou W, Kim K, Deng R. , A novel privacy preserving authentication and access control
scheme for pervasive computing environments, Vehicular Technology, IEEE Transactions on July
2006, 55(4):1373–1384.
[9] Ren K, Lou W., Privacy-enhanced, attack-resilient access control in pervasive computing
environments with optional context authentication capability, Mobile Networks and Applications
2007, 12(1):79–92.
[10] Kim J, Kim Z, Kim K., A lightweight privacy preserving authentication and access control scheme
for ubiquitous computing environment. ICISC, 2007; 37–48.
[11] Li CT, Hwang MS, Chu YP., Further improvement on a novel privacy preserving authentication and
access control scheme for pervasive computing environments. Computer Communications 2008,
31(18):4255–4258.
[12] Magkos E, Kotzanikolaou P., Enhancing Privacy-Preserving Access Control for Pervasive
Computing Environments. MobiSec 2010, Proceedings of the 2nd International ICST Conference on
Security and Privacy in Mobile Information and Communication Systems, LNICST, Springer, to be
published, 2010.
[13] Oded Goldreich, Shafi Goldwasser, and Shai Halevi., Public-key cryptosystems from lattice
reduction problems, In Burton S. Kaliski Jr, editor, Advances in Cryptology — CRYPTO ’97,
number 1294 in Lecture Notes in Computer Science, pages 112–131. Springer, 1997.
[14] Yu Yao, Jiawei Huang, Sudhanshu Khanna, Abhi Shelat, Benton Highsmith Calhoun, John Lach,
and David Evans, A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in
130nm CMOS, 2011.
[15] Daniel V. Bailey, Daniel Coffin, Adam Elbirt, Joseph H. Silverman, and Adam D. Woodbury.
NTRU in Constrained Devices. In C¸ etin K. Ko¸c, David Naccache, and Christof Paar, editors,
Cryptographic Hardware and Embedded Systems — CHES 2001, number 2162 in Lecture Notes in
Computer Science, pages 262–272. Springer, 2001.
[16] Jens-Peter Kaps., Cryptography for ultra-low power devices. PhD thesis, WORCESTER
POLYTECHNIC INSTITUTE, 2006.
[17] Phong Q. Nguyen, Advances in Cryptology – EUROCRYPT 2014, 33rd Annual International
Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark,
May 11-15, 2014. Proceedings
[18] N. Gama and P. Q. Nguyen., Predicting lattice reduction. In Advances in Cryptology – Proc.
Eurocrypt ’08, Lecture Notes in Computer Science, Springer, 2008.
[19] R. Lindner and M. R¨uckert., The lattice challence, 2008. Available at
http://www.latticechallenge.org/.
Authors
Mrs DivyaJyothi M.G. is currently working as Lecturer at the Department of Information
Technology, Al Musanna College of Technology, and Sultanate of Oman. Her teaching
interests include Pervasive Computing, Firewalls and Internet Security Risks, E-
Commerce, Computer Networks, Intrusion detection System, Network Security and
Cryptography, Internet Protocols, Client Server Computing, Unix internals, Linux
internal, Kernel Programming, Object Oriented Analysis and Design, Programming
Languages, Operating Systems, Image Processing, Web Design and Development, etc.
Her most recent research focus is in the area of Pervasive Computing. She received her Bachelor and
Master Degree in Computer Science from Mangalore University, She bagged First Rank in Master’s
Degree at Mangalore University. She has been associated as a Lecturer of the Department of Information
Technology since 2007. She has worked as Lecturer at ICFAI Tech., Bangalore, T John College for MCA,
Bangalore, Alva’s Education Foundation Mangalore. She has guided many project thesis for UG/PG level.
International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015
38
Mr. Rachappa is currently working as Lecturer at the Department of Information
Technology, Al Musanna College of Technology, Sultanate of Oman. His teaching
interests include Computer Security, Pervasive Computing, E-Commerce, Computer
Networks, Intrusion detection System, Network Security and Cryptography, Internet
Protocols, Client Server Computing, Unix internals, Linux internal, Kernel
Programming, Object Oriented Analysis and Design, Programming Languages,
Operating Systems, Web Design and Development, etc. His most recent research focus is
in the area of Security Challenges in Pervasive Computing. He received his Bachelor De ree in Computer
Science from Gulbarga University, Master of Science Degree from Marathwada University and Master of
Technology in Information Technology Degree from Punjabi University (GGSIIT). He has been associated
as a Lecturer of the Department of Information Technology since 2006. He has worked as Lecturer at R.V.
College of Engineering, Bangalore. He has guided many project thesis for UG/PG level. He is a Life
member of CSI, ISTE.
Dr. D H Rao is currently working as a Dean, Faculty of Engineering, VTU, Belgaum.
Principal and Director, Jain College of Engineering, Belgaum.He is the Chairman, Board
of Studies n E & C Engineering, VTU in Belgaum. He is a Member, Academic Senate in
VTU Belgaum. He has over 100+ publications in reputed journals and conferences. He
obtained B.E. (in Electronics from B.M.S. College of Engineering), M.E. (from Madras
University), M.S. (University of Saskatchewan, Canada) Ph.D. (Univ. of Saskatchewan,
Canada).

More Related Content

What's hot

SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...ijcisjournal
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...WilliamY3
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 

What's hot (20)

SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
50120140507006
5012014050700650120140507006
50120140507006
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 

Viewers also liked

Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemVarun Janga
 
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...ijcsa
 
Empirical evaluation of web based personal
Empirical evaluation of web based personalEmpirical evaluation of web based personal
Empirical evaluation of web based personalijcsa
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanismijcsa
 
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOCANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOCijcsa
 
Recognition of optical images based on the
Recognition of optical images based on theRecognition of optical images based on the
Recognition of optical images based on theijcsa
 
ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...
ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...
ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...ijcsa
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided softijcsa
 
An approach to decrease dimensions of drift
An approach to decrease dimensions of driftAn approach to decrease dimensions of drift
An approach to decrease dimensions of driftijcsa
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...ijcsa
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
 
STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...
STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...
STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...ijcsa
 
A SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATION
A SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATIONA SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATION
A SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATIONijcsa
 
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...ijcsa
 
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...ijcsa
 
An approach to decrease dimentions of logical
An approach to decrease dimentions of logicalAn approach to decrease dimentions of logical
An approach to decrease dimentions of logicalijcsa
 
SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM
 SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM
SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHMijcsa
 
Effects of missing observations on
Effects of missing observations onEffects of missing observations on
Effects of missing observations onijcsa
 
Impact of HeartBleed Bug in Android and Counter Measures
Impact of HeartBleed Bug in Android and Counter  Measures Impact of HeartBleed Bug in Android and Counter  Measures
Impact of HeartBleed Bug in Android and Counter Measures ijcsa
 

Viewers also liked (20)

Lattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH CryptosystemLattice Based Cryptography - GGH Cryptosystem
Lattice Based Cryptography - GGH Cryptosystem
 
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
 
Empirical evaluation of web based personal
Empirical evaluation of web based personalEmpirical evaluation of web based personal
Empirical evaluation of web based personal
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanism
 
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOCANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
 
Recognition of optical images based on the
Recognition of optical images based on theRecognition of optical images based on the
Recognition of optical images based on the
 
ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...
ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...
ON APPROACH OF OPTIMIZATION OF FORMATION OF INHOMOGENOUS DISTRIBUTIONS OF DOP...
 
Computational science guided soft
Computational science guided softComputational science guided soft
Computational science guided soft
 
An approach to decrease dimensions of drift
An approach to decrease dimensions of driftAn approach to decrease dimensions of drift
An approach to decrease dimensions of drift
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...
 
STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...
STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...
STABILIZATION AT UPRIGHT EQUILIBRIUM POSITION OF A DOUBLE INVERTED PENDULUM W...
 
A SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATION
A SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATIONA SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATION
A SURVEY OF MACHINE LEARNING TECHNIQUES FOR SENTIMENT CLASSIFICATION
 
Tests that talk
Tests that talkTests that talk
Tests that talk
 
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
COVERAGE OPTIMIZED AND TIME EFFICIENT LOCAL SEARCH BETWEENNESS ROUTING FOR HE...
 
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...
SUCCESSIVE LINEARIZATION SOLUTION OF A BOUNDARY LAYER CONVECTIVE HEAT TRANSFE...
 
An approach to decrease dimentions of logical
An approach to decrease dimentions of logicalAn approach to decrease dimentions of logical
An approach to decrease dimentions of logical
 
SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM
 SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM
SBVRLDNACOMP:AN EFFECTIVE DNA SEQUENCE COMPRESSION ALGORITHM
 
Effects of missing observations on
Effects of missing observations onEffects of missing observations on
Effects of missing observations on
 
Impact of HeartBleed Bug in Android and Counter Measures
Impact of HeartBleed Bug in Android and Counter  Measures Impact of HeartBleed Bug in Android and Counter  Measures
Impact of HeartBleed Bug in Android and Counter Measures
 

Similar to Techniques of lattice based

A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variantsijsrd.com
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSIJCNCJournal
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsIJCNCJournal
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networksZac Darcy
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNION
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNIONANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNION
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNIONAM Publications,India
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 

Similar to Techniques of lattice based (20)

A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variants
 
A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
A key management approach for wireless sensor networks
A key management approach for wireless sensor networksA key management approach for wireless sensor networks
A key management approach for wireless sensor networks
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
W4301117121
W4301117121W4301117121
W4301117121
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
D0371028039
D0371028039D0371028039
D0371028039
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
I1086066
I1086066I1086066
I1086066
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNION
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNIONANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNION
ANALYSE AND IMPLEMENT OF CRYPTOGRAPHY WITH HIGH SECURITY USING QUATERNION
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Techniques of lattice based

  • 1. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 DOI:10.5121/ijcsa.2015.5403 29 TECHNIQUES OF LATTICE BASED CRYPTOGRAPHY STUDIED ON A PERVASIVE COMPUTING ENVIRONMENT Divyajyothi M G1 ,Rachappa2 and Dr. D H Rao3 1 Research Scholar, Department of Computer Science, Jain University, Bangalore 2 Research Scholar, Department of Computer Science, Jain University, Bangalore 3 Principal and Director, Jain College of Engineering, Belgaum ABSTRACT Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing environments has put forth a question on the degree of security of such devices. Security being a unique challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an alternate security mechanism which is as hard as the existing number theoretic approaches. In this work, we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on high lattice dimension. KEYWORDS Pervasive computing, Lattices, Cryptography, Security 1.INTRODUCTION Integrating smart technology into people’s lives and environments encompasses work from lot of computing devices that needs to act intelligently. Since most of the emerging wireless technologies (sensors, processors, and actuators) are used in pervasive computing, security becomes a challenging task. Security solutions must be able at effectively address the most common forms of vulnerabilities such as physical jamming, DoS attacks, message interception, active eavesdropping. In any techno-rich environment, aspects of privacy and security draw utmost attention. Most recent work shows use of cryptography for achieving the desired degree of security [8, 9, 10, 11]. Most of the number-theoretic cryptographic security solutions have an average case hardness. Using lattice based schemes have proven to be quantum secure and more efficient than RSA and Elliptical Curves based Schemes [13], because of its worst case hardness and versatility. Polynomial multiplication is another added advantage in ideal lattices and due to this property most of the semantic situation management is being done using ideal lattices. There has not been any algorithm yet which can break the lattice based schemes. Lately these schemes are widely being used in constrained pervasive devices.
  • 2. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 30 1.1.Related Work A power efficient authentication protocol for an RFID tag was designed based on LWE cryptosystem which consisted of only one round of LWE encryption [14]. NTRU encryption was implemented on several hand held devices [15] [16]. The LLL algorithm is being widely used for public key cryptanalysis and IBE schemes are being used for security against Chosen-Ciphertext Attacks [17]. 2.SECURITY REQUIREMENTS OF A PERVASIVE COMPUTING ENVIRONMENT 2.1.Scalability Scalability becomes very important requirement when more than one operating domain is involved. A person may want to sit in his home and communicate with his office, kid’s school; when the number of operating domains increase, a security solution should be feasible with all the domains. Achieving scalability can be challenging due to lack of central authority in some environments such as wireless sensor networks [1] [2]. 2.2.Access Control Though there are several methods to protect information from malicious attacks, a good control model is essential which can protect all the services and devices used in pervasive computing [12]. 2.3.Trust With the advent of new network paradigms, Traditional security authentication mechanisms are inadequate to meet the security challenges imposed by pervasive computing environments. Developing a trust model must be robust, flexible and reputation based. 2.4.Heterogeneity Though a number of middleware solutions have been proposed for data, service management, lot of coordination problems exist due to the wide heterogeneity of network resources involved in pervasive computing environment. As a result a secured single middleware solution is very much needed. 2.5.Entity Authentication Service Providers are looking for a sound authentication mechanism for comfortable and convenient information exchange in a pervasive environment, so that all authorized users enjoy access to data in a secured way 2.6.Context Awareness Due to the large amount of information which comes from various devices are involved in pervasive computing, extracting and providing user services based on their needs efficiently and accurately is a daunting task. A sound mathematical abstraction is needed for the same. Situation lattices for context awareness have been widely discussed to study the semantics in pervasive computing due to its ability of managing the semantics of sensor data.
  • 3. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 31 2.7.Mobile Code Security Since most of the devices used for pervasive computing have different configuration and interfaces there is a need to implement mobile code that can be used by different smart devices. The security of such a mobile code is very much desirable. 3.LATTICE BASED CRYPTOGRAPHY 3.1.Lattices A lattice consists of linearly independent vectors that are linearly combined with each other and thereby generate lattice points. The difference between lattices and a "normal" vector space is the fact that the vectors are multiplied with integer factors instead of real factors. All the vectors form a so called basis for the lattice. This basis can be written in the form of a matrix. The vectors can be written down in column notation, this is the most common way in papers. The vectors define so-called parallelepipeds, in the two-dimensional case these are parallelograms. The volume of this parallelepiped is equal to the absolute value of the determinant. 3.1.1.Lattice Problems An important characteristic of lattices is the fact that they can have different bases producing the same lattice. The determinants of all these bases have the same value. Regarding lattices, vectors with minimum length are interesting. The problem to find these vectors is called the Shortest Vector Problem (SVP) and relates to the search for "successive minima".The first minimum is the shortest vector. All other vectors are linearly independent to this and to each other; they are also as short as possible. An upper bound for the shortest vector is determined by the Hermite constant. The shortest vector is also interesting for the packing density of a lattice. Here circles are constructed around each Lattice point being as large as possible without overlapping each other (both the Hermite circuit and the package circuits can be enabled in the settings). It can be easily observed that after reduction the vectors are very much orthogonal to each other, ideally they even have the angle of 90. Another interesting problem is the Closest Vector Problem (CVP). Here an arbitrary point is specified and then we search for a lattice point which is closest to this arbitrary point . 3.1.2.Lattice Reduction There are two important methods that implement the search for shortest vectors. One of these is the Gaussian algorithm for dimension 2 and secondly the LLL algorithm, named after Arjen Lenstra, Hendrik Lenstra for an arbitrary lattice dimension. The Gaussian algorithm works similar to the Euclidean algorithm for searching the greatest common divisor (gcd) of two integers. By combining and subtracting of two vectors the basis improves after each iteration with a shorter vector. The LLL algorithm works similar to the Gauss algorithm, but for higher dimensions it produces only an approximation to the shortest vector. An important part of the algorithm is the Gram-Schmidt orthogonalization. 3.1.3.Cryptanalysis After the publication of the LLL algorithm in 1982, many possible applications were found for it, cryptanalysis being one of them. The Merkle-Hellman knapsack cryptosystem, designed in 1978 and named after its two inventors Ralph C. Merkle and Martin E. Hellman, could impressively be broken with the help of lattices. This cryptosystem is based on the knapsack problem, for which a general solution is difficult to find. But it could be demonstrated, that the problem of decrypting a ciphertext can be reformulated as a search for a shortest vector.The well-known asymmetric
  • 4. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 32 encryption scheme RSA (named after its inventors Ronald L. Rivest, Adi Shamir and Leonard Adleman) was developed at about the same time as the Merkle-Hellman cryptosystem. It is based on the problem of the prime factorization of big integers. Using lattices, Don Coppersmith was able to show that certain messages, for which a part of the plaintext is known, can be deciphered. The messages in this case are so called "stereotypical messages", for example "Your new PIN is: ****". The first part of the messages, which is always the same, must be known to the attacker. A prerequisite for this attack is that the public exponent e is very small, Another attack scenario that uses lattices involves a partially known private key. In contrast to the Merkle-Hellman cryptosystem, RSA was not broken and can as yet be considered safe, provided some constraints on the parameters are respected. 3.1.4.Lattice Based Cryptosystems Cryptosystems that are based on lattices exploit the hardness of certain lattice problems, in particular the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP). As in the case of RSA, these cryptosystems are asymmetric public-key cryptosystems. The foundations for lattice-based cryptography were laid by Miklos Ajtai in 1986, when he demonstrated how lattices could be used for cryptography. In cooperation with Cynthia Dwork, Ajtai published the Ajtai-Dwork cryptosystem a short time later in 1997. Its security is based on the hardness of SVP. In the same year, Oded Goldreich, Shafi Goldwasser and Shai Halevi published the GGH cryptosystem. Improvements by Daniele Micciancio made the system practicable. The latest lattice-based cryptosystem is Learning With Errors (LWE), which was published by Oded Regev in 2005. It too is based on hard lattice problems, like SVP. Compared to established public-key cryptosystems like RSA, lattice-based cryptosystems have to handle larger key sizes and also larger ciphertexts. On the other hand, they have the advantage of being faster and, in contrast to RSA; they are not (yet) vulnerable to quantum computing attacks. 4.GGH CRYPTOSYSTEM The GGH cryptosystem is based on the hypothesis, that it is very easy to construct a vector from a basis B and a small error vector e, which lies in the vector space V and is close to a lattice point in the lattice L. On the other hand, it is very hard to reconstruct the original lattice point lying close to the vector if only the vector is known. If one could find a very small basis, the search for the original lattice point would be much easier. This problem corresponds to the Shortest Basis Problem (SBP), where, a basis is small if the base vectors are pairwise nearly orthogonal, thus having a very small orthogonality defect. Two n x n basis matrices are obligatory for both encryption and decryption. The same full- dimensional lattice are generated by these matrices over Z^n. The basis matrix B serves as the public key. By multiplication with a unimodular matrix, B can be transformed into the private key R. The security of the system relies on a high lattice dimension n and on a parameter. By these parameters and the lattice dimensions, the error vector e is determined in turn. With the definition of the private key R, the key generation process starts. It should be seen that the vectors of the matrix are as orthogonal as possible. Then, a matrix R' is chosen, with random equal distribution, whose entries are obtained from the set {-l,...,l}. R' is then added with the product of the value k and the identity matrix I. Thus the resulting private basis is: R := R' + kI, where k is a natural number.
  • 5. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 33 The public key B arises from the multiplication of R with a random unimodular transformation matrix U: B := R * U. For encrypting a message m in Z^n, the public key B is multiplied with the plaintext vector, resulting in a new lattice point. The error vector e is added to make the reconstruction of this lattice point difficult. e is a vector consisting of random values selected with equal distribution from the set {-Sigma, Sigma} .We assume the value of Sigma=1, in this paper. The resulting ciphertext is c = Bm + e. For decrypting a message, the original lattice point has to be reconstructed. In the year 1986, László Babai came up with an algorithm that produces an approximate lattice point for a given point of the vector space [3]. For this purpose, the point is regarded as a linear combination of the lattice basis vectors. Later on the coefficients obtained from the linear combination are then rounded up to the next integer, so that the result is a vector of the lattice. This method only works, if the basis vectors are nearly orthogonal. The given target point lies inside a parallelepiped, which is spanned by the basis vectors. With Babai's rounding method, the closest vertex of this parallelepiped will be given as the solution. If the basis vectors are less orthogonal, the rounding error will increase as the parallelepiped will be more and more elongated and the vertices will move away from the true closest lattice point [4], showing a basis with less orthogonal vectors and thus unsuitable for Babai's method). If the basis is not reduced, the result of the rounding may not be better than a randomly generated vector and no new information with this method is gained. However, the owner of the private key, can apply Babai's method, as the private key fulfills the requirements on the orthogonality of the basis.
  • 6. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 34 4.1.GGH Security The security of GGH is based on the hardness of Closest Vector Problem. GGH can also be used to generate electronic signatures. Both cryptosystems, Ajtai-Dwork and GGH, after having been successfully attacked and broken, the cryptosystem NTRU (Number Theory Research Unit) was presented by Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman in 1998. It can encrypt (NTRUEncrypt) as well as create electronic signatures (NTRUSign). The security and strength of NTRU depends on the hardness of SVP. The advantages of NTRU are the fast encryption and decryption speed and the fact that, unlike in the case of RSA, no quantum algorithm for attacking it in polynomial time is as yet known. 4.2.Example Plaintext: This text is secret Ciphertext: {3693, -3355, 4556, -4134, 1713, -1583, 4420, -4014, 4653, -4187, 4556, - 4134, 1709, -1579, 4336, -3930, 4851, -4393, 4525, -4059} 5.LWE CRYPTOSYSTEM Learning With Errors (LWE) is a problem that was introduced by Oded Regev in the year 2005 [5]. Definition of it is as follows: Let m, n and q be integers and X a (normal) random distribution over Zq. Given is the pair (A, b), with a random quadratic matrix A over Zq^(m x n) and a vector b = As + e, where s is a random vector over Zq^n and e is an error vector over Zq^m, whose elements are selected according to the distribution X. Then the LWE problem is to determine the vector s. In other words, from a set of 'approximated' linear equations find the vector s in Zq^n (Consider an example given below). Suppose that no error vector e was used, then the Gaussian elimination method could be used to solve the linear equations. However, the approximation makes this problem much more difficult. The equations are correct apart from a small error value, for example 1, which was added. In this example the vector is s = [5 7 11]. The error distribution is a normal distribution that is rounded up to the next integer and taken modulo q. The standard deviation is sigma = alpha * q, with alpha > 0. For an example of such a distribution figure below [7],
  • 7. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 35 The error distribution is given as q = 113 and alpha = 0.05. The private key is s, the public key is b = As + e, where A is random and the value of e is produced according to the distribution X. A random vector r in {0,1}^m is generated for encryption. It is used to determine a subset of A, as not the entire matrix A is used for the encryption process. In the next step, calculate u = r^T * A. The Ciphertext can be generated based on the equation; c = r^T * b + Bit * [q / 2] (This is a floor function). The encryption is executed bitwise. The value of [q / 2] is either added or not added, depending on the value of the plaintext bit. After that the sender sends the value of (u, c) to the owner of the private key. Now whether c - u*s is closer to 0 or [q / 2] can be easily determined. The plaintext bit was 0 or 1 can be very easily identified now. It was 0 if it is closer to 0; otherwise the plaintext bit was 1. The LWE cryptosystem was designed as a single-bit encryption. This means that when encrypting a plaintext vector, each bit has to be encrypted separately. Tore Kasper Frederiksen in 2010 [6] presented a multi-bit variant of the same. Frederiksen introduces three new parameters t, r and l. For a binary encryption, choose t = 2 and for the optimization vector let r = 1. The third parameter gives the size of the plaintext vector. If the message is bigger than l, it must be divided into blocks. In the multi-bit variant, the private key is no longer a vector s from Zq^n, but a matrix from Zq^(n x l). The error vector e also becomes a matrix E from Zq^(m x l). The public key is B = As+E mod q. For encryption, a random vector r from {-1,0,1}^m is generated. Encryption and decryption are then performed analogously to the single-bit encryption by Regev. 5.1.Example ** Encrypt ** Plaintext: 0 Ciphertext: 0 ** Generate new keys ** Private key s: [{0;0;1;1;0;1}] Public key A: [{1;0;1;1;2;1},{0;0;2;2;1;1},{1;0;0;0;2;2},{2;2;0;2;0;1},{2;0;2;2;2;0},{1;2;0;2;0;0}] Alpha: 0.1272 Public key b: [{1;1;0;1;2;0}] Modulo q: 3 Random vector r: [{1;1;1;1;0;0}] Subset u = r * A: [{3;4;1;6;6;5}]
  • 8. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 36 6.LBC APPLICATION AREAS 6.1.Cryptanalysis Lot of work in the recent years [18] [19] have shown that due to the tangible hardness presented by lattice problems, lattice based cryptography has started showing its prominence in all modern research areas. More work is still demanded in order to guarantee its widespread usage. 6.2.Building Robust Cryptosystems The above presented cryptosystems have a good security proof in the worst-case. Further these cryptosystems can be improved and made much more efficient in order to generate a standard model that can be widely accepted and applied. 6.3.Efficient Signature scheme Generation Usage of ideal lattices can result in an efficient signature scheme that can be provably secure compared to the existing signature schemes and attacks. Such an ideal lattice based signature scheme can be very beneficial for an embedded system. 6.4.Quantum algorithms and Lattices At present there are no quantum algorithms that are capable of solving lattice hard problems and perform better than the non-quantum algorithms available. 7.CONCLUSION In this paper we have discussed the various techniques of lattice based cryptography that can be useful for a pervasive computing environment. We have also discussed the security issues involved in a pervasive computing environment. The usage of lattices for generating an efficient cryptosystem has been discussed along with the security issues and examples. In this way lattice based cryptography can be promising for tackling the security issues in pervasive computing environment. 8.ACKNOWLEDGMENTS We extend our thanks to our Prof. Dr. D. H. Rao for his discussions, time and ideas given during the course of our work. 9.REFERENCES [1] J Hong and M Langheinrich, "Privacy Challenges in Pervasive Computing," Computing Now, vol. 7, no. 6, June 2014, IEEE Computer Society [2] Philip Robinson and Michael Beigl. Trust Context Spaces: An Infrastructure for Pervasive Security. In First International Conference on Security in Pervasive Computing, 2003. [3] Babai, L.: On Lovász’, Lattice Reduction and the Nearest Lattice Point Problem. In: Combinatorica vol. 6, 1986, p. 1-13 [4] Hoffstein, J.; Pipher, J.; Silverman, J. H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J. P. (Hrsg.): Lecture Notes in Computer Science Bd. 1423, Springer, 1998, p. 267-288
  • 9. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 37 [5] Regev, O.: On Lattices, Learning with Errors, Random Linear Codes, and Cryptography, In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, ACM, 2005 (STOC ’05), p. 84-93 [6] Frederiksen, T. K., A Multi-bit Threshold Variant of Regev’s LWE-based Cryptosystem. 2010, Working Paper, Aarhus University [7] Regev, O., The Learning with Errors Problem (Invited Survey), In: Proceedings of the 2010 IEEE 25th Annual Conference on Computational Complexity, IEEE Computer Society, 2010 (CCC ’10), p. 191-204 [8] Ren K, Lou W, Kim K, Deng R. , A novel privacy preserving authentication and access control scheme for pervasive computing environments, Vehicular Technology, IEEE Transactions on July 2006, 55(4):1373–1384. [9] Ren K, Lou W., Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability, Mobile Networks and Applications 2007, 12(1):79–92. [10] Kim J, Kim Z, Kim K., A lightweight privacy preserving authentication and access control scheme for ubiquitous computing environment. ICISC, 2007; 37–48. [11] Li CT, Hwang MS, Chu YP., Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 2008, 31(18):4255–4258. [12] Magkos E, Kotzanikolaou P., Enhancing Privacy-Preserving Access Control for Pervasive Computing Environments. MobiSec 2010, Proceedings of the 2nd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems, LNICST, Springer, to be published, 2010. [13] Oded Goldreich, Shafi Goldwasser, and Shai Halevi., Public-key cryptosystems from lattice reduction problems, In Burton S. Kaliski Jr, editor, Advances in Cryptology — CRYPTO ’97, number 1294 in Lecture Notes in Computer Science, pages 112–131. Springer, 1997. [14] Yu Yao, Jiawei Huang, Sudhanshu Khanna, Abhi Shelat, Benton Highsmith Calhoun, John Lach, and David Evans, A Sub-0.5V Lattice-Based Public-Key Encryption Scheme for RFID Platforms in 130nm CMOS, 2011. [15] Daniel V. Bailey, Daniel Coffin, Adam Elbirt, Joseph H. Silverman, and Adam D. Woodbury. NTRU in Constrained Devices. In C¸ etin K. Ko¸c, David Naccache, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems — CHES 2001, number 2162 in Lecture Notes in Computer Science, pages 262–272. Springer, 2001. [16] Jens-Peter Kaps., Cryptography for ultra-low power devices. PhD thesis, WORCESTER POLYTECHNIC INSTITUTE, 2006. [17] Phong Q. Nguyen, Advances in Cryptology – EUROCRYPT 2014, 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings [18] N. Gama and P. Q. Nguyen., Predicting lattice reduction. In Advances in Cryptology – Proc. Eurocrypt ’08, Lecture Notes in Computer Science, Springer, 2008. [19] R. Lindner and M. R¨uckert., The lattice challence, 2008. Available at http://www.latticechallenge.org/. Authors Mrs DivyaJyothi M.G. is currently working as Lecturer at the Department of Information Technology, Al Musanna College of Technology, and Sultanate of Oman. Her teaching interests include Pervasive Computing, Firewalls and Internet Security Risks, E- Commerce, Computer Networks, Intrusion detection System, Network Security and Cryptography, Internet Protocols, Client Server Computing, Unix internals, Linux internal, Kernel Programming, Object Oriented Analysis and Design, Programming Languages, Operating Systems, Image Processing, Web Design and Development, etc. Her most recent research focus is in the area of Pervasive Computing. She received her Bachelor and Master Degree in Computer Science from Mangalore University, She bagged First Rank in Master’s Degree at Mangalore University. She has been associated as a Lecturer of the Department of Information Technology since 2007. She has worked as Lecturer at ICFAI Tech., Bangalore, T John College for MCA, Bangalore, Alva’s Education Foundation Mangalore. She has guided many project thesis for UG/PG level.
  • 10. International Journal on Computational Science & Applications (IJCSA) Vol.5, No.4, August 2015 38 Mr. Rachappa is currently working as Lecturer at the Department of Information Technology, Al Musanna College of Technology, Sultanate of Oman. His teaching interests include Computer Security, Pervasive Computing, E-Commerce, Computer Networks, Intrusion detection System, Network Security and Cryptography, Internet Protocols, Client Server Computing, Unix internals, Linux internal, Kernel Programming, Object Oriented Analysis and Design, Programming Languages, Operating Systems, Web Design and Development, etc. His most recent research focus is in the area of Security Challenges in Pervasive Computing. He received his Bachelor De ree in Computer Science from Gulbarga University, Master of Science Degree from Marathwada University and Master of Technology in Information Technology Degree from Punjabi University (GGSIIT). He has been associated as a Lecturer of the Department of Information Technology since 2006. He has worked as Lecturer at R.V. College of Engineering, Bangalore. He has guided many project thesis for UG/PG level. He is a Life member of CSI, ISTE. Dr. D H Rao is currently working as a Dean, Faculty of Engineering, VTU, Belgaum. Principal and Director, Jain College of Engineering, Belgaum.He is the Chairman, Board of Studies n E & C Engineering, VTU in Belgaum. He is a Member, Academic Senate in VTU Belgaum. He has over 100+ publications in reputed journals and conferences. He obtained B.E. (in Electronics from B.M.S. College of Engineering), M.E. (from Madras University), M.S. (University of Saskatchewan, Canada) Ph.D. (Univ. of Saskatchewan, Canada).