FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION



Similar documents
Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Number Theory. Proof. Suppose otherwise. Then there would be a finite number n of primes, which we may

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

The Mathematics of the RSA Public-Key Cryptosystem

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

Symmetric Key cryptosystem

Public Key Cryptography. c Eli Biham - March 30, Public Key Cryptography

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Security in Distributed Systems. Network Security

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Network Security: Cryptography CS/SS G513 S.K. Sahay

A SOFTWARE COMPARISON OF RSA AND ECC

Secure Network Communication Based on Text-to-Image Encryption

CS 758: Cryptography / Network Security

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Public Key Cryptography and RSA. Review: Number Theory Basics

How To Know If A Message Is From A Person Or A Machine

Solutions to Problem Set 1

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

EXAM questions for the course TTM Information Security May Part 1

CRYPTOGRAPHY IN NETWORK SECURITY

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Advanced Cryptography

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Network Security Technology Network Management

Network Security. HIT Shimrit Tzur-David

Introduction to Hill cipher

Hill s Cipher: Linear Algebra in Cryptography

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

RSA Encryption. Tom Davis October 10, 2003

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

Split Based Encryption in Secure File Transfer

Basic Algorithms In Computer Algebra

Maths delivers! A guide for teachers Years 11 and 12. RSA Encryption

CSCE 465 Computer & Network Security

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Data Grid Privacy and Secure Storage Service in Cloud Computing

Capture Resilient ElGamal Signature Protocols

A Factoring and Discrete Logarithm based Cryptosystem

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Information Security

Cyber Security Workshop Encryption Reference Manual

Cryptography and Network Security Chapter 9

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

= = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Fully homomorphic encryption equating to cloud security: An approach

An Efficient data storage security algorithm using RSA Algorithm

The science of encryption: prime numbers and mod n arithmetic

Cryptography and Network Security Chapter 10

Cryptography: Authentication, Blind Signatures, and Digital Cash

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Chapter 10. Network Security

CHAPTER 5. Number Theory. 1. Integers and Division. Discussion

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptography and Network Security

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Chapter 23. Database Security. Security Issues. Database Security

Notes on Network Security Prof. Hemant K. Soni

Cryptography Exercises

Chapter 23. Database Security. Security Issues. Database Security

Properties of Secure Network Communication

7! Cryptographic Techniques! A Brief Introduction

Lukasz Pater CMMS Administrator and Developer

Digital Signatures. Meka N.L.Sneha. Indiana State University. October 2015

Content Teaching Academy at James Madison University

Cryptography & Digital Signatures

Safer data transmission using Steganography

Digital Signature For Text File

The New Approach of Quantum Cryptography in Network Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Cryptography & Network Security

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

An Introduction to RSA Public-Key Cryptography

Application Layer (1)

A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Number Theory and Cryptography using PARI/GP

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring

Network Security. Omer Rana

Lecture 9 - Message Authentication Codes

Evaluation of the RC4 Algorithm for Data Encryption

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Shor s algorithm and secret sharing

Table of Contents. Bibliografische Informationen digitalisiert durch

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Lecture 3: One-Way Encryption, RSA Example

Transcription:

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: geswarkumar@gmail.com Every day, millions of people use telephones, fax machines, and computer networks for interactions. Sensitive data is transmitted over insecure channels leading to eavesdropping. The accelerating introduction of electronic communication will increase the importance of information security, i.e. all the questions concerning privacy, authenticity, authority etc. Some of the examples of business deals happening over public channel are insurance companies deals, doctors and medical centers carry on electronic exchanges about patient treatment, money transfers across the glob to various bank accounts, there is a need for means to provide for the integrity of information. A very important part of the solutions on the information integrity is cryptographic in nature. OBJECTIVE OF THE WORK Signature: Verify the identity of origination. Integrity: Ensure that the message or transaction received is same as that sent, without accidental Non Repudiation: Prove to a third party that transaction actually took place. This having engaged in transaction. Privacy (Secrecy): Keep communications private. Physical protection mechanisms have evolved to ensure the privacy of transactions. CRYPTOLOGY: It is the science of cryptography and cryptography is the art of designing process of encryption and decryption. Cryptology provides the logic, the technique of producing the cryptograms (the method of encryption).present day public encryption service is based on large prime number occupying around 1024 bits.our main aim in the present paper is the extension of encryption process using product of prime numbers we are trying to generate a group of integers from the product of prime numbers. With the help of this prime number we will develop a cryptology process to generate secure codes for the encryption of the sensitive data. These codes are generated in such a way to conceal the sensitive data so that it could be prevented from hacking. METHODS OF DOING ENCRYPTION Introduction: - ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010 21

GANESH ESWAR KUMAR. P Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personnel freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going the wishes of those who attempt to control. Still the method of data encryption is relatively straightforward. METHODS OF ENCRYPTING DATA: Traditionally, several methods can be used to encrypt data stream, all of which can easily be implemented through software, but not so easily decrypted when either the original or its encrypted data stream are unavailable (when both source and encrypted data are available, code-breaking becomes much simpler, though it is not necessarily easy). The best encrypting methods have little effect on system performance The encryption method consists of two methods: i) Conventional method ii) Public key method CHARACTER-LEVEL ENCRYPTION: In this method, encryption is done at the character level. Character level encryption consists of two methods: i) Substitutional ii) Transpositional BIT LEVEL ENCRYPTION: of bits then altered by encoding / decoding, Permutation, Substitution, Exclusive OR, Rotation Data Encryption Standards (DES): One example of bit level Encryption is the data encryption standards (DES). DES was designed by 22 ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010

Farey Fraction Based Vector Processing for Secure Data Transmission military use. The algorithm encrypts a 64-bit plain text using a 56-bit key. The text is put through 19-bit cipher text. PUBLIC KEY METHOD: In Public key Encryption, every user has the same encryption algorithm and key. The decryption algorithm and key however are kept secret. Anyone can encrypt information, but only an authorized receiver can decrypt it. The decryption algorithms designed in such a way that it is not the inverse of the encryption algorithms use completely different functions, and knowing one does not enable a user to know the other. In addition the keys are different. ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010 23

GANESH ESWAR KUMAR. P The encryption algorithm and key are publicly announced. Every customer can use them. The decryption algorithm and key are kept secret and used only by the bank. Encryption Algorithm: The Encryption algorithm follows these steps in RSA encryption. Encode the data to be encrypted as a member to create the plain text P. Calculate the Cipher text C as C= P Kp modulo N (modulo means divide P Kp by N and keep only the remainder). Send C as the cipher text. In RSA scheme, the system uses a private and a public key. To start two large prime numbers are selected and then multiplied together; n=p*q. If we let f(n)=(p-1)(q-1),and e>1,such that GCD (e, f(n))=1. be a part of encryption key. If we solve the linear equation; Ed congruent 1(mod f (n)), for d. The pair of integers (e, n) are the public key & (d, n) form the private key. Encryption of M can be accomplished by the following expression; Farey Fractions: Me = q n + c where 0 < c < n. Farey sequences are named after the British geologist John Farey Sr. Farey conjectured that each term in a Farey sequence is the median of its neighbour. The Farey fraction sequence is proved by Cauchy. 24 ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010

Farey Fraction Based Vector Processing for Secure Data Transmission - ing size. Each Farey sequence starts with the value 0, denoted by the fraction 0/1 and ends with the value 1, denoted by fraction1/1. 0<a<b<=n & (a, b) == 1 arranged in increasing order. F1 = {0/1, 1/1} F2 = {0/1, 1/2, 1/1} F3 = {0/1, 1/3, 1/2, 2/3, 1/1} F4 = {0/1, 1/4, 1/3, 1/2, 2/3, 3/4, 1/1} The Farey sequence is a well known concept in no. theory. Several interesting solutions exist for this problem. Farey Sequence: The sequence of all reduced with denominator not exceeding n, listed in order of their size is called STEP 1: STEP 2: ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010 25

GANESH ESWAR KUMAR. P Then N = n-y STEP 3: Divide N into block of integers and assigning each letter to each block through one to one mapping. STEP 4: STEP 5: The corresponding inverse alphabet is considered. STEP 6: Then considering the Block Number to which the inverse integers and inverse alphabets belong. Example of Encryption Process: P1=7, P2=7 & P3=11.The important fact we keep in mind is that it is not necessary to restrict our self to just the two prime numbers. 26 ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010

Step 1: Compute n & N. We compute N=7*7*11=539, note that n is composite (not a prime) number. Now we have communicative group N which is a set of all integers from 1 to 539 excluding the integers 7 & 11 and their multiples. N={1,2,3,4,5,6,8,9,10,12,13,15,16,17,18,19,20,23..538} Farey Fraction Based Vector Processing for Secure Data Transmission totally 119 integers that do not belong to N. Hence N has totally 539-(49+77-7) =420 integers which have their inverse element in N under modulo n. Step 2: dividing N into blocks of integers. We now divide the set of all integers N to number of blocks.for simplicity we make the following assumption. Leaving 1 & 538 as there inverse are themselves, we are left with 418 integers. Blocks are of size 26 integers (to increase the complexity we can choose the blocks of different sizes).one to one onto mapping of integers in each block with each English alphabet with integers can be made randomly for further increase in the complexity. Then we have total of 17 blocks, 16 of them are of size 26 integers each and last block is of size 2 integers, constituting total of 418 integers. ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010 27

GANESH ESWAR KUMAR. P Step 3: Association of Alphabets with Blocks Associate each alphabet of the plain text JEERY with different blocks in random way as J B1 E B3 E B7 R B9 Y B16 * NOTE- only one letter is chosen for each block. The table below gives the complete picture about the encryption process of the plain text into cipher text. We do select the blocks and associate the integers with alphabets randomly so that the hacker task Encryption test result: Natural number: 539 No of invertible elements: 418 Plain text per block: 26 ---------------------- Plain text ----------------------- 28 ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010

engineering college. The topic of my project is implementation of encryption scheme on internet and intranet security. The basic concept of my project is using modulo inverse technique. ----------------------------- Cipher text ---------------------------- GGVKFHQLHHDTRSGEJDUHJK/IERJR%%HGHUFYWDHYFHDDUIAFJBGAFIFGLHGI GOIRHPOPEVKIEHWFGQEWTFEIGYGENBLKJPRJBNBIIBNBJNRJHRHNBRHJRHNHRJ HLKHRHJRHJRHJHJHJIOW. Number of Keys used = 04 Nature of plain text = Alphabets Nature of Cipher text = Alphabets Frequency Analysis: Number of character matching 0% Security level = High Number of levels of Security = 04 Nature of the primary key = Fractions Nature of the secondary keys = Fractions. RESULT ANALYSIS: Farey Fraction Based Vector Processing for Secure Data Transmission The Proposed method maintains the cryptosystem which is simple, highly secured with the following advantages. I. The transmitted key does not give any room for the hackers to guess when it is interrupted / inter cepted. The very reason for the same is that, the key may be numerals or name of a person whose date of birth can be used as a key. II. The primary Key is not used for the encryption/ Decryption, but series of secondary keys are generated and the same is used in sequence for encryption. Similarly at the receiving end the series of Inverse keys are generated using the primary key and the same is used in sequence for the decryp tion process. III. Farey fractions are used to generate the primary key, which makes more confusion for the hackers to break or interpret the code. impossible to break the code using the frequency analysis. CONCLUSION Identifying the number of blocks which are arbitrarily different sizes. It will be a very cumbersome ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010 29

GANESH ESWAR KUMAR. P the integers in each block. This is purely a random process. Blocks with integers fewer than 26 will not have all alphabets from English language associated. However this can be advantage as it confuses the chosen for a better understanding and of increasing the complexity of decryption for a hacker. The crucial thing for encryption is the omission 1 and 538 from the set of blocks. The omission are the simplest of give-always while the hacker tries in decrypting the message: the 1 hint the hacker get straight away is: own reverse. The same motive makes us to remove the number 538 from all consideration. We have 181 prime numbers of size less than 4 digits between 1 and 1000.we can obtain the larger number, but at this stage, it becomes less important that to design methods of using these already accessible primes to construct security system. The principle is to design newer methods based on the already known primes. LIST OF REFERENCES [2] Ronald L. Riverst, A. Shamir, and L. Adlernan. A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, volume 21, Feb. 1978, pp. 120 126. 781 793. [5] H. Chandrashekhar, Algebraic coding theory based on Farey Fractions, Thesis Submitted to the Bangalore University for the award of the Ph. D. Degree. 1997, Feb. 1978, pp. 120 126. [7] Concepts of Programming Languages Eighth Edition by Robert W. Sebesta. [8] Database Management Systems Third Edition by Rama Krishnan and Gehrke. IJCI-2K10-03 30 ACS-International Journal on Computational Intelligence, Vol-1, Issue-1 Aug 2010