Encryption and Decryption for Secure Communication



Similar documents
Computer System Management: Hosting Servers, Miscellaneous

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, Socket Programming

Chapter 17. Transport-Level Security

Chapter 10. Network Security

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Cornerstones of Security

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Indepth Voice over IP and SIP Networking Course

SSL SSL VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Sync Security and Privacy Brief

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Enabling SSL and Client Certificates on the SAP J2EE Engine

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Principles of Network Applications. Dr. Philip Cannata

Advanced Higher Computing. Computer Networks. Homework Sheets

Distributed Systems. 2. Application Layer

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Security Policy Revision Date: 23 April 2009

Chapter 4 Firewall Protection and Content Filtering

Security issues in Voice over IP: A Review

Chapter 7 Transport-Level Security

Chapter 3. Internet Applications and Network Programming

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Integrating a Hitachi IP5000 Wireless IP Phone

ERserver. iseries. Securing applications with SSL

An Introduction to VoIP Protocols

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

TLS and SRTP for Skype Connect. Technical Datasheet

Assessing Telehealth Operational and Technology Security Risks to Privacy

CS 416: Opera-ng Systems Design

CTX OVERVIEW. Ucentrik CTX

Network Access Security. Lesson 10

Database Migration over Network

AT&T Connect Video Conferencing Functional and Architectural Overview. v9.5 October 2012

AT&T Connect Video conferencing functional and architectural overview

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Multimedia Networking and Network Security

First Semester Examinations 2011/12 INTERNET PRINCIPLES

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

Security vulnerabilities in the Internet and possible solutions

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Unit 23. RTP, VoIP. Shyam Parekh

(Refer Slide Time: 6:17)

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

ISM/ISC Middleware Module

Protocol Data Units and Encapsulation

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Contents. Specialty Answering Service. All rights reserved.

ERserver. iseries. Secure Sockets Layer (SSL)

Secure VoIP Transmission through VPN Utilization

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Objectives of Lecture. Network Architecture. Protocols. Contents

Security Overview Introduction Application Firewall Compatibility

Chapter 4 Firewall Protection and Content Filtering

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 Issue 1.

WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Electronic Mail

Taxonomy of Security Protocol

Chapter 5. Data Communication And Internet Technology

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Computer Networks. Examples of network applica3ons. Applica3on Layer

Application Note. Onsight TeamLink And Firewall Detect v6.3

Remote Administration

StreamServe Persuasion SP4 Service Broker

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Lync for Mac 2011 Deployment Guide

TLS/SSL in distributed systems. Eugen Babinciuc

Introduction to VoIP Technology

A Layered Signcryption Model for Secure Cloud System Communication

Voice and Video over Wireless LAN

CS5008: Internet Computing

An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm

Forward proxy server vs reverse proxy server

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Configuring SIP Support for SRTP

Ciphermail Gateway PDF Encryption Setup Guide

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Technical White Paper BlackBerry Security

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Transcription:

Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh PDMCE, B.Garh ABSTRACT In modern era, conferencing has become a mode of communication. Conferencing is a form of real time communication in which all the computer user see the same screen at all the time in their web browsers. Conferencing are of many types like text, audio, video, web, teleconferencing. Conferencing means communication between local as well as remote locations. It includes reduction in travelling costs and ability to streamline decision making processes among geographically distributed teams. But conferencing still an imperfect substitute for face to face communication. The authors tend to be influenced more by speaker s like ability than by the quality of his or her arguments. Also conferencing becomes insecure due to attacks like virus, information theft, unauthorized access, security attacks, etc. So there is a need to have secure communication. We have implemented a new system which includes text, audio and video conferencing sysem along with several other interactive features. Security is achieved by encrypting the data using playfair cipher substitution algorithm. The source code makes use of Java swings and JAR related application programming interfaces. To know the IP address of a particular machine jdk1.6 is used. Keywords SIP, PC, API, JAR 1. INTRODUCTION Conferencing allow two or more locations to communicate simultaneously by two way text, audio and video transmissions. Conferencing is a form of communication between local as well as remote locations. A network socket is an endpoint of inter-process communication. Today most communication between computers is based on Internet Protocol so network sockets are Internet sockets. Socket address is the combination of IP address and port number. IP address is a 32 bit binary address and port number is a 16 bit integer. Sockets provide communication mechanism between two systems using TCP. TCP establishes connection and provides reliable service. Communication takes place in the form of streams. There are two types of streams which are Input stream to read data on socket and Output stream to write data on socket. Communication over network must be secure. Security consists of provisions and policies adopted by network administrator to prevent and monitor unauthorized access. For security the concept of port scanning is used. A port is an application specific and process specific software construct servicing as a communication endpoint in a computer host s operating system. A port scanner is a software application designed to probe a server or host for open ports. The result of scan on the port is categorized into open, close and filtered ports. Although this system includes data transmission over network with port scanning but it does not provide advanced level of security. It only identifies for open and close ports but not identified as a percentage of overall traffic and not categorize on the basis of its contribution to network congestion and resource consumption. Currently client program and server program do not distinguish between client address extracted from log entries and IP address decrypted from the port knock sequence. 1.1 Encryption Encryption is the process of encoding the messages or information in such a way that only the authorized party can read it. In an encryption the message or information is referred to as plain text, is encrypted using an encryption algorithm generating cipher text that can only be read if 65

decrypted. Decryption is the process of decoding data that has been encrypted into secret form. Encryption and Decryption is shown in Fig 1. There are two types of encryption and decryption known as symmetric key and asymmetric key encryption and decryption. In symmetric key encryption and decryption keys are the same. In asymmetric key, one key is used for encryption and other is for decryption. Fig 1: Encryption & Decryption Process 1.2 Playfair Cipher The playfair cipher is a symmetric encryption technique. The scheme was invented in 1854 by Charles Wheatstone but bears the name of Lord Playfair who promoted the use of cipher. The technique encrypts pair of letters. It uses a 5 by 5 table containing a phrase or keyword. To generate the key table first fill in the spaces in the table with the letters of keywords, then fill the remaining spaces with the rest of letters of alphabet in order. 2. RELATED RESEARCH First research made an attempt to introduce sockets and its deployment pertaining to network programming. Sockets play a vital role in client server applications. The client and server communicate by writing to and reading from these sockets. Sockets works with TCP which provides a reliable and connection oriented service. Socket programming over Java has been preferred. When communication over network takes place, Java technology uses stream model. In the second reaearch the attempt was made to investigate Remote Method Invocation. The advantages of socket programming over remote method invocation has been discussed. RMI is a technique to call a method or object of class from a remote location. It serves as a client server relationship. When a client port wants to invoke a remote method on a remote object, it actually calls an ordinary method of java program language that is encapsulated in a packaged object called stub. It resides on client machine, not on server. RMI programming is like programming in high level language. RMI limit us to client to needing to be another Java application. Sockets have tighter control over what is sent. RMI is strictly in Java. This can be fixed by socket programming. RMI can not guarantee that a client will always use the same thread in consecutive calls. The next research discusses Session Initiation Protocol, its capabilities, components and infrastructure. SIP is used to establish, modify and terminate a multimedia sessions. SIP provides new ways to develop prescence based applications. SIP is an application layer protocol and incorporates many elements of HTTP and SMTP. SIP architecture consists of four layers which are syntax and encoding layer, transport layer, transaction layer and transaction user layer. SIP uses its request and response parameters. The various components of SIP are user agent, proxy server, registrar server, redirect server, location server, application server, session border controller, presence server, etc. Also to provide communication between two systems, SIP has its communicator known as Jitsi which is a free and open source multiplatform voice VoIP, videoconferencing and instant messaging application. The next research discusses the encryption and decryption technique. Encryption is the process of 66

converting a plain text into cipher text. Decryption is the process of converting a cipher text into plain text. The paper discusses the playfair cipher symmetric key encryption and decryption technique. In symmetric key process the encryption and decryption keys are the same. The playfair is harder to break since the frequency analysis of digraphs is more difficult. The playfair uses the 5 by 5 table containing a keyword or phrase. Memorization of keyword and four simple rules was all that was required to create the 5 by 5 table and use the cipher. The next research made an attempt to define swings. Swing is built on the foundation of AWT. Swing is the primary Java GUI widget toolkit. Swings provides a native look and feel. Swing has powerful components which are not implemented by platform specific code. Instead they are written entirely in Java and are platform independent. Swing defines a separate model interface for each component that has a logical data or value abstraction. This separation provides programs with the option of plugging in their own model implementations for swing components. 3. PROPOSED WORK In the proposed work SIP in conjuction with TCP will be used to provide communication over the network. For the implementation of system eclipse software will be used. There will be addition of audio and video conferencing along with several other interactive features like call history, profile picture setting, status messages, screen sharing, etc. Communication will take place with the help of SIP communicator known as Jitsi. JAR related API and java swings will be used to implement the system. To make a contact with another machine jdk 1.6 will be used. The playfair cipher will be used to implement security in the system. This is symmetric key encryption and decryption technique in which same key will be used for both encryption and decryption. The system will have a well defined interface. The playfair algorithm algorithm will work by using a 5 by 5 table. To encrypt the message we have to break the message into digraphs and map them out on the key table. Z is added to complete the final digraph if needed. The two letters of the digraph are considered as the opposite corners of the rectangle in the key table. Note the relative position of the corners of rectangle. Then apply following four rules: 1. If both letters are the same then add after the first letter. Encrypt the new pair and continue. 2. If letters are on the same row then replace them with letters of their immediate right. 3. If letters appear in the same column replace them with letters immediately below respectively. 4. If letters are not on the same row or column replace them with letters of same row but at the other corners of the rectangle defined by the original pair. 4. RESULT ANALYSIS We have implemented a secure communication system. For the implementation of system eclipse is used. 1. The Fig 2 below shows all the communication methods in the system like text, audio, video and screen sharing. Fig 2 : Communication Methods 67

2. The Fig 3 shows the call from one person to another 3. The Fig 4 shows a person who is online. Fig 3: Call from one person to another Fig 4: Online 4. The Fig 5 shows the call history and has parameters like- 1. Time of calls 2. Type of calls 3. Person with which call was made. 4. All call history stored with login ID. Fig 5: Call history 68

5. The Fig 6 below shows the file menu and its options are: 1. Add new account 2. Add contact 3. Quit Fig 6: File Menu 6. The Fig 7 below shows the picture option and it has the parameter 1. Image capture from webcam. Fig 7: Picture Option 5. CONCLUSION Communication over network must be secure so that it can reach to its destination without any harm. Communication with only port scanning could not provide secure communication. So we add encryption technique to achieve advanced level of security. The playfair ciher symmetric key encryption technique is used. Also in addition to text the audio and video conferencing is added to the system along with other interactive features. The eclipse software has been used for the implementation of system. The system makes use of Session Initiation Protocol and JAR related API to provide communication over the network. 69

6. REFERENCES [1] S.S Dhenakaran, M IIayaraja published by International Journal of Computer Applications. Playfair Cipher Using 16*16 Matrix. [2] Sunita Bhati, Anita Bhati, S.K Sharma published by world congress on engineering and computer science vol II. A new approach towards encryption schemes: Byte-rotation encryption algorithm. [3] Sumedha Kaushik, Ankur Singhal published by International journal of advanced research in computer science and software engineering. Network Security Using Cryptographic Technique. [4] Mr. Nisarga Chand, Mr. Bappadittya Roy, Mr. Krishanu kundu published by International Journal Of Advanced Research In Computer Science And Software Engineering. [5] Qingzhang Chen, Zhongzhe Tang, Yidong LI, Yibo NIU. Jianhua MO published by Journal Of Computer Information Systems. Research on Encryption Algorithm Of data Security. 70