FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION


 Geoffrey Harrington
 2 years ago
 Views:
Transcription
1 FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Every day, millions of people use telephones, fax machines, and computer networks for interactions. Sensitive data is transmitted over insecure channels leading to eavesdropping. The accelerating introduction of electronic communication will increase the importance of information security, i.e. all the questions concerning privacy, authenticity, authority etc. Some of the examples of business deals happening over public channel are insurance companies deals, doctors and medical centers carry on electronic exchanges about patient treatment, money transfers across the glob to various bank accounts, there is a need for means to provide for the integrity of information. A very important part of the solutions on the information integrity is cryptographic in nature. OBJECTIVE OF THE WORK Signature: Verify the identity of origination. Integrity: Ensure that the message or transaction received is same as that sent, without accidental Non Repudiation: Prove to a third party that transaction actually took place. This having engaged in transaction. Privacy (Secrecy): Keep communications private. Physical protection mechanisms have evolved to ensure the privacy of transactions. CRYPTOLOGY: It is the science of cryptography and cryptography is the art of designing process of encryption and decryption. Cryptology provides the logic, the technique of producing the cryptograms (the method of encryption).present day public encryption service is based on large prime number occupying around 1024 bits.our main aim in the present paper is the extension of encryption process using product of prime numbers we are trying to generate a group of integers from the product of prime numbers. With the help of this prime number we will develop a cryptology process to generate secure codes for the encryption of the sensitive data. These codes are generated in such a way to conceal the sensitive data so that it could be prevented from hacking. METHODS OF DOING ENCRYPTION Introduction:  ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug
2 GANESH ESWAR KUMAR. P Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personnel freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going the wishes of those who attempt to control. Still the method of data encryption is relatively straightforward. METHODS OF ENCRYPTING DATA: Traditionally, several methods can be used to encrypt data stream, all of which can easily be implemented through software, but not so easily decrypted when either the original or its encrypted data stream are unavailable (when both source and encrypted data are available, codebreaking becomes much simpler, though it is not necessarily easy). The best encrypting methods have little effect on system performance The encryption method consists of two methods: i) Conventional method ii) Public key method CHARACTERLEVEL ENCRYPTION: In this method, encryption is done at the character level. Character level encryption consists of two methods: i) Substitutional ii) Transpositional BIT LEVEL ENCRYPTION: of bits then altered by encoding / decoding, Permutation, Substitution, Exclusive OR, Rotation Data Encryption Standards (DES): One example of bit level Encryption is the data encryption standards (DES). DES was designed by 22 ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug 2010
3 Farey Fraction Based Vector Processing for Secure Data Transmission military use. The algorithm encrypts a 64bit plain text using a 56bit key. The text is put through 19bit cipher text. PUBLIC KEY METHOD: In Public key Encryption, every user has the same encryption algorithm and key. The decryption algorithm and key however are kept secret. Anyone can encrypt information, but only an authorized receiver can decrypt it. The decryption algorithms designed in such a way that it is not the inverse of the encryption algorithms use completely different functions, and knowing one does not enable a user to know the other. In addition the keys are different. ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug
4 GANESH ESWAR KUMAR. P The encryption algorithm and key are publicly announced. Every customer can use them. The decryption algorithm and key are kept secret and used only by the bank. Encryption Algorithm: The Encryption algorithm follows these steps in RSA encryption. Encode the data to be encrypted as a member to create the plain text P. Calculate the Cipher text C as C= P Kp modulo N (modulo means divide P Kp by N and keep only the remainder). Send C as the cipher text. In RSA scheme, the system uses a private and a public key. To start two large prime numbers are selected and then multiplied together; n=p*q. If we let f(n)=(p1)(q1),and e>1,such that GCD (e, f(n))=1. be a part of encryption key. If we solve the linear equation; Ed congruent 1(mod f (n)), for d. The pair of integers (e, n) are the public key & (d, n) form the private key. Encryption of M can be accomplished by the following expression; Farey Fractions: Me = q n + c where 0 < c < n. Farey sequences are named after the British geologist John Farey Sr. Farey conjectured that each term in a Farey sequence is the median of its neighbour. The Farey fraction sequence is proved by Cauchy. 24 ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug 2010
5 Farey Fraction Based Vector Processing for Secure Data Transmission  ing size. Each Farey sequence starts with the value 0, denoted by the fraction 0/1 and ends with the value 1, denoted by fraction1/1. 0<a<b<=n & (a, b) == 1 arranged in increasing order. F1 = {0/1, 1/1} F2 = {0/1, 1/2, 1/1} F3 = {0/1, 1/3, 1/2, 2/3, 1/1} F4 = {0/1, 1/4, 1/3, 1/2, 2/3, 3/4, 1/1} The Farey sequence is a well known concept in no. theory. Several interesting solutions exist for this problem. Farey Sequence: The sequence of all reduced with denominator not exceeding n, listed in order of their size is called STEP 1: STEP 2: ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug
6 GANESH ESWAR KUMAR. P Then N = ny STEP 3: Divide N into block of integers and assigning each letter to each block through one to one mapping. STEP 4: STEP 5: The corresponding inverse alphabet is considered. STEP 6: Then considering the Block Number to which the inverse integers and inverse alphabets belong. Example of Encryption Process: P1=7, P2=7 & P3=11.The important fact we keep in mind is that it is not necessary to restrict our self to just the two prime numbers. 26 ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug 2010
7 Step 1: Compute n & N. We compute N=7*7*11=539, note that n is composite (not a prime) number. Now we have communicative group N which is a set of all integers from 1 to 539 excluding the integers 7 & 11 and their multiples. N={1,2,3,4,5,6,8,9,10,12,13,15,16,17,18,19,20, } Farey Fraction Based Vector Processing for Secure Data Transmission totally 119 integers that do not belong to N. Hence N has totally 539( ) =420 integers which have their inverse element in N under modulo n. Step 2: dividing N into blocks of integers. We now divide the set of all integers N to number of blocks.for simplicity we make the following assumption. Leaving 1 & 538 as there inverse are themselves, we are left with 418 integers. Blocks are of size 26 integers (to increase the complexity we can choose the blocks of different sizes).one to one onto mapping of integers in each block with each English alphabet with integers can be made randomly for further increase in the complexity. Then we have total of 17 blocks, 16 of them are of size 26 integers each and last block is of size 2 integers, constituting total of 418 integers. ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug
8 GANESH ESWAR KUMAR. P Step 3: Association of Alphabets with Blocks Associate each alphabet of the plain text JEERY with different blocks in random way as J B1 E B3 E B7 R B9 Y B16 * NOTE only one letter is chosen for each block. The table below gives the complete picture about the encryption process of the plain text into cipher text. We do select the blocks and associate the integers with alphabets randomly so that the hacker task Encryption test result: Natural number: 539 No of invertible elements: 418 Plain text per block: Plain text ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug 2010
9 engineering college. The topic of my project is implementation of encryption scheme on internet and intranet security. The basic concept of my project is using modulo inverse technique Cipher text GGVKFHQLHHDTRSGEJDUHJK/IERJR%%HGHUFYWDHYFHDDUIAFJBGAFIFGLHGI GOIRHPOPEVKIEHWFGQEWTFEIGYGENBLKJPRJBNBIIBNBJNRJHRHNBRHJRHNHRJ HLKHRHJRHJRHJHJHJIOW. Number of Keys used = 04 Nature of plain text = Alphabets Nature of Cipher text = Alphabets Frequency Analysis: Number of character matching 0% Security level = High Number of levels of Security = 04 Nature of the primary key = Fractions Nature of the secondary keys = Fractions. RESULT ANALYSIS: Farey Fraction Based Vector Processing for Secure Data Transmission The Proposed method maintains the cryptosystem which is simple, highly secured with the following advantages. I. The transmitted key does not give any room for the hackers to guess when it is interrupted / inter cepted. The very reason for the same is that, the key may be numerals or name of a person whose date of birth can be used as a key. II. The primary Key is not used for the encryption/ Decryption, but series of secondary keys are generated and the same is used in sequence for encryption. Similarly at the receiving end the series of Inverse keys are generated using the primary key and the same is used in sequence for the decryp tion process. III. Farey fractions are used to generate the primary key, which makes more confusion for the hackers to break or interpret the code. impossible to break the code using the frequency analysis. CONCLUSION Identifying the number of blocks which are arbitrarily different sizes. It will be a very cumbersome ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug
10 GANESH ESWAR KUMAR. P the integers in each block. This is purely a random process. Blocks with integers fewer than 26 will not have all alphabets from English language associated. However this can be advantage as it confuses the chosen for a better understanding and of increasing the complexity of decryption for a hacker. The crucial thing for encryption is the omission 1 and 538 from the set of blocks. The omission are the simplest of givealways while the hacker tries in decrypting the message: the 1 hint the hacker get straight away is: own reverse. The same motive makes us to remove the number 538 from all consideration. We have 181 prime numbers of size less than 4 digits between 1 and 1000.we can obtain the larger number, but at this stage, it becomes less important that to design methods of using these already accessible primes to construct security system. The principle is to design newer methods based on the already known primes. LIST OF REFERENCES [2] Ronald L. Riverst, A. Shamir, and L. Adlernan. A method for obtaining digital signatures and publickey cryptosystems, Communications of the ACM, volume 21, Feb. 1978, pp [5] H. Chandrashekhar, Algebraic coding theory based on Farey Fractions, Thesis Submitted to the Bangalore University for the award of the Ph. D. Degree. 1997, Feb. 1978, pp [7] Concepts of Programming Languages Eighth Edition by Robert W. Sebesta. [8] Database Management Systems Third Edition by Rama Krishnan and Gehrke. IJCI2K ACSInternational Journal on Computational Intelligence, Vol1, Issue1 Aug 2010
Data Encryption A B C D E F G H I J K L M N O P Q R S T U V W X Y Z. we would encrypt the string IDESOFMARCH as follows:
Data Encryption Encryption refers to the coding of information in order to keep it secret. Encryption is accomplished by transforming the string of characters comprising the information to produce a new
More information159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
More informationNumber Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may
Number Theory Divisibility and Primes Definition. If a and b are integers and there is some integer c such that a = b c, then we say that b divides a or is a factor or divisor of a and write b a. Definition
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationThe Mathematics of the RSA PublicKey Cryptosystem
The Mathematics of the RSA PublicKey Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
More informationNetwork Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
More informationCryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
More informationPublic Key Cryptography. c Eli Biham  March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham  March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known apriori to all the users, before they can encrypt
More informationELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
More informationSecurity in Distributed Systems. Network Security
Security in Distributed Systems Introduction Cryptography Authentication Key exchange Computer Science Lecture 18, page 1 Network Security Intruder may eavesdrop remove, modify, and/or insert messages
More informationMA2C03 Mathematics School of Mathematics, Trinity College Hilary Term 2016 Lecture 59 (April 1, 2016) David R. Wilkins
MA2C03 Mathematics School of Mathematics, Trinity College Hilary Term 2016 Lecture 59 (April 1, 2016) David R. Wilkins The RSA encryption scheme works as follows. In order to establish the necessary public
More informationSymmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 811 200 Lecturer: Kartik Krishnan Lectures 222 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
More informationCryptography. Helmer Aslaksen Department of Mathematics National University of Singapore
Cryptography Helmer Aslaksen Department of Mathematics National University of Singapore aslaksen@math.nus.edu.sg www.math.nus.edu.sg/aslaksen/sfm/ 1 Basic Concepts There are many situations in life where
More informationOutline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
More informationNetwork Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITSPilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
More informationSecure Network Communication Based on TexttoImage Encryption
Secure Network Communication Based on TexttoImage Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty,  Computer Network Department AlZaytoonah University of Jordan Amman, JORDAN
More informationA SOFTWARE COMPARISON OF RSA AND ECC
International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 97413 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138
More informationPublic Key Cryptography and RSA. Review: Number Theory Basics
Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and
More informationAN IMPLEMENTATION OF HYBRID ENCRYPTIONDECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSAAES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTIONDECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
More informationCS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
More informationSolutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
More informationCryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
More informationMathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information
The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, JanuaryJune 2013 Copyright Mind Reader Publications ISSN No: 22309888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationEXAM questions for the course TTM4135  Information Security May 2013. Part 1
EXAM questions for the course TTM4135  Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIENCHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationAdvanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
More informationSECURITY IMPROVMENTS TO THE DIFFIEHELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIEHELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
More informationIntroduction to Hill cipher
Introduction to Hill cipher We have explored three simple substitution ciphers that generated ciphertext C from plaintext p by means of an arithmetic operation modulo 26. Caesar cipher: The Caesar cipher
More informationThe RSA Algorithm. Evgeny Milanov. 3 June 2009
The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau
More informationAn Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
More informationRSA Encryption. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003
RSA Encryption Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles October 10, 2003 1 Public Key Cryptography One of the biggest problems in cryptography is the distribution of keys.
More informationHill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
More informationNetwork Security. HIT Shimrit TzurDavid
Network Security HIT Shimrit TzurDavid 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
More informationNetwork Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
More informationSplit Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
More informationCIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; DH key exchange; Hash functions; Application of hash
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationA New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 22780661, ISBN: 22788727Volume 7, Issue 1 (Nov.  Dec. 2012), PP 4752 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
More informationThe Mathematics of RSA
The Mathematics of RSA Dimitri Papaioannou May 24, 2007 1 Introduction Cryptographic systems come in two flavors. Symmetric or Private key encryption and Asymmetric or Public key encryption. Strictly speaking,
More informationIMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY ON TEXT AND IMAGE
IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY ON TEXT AND IMAGE Mrs. Megha Kolhekar Assistant Professor, Department of Electronics and Telecommunication Engineering Fr. C. Rodrigues Institute of Technology,
More informationThe science of encryption: prime numbers and mod n arithmetic
The science of encryption: prime numbers and mod n arithmetic Go check your email. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process
More informationMaths delivers! A guide for teachers Years 11 and 12. RSA Encryption
1 Maths delivers! 2 3 4 5 6 7 8 9 10 11 12 A guide for teachers Years 11 and 12 RSA Encryption Maths delivers! RSA Encryption Dr Michael Evans AMSI Editor: Dr Jane Pitkethly, La Trobe University Illustrations
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA DiffieHellman Key Exchange Public key and
More informationA Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511517 HIKARI Ltd, www.mhikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
More informationApplication of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
More informationCapture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
More informationCryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
More informationData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
More informationRSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
More informationCyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
More informationCryptography and Network Security Chapter 9
Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,
More informationNetwork Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 035742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 035742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
More informationInformation Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 vedatcoskun@isikun.edu.tr www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
More informationElementary Number Theory We begin with a bit of elementary number theory, which is concerned
CONSTRUCTION OF THE FINITE FIELDS Z p S. R. DOTY Elementary Number Theory We begin with a bit of elementary number theory, which is concerned solely with questions about the set of integers Z = {0, ±1,
More informationHooks could have been left around for the imposter to regain control. A.ArpaciDusseau. Remove all files from disk and reinstall all software
UNIVERSITY of WISCONSINMADISON Computer Sciences Department CS 537 A. ArpaciDusseau Intro to Operating Systems Spring 2000 Security Solutions and Encryption Questions answered in these notes: How does
More informationBasic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
More information= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
More informationCryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
More informationFully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSRJCE) eissn: 22780661, p ISSN: 22788727Volume 9, Issue 2 (Jan.  Feb. 2013), PP 4650 Fully homomorphic encryption equating to cloud security: An approach
More informationTechniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab
Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the
More informationCSC474/574  Information Systems Security: Homework1 Solutions Sketch
CSC474/574  Information Systems Security: Homework1 Solutions Sketch February 20, 2005 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryption process of a oneround Feistel cipher
More informationAn Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
More informationCHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationCryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
More information3. (5%) Use the Euclidean algorithm to find gcd(742, 1908). Sol: gcd(742, 1908) = gcd(742, 424) = gcd(424, 318) = gcd(318, 106) = 106
Midterm Examination on Discrete Mathematics 1. (4%) Encrypt the message LOVE by translating the letters A through Z into numbers 0 through 25, applying the encryption function f(p) = (3p + 7) (mod 26),
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE COFACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II MohammediaCasablanca,
More informationMathematics of Cryptography Modular Arithmetic, Congruence, and Matrices. A Biswas, IT, BESU SHIBPUR
Mathematics of Cryptography Modular Arithmetic, Congruence, and Matrices A Biswas, IT, BESU SHIBPUR McGrawHill The McGrawHill Companies, Inc., 2000 Set of Integers The set of integers, denoted by Z,
More informationCryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA PrivateKey Cryptography traditional private/secret/single key cryptography uses one key shared
More informationCryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
More informationMathematics of Cryptography Part I
CHAPTER 2 Mathematics of Cryptography Part I (Solution to OddNumbered Problems) Review Questions 1. The set of integers is Z. It contains all integral numbers from negative infinity to positive infinity.
More informationContent Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security  generic name for the collection of tools designed to protect
More informationNotes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA PrivateKey Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
More informationOutline. Cryptography. Bret Benesh. Math 331
Outline 1 College of St. Benedict/St. John s University Department of Mathematics Math 331 2 3 The internet is a lawless place, and people have access to all sorts of information. What is keeping people
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues Systemrelated issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More information3. Applications of Number Theory
3. APPLICATIONS OF NUMBER THEORY 163 3. Applications of Number Theory 3.1. Representation of Integers. Theorem 3.1.1. Given an integer b > 1, every positive integer n can be expresses uniquely as n = a
More informationCryptography and Network Security
Cryptography and Network Security XiangYang Li Introduction The art of war teaches us not on the likelihood of the enemy s not coming, but on our own readiness to receive him; not on the chance of his
More informationProperties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
More informationCryptography Exercises
Cryptography Exercises 1 Contents 1 source coding 3 2 Caesar Cipher 4 3 Ciphertextonly Attack 5 4 Classification of CryptosystemsNetwork Nodes 6 5 Properties of modulo Operation 10 6 Vernam Cipher 11
More informationChapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues Systemrelated issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
More informationPostQuantum Cryptography #2
PostQuantum Cryptography #2 Prof. Claude Crépeau McGill University 49 PostQuantum Cryptography Finite Fields based cryptography Codes Multivariate Polynomials Integers based cryptography Approximate
More informationThe New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
More informationLukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? Oneway functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
More informationDigital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University nmeka@sycamores.indstate.edu October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
More informationA Proposal for Authenticated Key Recovery System 1
A Proposal for Authenticated Key Recovery System 1 Tsuyoshi Nishioka a, Kanta Matsuura a, Yuliang Zheng b,c, and Hideki Imai b a Information & Communication Business Div. ADVANCE Co., Ltd. 57 Nihombashi
More informationCryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationSafer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,
More informationAn Introduction to RSA PublicKey Cryptography
An Introduction to RSA PublicKey Cryptography David Boyhan August 5, 2008 According to the U.S. Census Bureau, in the 1st quarter of 2008, approximately $33 billion worth of retail sales were conducted
More informationApplication Layer (1)
Application Layer (1) Functionality: providing applications (email, Web service, USENET, ftp etc) providing support protocols to allow the real applications to function properly (e.g. HTTP for Web appl.)
More informationA REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore
More informationSubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604T079 kasmir07 (at) student.hh.se Abid Hussain 780927T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630T053 imrakh07 (at) student.hh.se
More informationBreaking Generalized DiffieHellman Modulo a Composite is no Easier than Factoring
Breaking Generalized DiffieHellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The DiffieHellman keyexchange protocol may naturally be extended to k > 2
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
More informationNetwork Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an applicationlevel protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More information