Secure File Transmission using Split & Merge Technique



Similar documents
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A Study of New Trends in Blowfish Algorithm

Cyber Security Workshop Encryption Reference Manual

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Keywords Web Service, security, DES, cryptography.

Implementation of Full -Parallelism AES Encryption and Decryption

CHAPTER 5. Obfuscation is a process of converting original data into unintelligible data. It

A Novel Cryptographic Key Generation Method Using Image Features

Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V

How To Encrypt Data With A Power Of N On A K Disk

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

How To Encrypt With A 64 Bit Block Cipher

encoding compression encryption

Image Compression through DCT and Huffman Coding Technique

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Understand And Understand The History Of Cryptography

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SeChat: An AES Encrypted Chat

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security

Password-based encryption in ZIP files

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Split Based Encryption in Secure File Transfer

Message Authentication Codes

Tape Drive Data Compression Q & A

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

A comprehensive survey on various ETC techniques for secure Data transmission

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

IJESRT. [Padama, 2(5): May, 2013] ISSN:

Cryptography and Security

Chapter 23. Database Security. Security Issues. Database Security

Video-Conferencing System

Network Security. Omer Rana

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Fast Arithmetic Coding (FastAC) Implementations

Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013

Compression techniques

Encryption and Decryption for Secure Communication

(C) Global Journal of Engineering Science and Research Management

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Storing Encrypted Plain Text Files Using Google Android

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

The Advanced Encryption Standard (AES)

Safer data transmission using Steganography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Properties of Secure Network Communication

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Deploying De-Duplication on Ext4 File System

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

1.2 Using the GPG Gen key Command

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Back2Cloud: A highly Scalable and Available Remote Backup Service

ELECTRONIC COMMERCE WORKED EXAMPLES

CSCE 465 Computer & Network Security

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Secret File Sharing Techniques using AES algorithm. C. Navya Latha Garima Agarwal Anila Kumar GVN

SAS Data Set Encryption Options

Network Security Technology Network Management

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

CIS433/533 - Computer and Network Security Cryptography

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

7! Cryptographic Techniques! A Brief Introduction

Database Migration over Network

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Overview. SSL Cryptography Overview CHAPTER 1

Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure

Solutions to Problem Set 1

Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

1 Data Encryption Algorithm

SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK

ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Evaluating The Performance of Symmetric Encryption Algorithms

Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

SCAN-CA Based Image Security System

Key Components of WAN Optimization Controller Functionality

Transcription:

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015, pg.59 64 RESEARCH ARTICLE ISSN 2320 088X Secure File Transmission using Split & Merge Technique Neha Koli 1, Siddhant Parkar 2, Karan Shah 3, Asst. Prof Manisha Giri 4 ¹Department of Comp. Engineering, Atharva College of Engineering, India ²Department of Comp. Engineering, Atharva College of Engineering, India 3 Department of Comp. Engineering, Atharva College of Engineering, India 4 Department of Comp. Engineering, Atharva College of Engineering, India 1 nehakoli2841994@gmail.com; 2 siddparkar@gmail.com; 3 Karan_shah108@yahoo.com; 4 manisha.giri1@gmail.com Abstract This paper deals with the development of an application under the data security domain. In today s age, security of data has become paramount. Continuous flow of information in removable storage and/or internet has made data susceptible to mischief. Convenient, safe and fast transmission of data is the aim behind developing this application. The application splits a large file into multiple chunks making it practically unreadable or incomprehensible to achieve data security. It is impractical to upload a large raw file with slow internet connection. Such files can be compressed using the application. An email module added to the application makes the transfer even easier. Keywords Splitting, Merging, Compression, Decompression, Encryption, Decryption I. INTRODUCTION The application to be developed primarily deal with data security. The basic idea behind this application is split and merges. Suppose if you have media file of 3 GB and have two removable storages of 2 GB each. A dilemma arises of effectively transferring the said media file. Apart from the security aspect of the application to be developed an easy way to transfer the file is achieved. This big file can be split into multiple smaller pieces of user defined sizes. Now these can be conveniently stored to the removable storage devices. Along with providing convenience of transfer, it also secures the media file. The file extension would be changed because of the split operations performed on them. This renders the file naturally unreadable which makes it safe from prying eyes. Alas this approach isn t very helpful when the security of text files is involved. With this in mind, encryption is introduced. Encoding messages or information in such a way that only authorized parties can read it is known as encryption. Converting plain text into ciphertext with or without the help of a key is the core idea behind encryption. Ciphertext is encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. To understand or access the encrypted data one need to decrypt it which also requires a key. The process of decryption is the reverse of encryption in which the cipher text is subject to the process of deciphering which converts the cipher 2015, IJCSMC All Rights Reserved 59

text into plain text which the receiver can read. When the internet speed is slow, it is impractical to send large media files. Compression allows us to decrease the file size so it can be sent faster over a network. Compression can be done using two methods lossy and lossless. In lossy compression some redundant data is lost therefore lossless is usually preferred over lossy. Lossy Compression is usually used for media files like image, audio, video, etc and lossless compression is usually used for documents in text format. An email module is used to transfer the file. II. ALGORITHMS & TECHNIQUES USED We consider and discuss algorithms and techniques which have been zeroed in on, to use in the software development. 1. Encryption Algorithm 1.1 AES (Advanced Encryption Standard). For the encryption purpose AES [2] has been considered. AES [2] is a symmetric encryption algorithm. It belongs to the class of block ciphers. The name Rijndael is derived from its two creators Vincent Rijmen and John Daemen. Because of its symmetric nature key management is very essential as the encrypted data can be decoded using the same key which was used to encrypt it in the first place. AES [2] is based on the design principle of both substitution and permutation. The Advanced Encryption Standard [2] is operated on a fixed block size of 128 bits, along with varying key sizes of 128 bits, 196 bits and 256 bits. Depending upon the key size 256,128 and 196 it takes 14, 10 and 12 cycles respectively to get encrypted. 2. Data compression Techniques 2.1 G ZIP For compression the gzip algorithm is considered [3]. A variation of LZ77 is the deflation algorithm used by gzip. In the input data duplicated strings are found. A pointer to the previous string replaces second occurrence of a string, in the form of a 1pair (length, distance). 32K bytes is the distance, and and 258 bytes the length. A sequence of literal bytes is emitted when a string does not occur anywhere in the previous 32K bytes. `String' is not restricted to printable characters and must be taken as an arbitrary sequence of bytes. 1. Split and Merge III. MODULES Both the split and merge modules are combined. The file to be secured is selected by the user. With the help of file stream the contents of the file are read. The contents need to be manipulated. For that we write the data into a byte array using BinaryWriter. The split size of the file chunk can be specified by the user. The application should run a loop where the byte array in which the contents are stored are retrieved at every pass and save in a new file with extension.dat Also the size of the array is decreased subsequent for each chunk retrieved. The loop goes on until the buffer is empty. We get the output as split chunks of a readable file. The chunks so formed are unreable to humans. In this way files can be securely transmitted from one system to another. Now if the user is at receivers end i.e. he has received the split chunks for security purpose and now wishes to read/write the file. He will have to have access to the whole file. For that he has to merge the files. To achieve that, the user has to have each and every piece of the split file. The user has to select the first piece and the target directory to save the merged file. 2. Encryption and Decryption The provision has to be made so that the user is able to select the file that has to be encrypted. Once the file gets encrypted the user can save the file on the system or the encrypted file can be directly transferred using the email module. Splitting generally makes the file unreadable for human eyes. But for text files, we can even view split files using a notepad. So for this we introduced an encryption 2015, IJCSMC All Rights Reserved 60

module using AES. AES will make text files unreadable. These files can then be safely split. In the encryption module we select the text file using open. Then we select encrypt. When the text is encrypted we save it. 3. Compression and Decompression GZip [3] is used for compression. Compression is of two types. One is lossy compression and one is lossless compression. Lossy compression is mainly used for images and videos. Lossless compression is used for compression of application files. Compression facilitates quick upload and transfer of files over the network. We select the file to be compressed and then we select the destination folder. The compressed file is stored in a zip format. For decompression we select the zip file and select the output folder. The compressed file is then decompressed. 4. Email Transfer of file is ubiquitous in today s environment. The world has become a smaller place due to the advent of the internet. It goes without saying that when an application involving encryption and compression is developed. And email module would be added to it. The email module facilitates an easy transfer of data over the network. Email allows attachments of maximum size 25mb. When the file is split and compressed using our application, an email module is not just an afterthought. The developer can connect the email module being developed to any portal. Simple Message Transport Protocol can be used to connect the said module to the email server. IV. PSEUDO CODE A pseudo code for the application being developed is described as follows. public bool beginsplit() BinaryReader breader = null; BinaryWriter bwriter = null; byte[] buffer = null; long fsize = 0; int curfilesplit = 0; long numleftoverbytes = 0; long bytesread = 0; long cursplitsize = 0; string cursplitfilename = null; string basename = null; if (!checkinputs(true, true)) return false; fsize = FileSystem.FileLen(targFileName); if (fsize < MaxSplitSize) return false; targfileacl = new FileInfo(targFileName).GetAccessControl(); buffer = new byte[buffersize]; basename = targfilename.substring(targfilename.lastindexof("\\") + 1, targfilename.length - (targfilename.lastindexof("\\") + 1)); cursplitfilename = outputdir + "\\" + basename + splitfirstname + splitreplacetoken + splitext; breader = new BinaryReader(new FileStream(targFileName, FileMode.Open, FileAccess.Read, FileShare.None, BufferSize, FileOptions.SequentialScan)); bwriter = new BinaryWriter(File.Create(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()), BufferSize, FileOptions.None, targfileacl)); while (bytesread > 0) if ((cursplitsize + bytesread) > MaxSplitSize) numleftoverbytes = MaxSplitSize - cursplitsize; bwriter.write(buffer, 0, Convert.ToInt32(numLeftOverBytes)); bwriter.flush(); 2015, IJCSMC All Rights Reserved 61

bwriter.close(); curfilesplit += 1; bwriter = new BinaryWriter(File.Create(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()), BufferSize, FileOptions.SequentialScan FileOptions.WriteThrough, targfileacl)); cursplitsize = bytesread - numleftoverbytes; if (onprogressstep!= null) double temp789 = breader.basestream.position / fsize; double temp147 = curfilesplit / curstats.numsplits; onprogressstep(convert.toint32(math.floor((temp789) * 100)), Convert.ToInt32(Math.Floor((temp147) * 100))); if (!(numleftoverbytes == 0)) bwriter.write(buffer, Convert.ToInt32(numLeftOverBytes - 1), Convert.ToInt32(curSplitSize)); else bwriter.write(buffer, Convert.ToInt32(numLeftOverBytes), Convert.ToInt32(curSplitSize)); else bwriter.write(buffer, 0, Convert.ToInt32(bytesRead)); cursplitsize += bytesread; if (onprogressstep!= null) double temp258 = breader.basestream.position / fsize; double temp369 = curfilesplit / curstats.numsplits; onprogressstep(convert.toint32(math.floor((temp258) * 100)), Convert.ToInt32(Math.Floor((temp369) * 100))); return true; private void DoSplit() boolean b = SpliterClass.beginSplit(); if (b == false) print("cannot Split File"); else print("split Done Successfully"); function bool beginreassembly() BinaryReader breader = null; BinaryWriter bwriter = null; byte[] buffer = null; int curfilesplit = 0; long bytesread = 0; string cursplitfilename = ""; string basename = ""; System.Security.AccessControl.FileSecurity targfileacl = null; //store file access control list, used on each split file long fsize = 0; if (!checkinputs(true, false)) return false; targfileacl = FileInfo(targFileName).GetAccessControl(); buffer = new byte[buffersize]; 2015, IJCSMC All Rights Reserved 62

basename = targfilename.substring(targfilename.lastindexof("\\") + 1, targfilename.length - (targfilename.lastindexof("\\") + 1)); basename = basename.substring(0, basename.lastindexof(splitfilefirstname)); cursplitfilename = outputdir + "\\" + basename + splitfirstname + splitreplacetoken + splitext; bwriter = new BinaryWrite(File.Create(outputDir + "\\" + basename, BufferSize, System.IO.FileOptions.None, targfileacl)); while (File.Exists(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()))) breader = new BinaryReader(new System.IO.FileStream(curSplitFileName.Replace(splitReplaceToken, curfilesplit.tostring()), FileMode.Open, FileAccess.Read,FileShare.None, BufferSize,FileOptions.SequentialScan)); fsize = FileSystem.FileLen(curSplitFileName.Replace(splitFileReplaceToken, curfilesplit.tostring())); while (bytesread > 0) bwriter.write(buffer, 0, Convert.ToInt32(bytesRead)); if (onprogressstep!= null) double temp14 = (breader.basestream.position / fsize) * 100; double temp15 = (curfilesplit / curstats.numsplits) * 100; onprogressstep(convert.toint32(math.floor(temp14)), Convert.ToInt32(Math.Floor(temp15))); breader.close(); breader = null; //avoid exception in finally block return true; private void DoAssemble() boolean b = beginreassembly(); if (b == false) print("cannot Merge File"); else print("merge Done Successfully"); V. FEATURES AND APPLICATIONS The application developed will have a variety of uses in the domain of data security. Particularly for day to day users who do not have access to sophisticated methods of securing data. The proposed application would have possible use in Silence Tracking Radar and Region of Interest. VI. FUTURE WORK The application under development will have several life applications. These applications can be extended to Silence Tracking. Silence tracking involves recording by radar over a period of time. The recording if needed to be monitored can be split using our application and check. Another application of the application can be finding ROI or Region of Interest in an image like an X Ray. VII. CONCLUSIONS The developed application will work on windows platform. Black box and white box testing will be carried out to make sure all the arising errors are ruled out. The unified GUI will make operations easy for the end user by bringing together the four modules of Split Merge, Compress Decompress, Encrypt Decrypt, and Email. Splitting and/or encryption make every known format practically unreadable. 2015, IJCSMC All Rights Reserved 63

REFERENCES [1] Amandeep Singh Sidhu [M.Tech]1, Er. Meenakshi Garg [M.Tech]2 (2014) An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security [2] Joan Daemen, Vincent Rijmen(2002\) The Design of Rijndael: AES - The Advanced Encryption Standard [3] Franceschini Robert.; Dept. of Computer Sci., Univ. of Central Florida, Orlando, FL, USA ; Mukherjee Amar (1996) Data compression using encrypted text [4] Muhanad Hayder (2009) Design and Implementation of a File Splitter and Merger Software [5] Siddhant Parkar, Neha Koli, Karan Shah, Manisha Giri (2015) Study of Different Algorithms and Techniques for Secure File Transmission [6] Rauschert, P. Fac. of Electr., Inf. & Media Eng., Wuppertal Univ., Germany Klimets, Y. ; Velten, J. ;Kummert, A. (2004) Very fast GZIP compression by means of content addressable memories [7] Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, Doug Whiting(20002) Improved Cryptanalysis of Rijndael [8] Henri Gilbert and Marine Minier A collisions attack on the 7-rounds Rijndael [9] Fredrik A. Dahl, Margreth Grotle, Jūratė Šaltytė Benth, Bård Natvig(2008) Data splitting as a countermeasure against hypothesis fishing: with a case study of predictors for low back pain 2015, IJCSMC All Rights Reserved 64