Documente Academic
Documente Profesional
Documente Cultură
Ajay Bhushan
Department of Information and Technology Galgotias College of Engineering and Technology Greater Noida India E mail: ajay2007bhushan@gmail.com
1 Introduction
With the incessant development of the network have increased dramatically over the past decade. Security of these data becomes even more critical when they are confidential data. Plenty of safety approaches are available to transfer data within the organizations premises. But when data need to be transferred over the network companys premises, then there is a need of a protection technique which is not only secure but also efficient for transferring the data quickly. This technique can be broadly classified into two categories: Steganography and Cryptography. Steganography can be described as the technique for hiding a secret message within a larger one such that no one except the sender and receiver suspects the contents or even the existence of the hidden message. This approach has been used since ancient times; for example Greek kings used to tattoo secret information on slaves head and then hide it by growth of his hair. Later information was retrieved by shaving his head at the receiving end. However, steganography is not vastly popular and rarely used these days. Most famous and widely used approach for secure communication is Cryptography which is the practice and study of hiding information. Cryptography word is derived from the Greek word kruptos, meaning "hidden". It is normally also referred as Encryption, which is used to disguise data, making it unintelligible to unauthorized observers. Decryption is the reverse process i.e. moving from the unintelligible cipher text back to plaintext. The main advantage of cryptography is that communication between both sending and receiving ends remains inconceivable by anyone who might be listening. Cryptography helps us to achieve three main security goals i.e. availability, confidentiality and integrity of the information. One example of cryptographic application is machine used by Germans during World War II to communicate safely within their defense forces and avoid eavesdropping. One way to classify cryptography is the key mechanism. Key can be defined as the rules which are Responsible for converting plain text
into cipher text. Depending upon the Key, cryptography can be alienated into two chief categories: Secret Key Cryptography and Public Key Cryptography. Secret Key Cryptography uses same key (single key) for encryption and decryption of data, while Public Key Cryptography uses two mathematically related keys; one for encoding data at sending end and another for decoding data at receiving end [8]. The former approach is simpler but distribution of secret key is the chief concern. The later approach is a bit complex due to two keys: private key and public key. The sender can use public key (available to everyone) of any individual or organization to send data and that data can only be decoded using the private key which is kept confidential (with the receiving person or organization) and thus making it more secure and widely accepted across the world. Another nomenclature of cryptography takes in account the number of characters read in a single pass. First category is known as Block Cipher, which inputs a block of digits/ characters in a single pass and encodes it simultaneously. However this technique is faster but it may produce identical cipher texts for the same plaintext every time it is encrypted. Second type is known as Stream Cipher, which encrypt plain text digits/characters one at a time.
(Advanced Encryption Standard) algorithm; the problem is the weakness of linearity existing in the S-box and key schedule [19]. In order to keep from the new attacks and implement the AES for secure communication, and give out a new implementation scheme for increasing complexity of nonlinear transformation in design of Sbox. The default algorithm in this method is AES with 128,192 and 256 bits keys [20]. The principle weakness is the problem of linearity in the S-box and key schedule.
For example take a word doctor. The ASCII value of d is 100 and in binary it is 1100100. After transformation it comes to be 00100110 1 and* 100*3=300 0 continue + 0 continue * 1 and+ 300+3=303 1 and 303-3=300 1 and * 300*3=900 0 continue -
2.1.2 Example Here there are two predefined stacks and let the key value is 3. 1st Stack * + - + * - - + * 2nd Stack @ # ~: $
restriction of language in this algorithm. However this may be implemented on Dot Net with some restriction.
Algorithm
DES
It appears that star topology [7] is the most suitable network architecture for implementation of this algorithm. In this each node is connected to the hub with a
point-to-point connection. All traffic passes through the computer that serves as a repeater or signal booster in this first sender and receiver agrees on a common key value that is stored on central database. Now the text is send by sender in encrypted form. The receiver will recover the actual text using common key and inverse step that are performed by algorithm. Star topology can be shown with the help of diagram. In actual practice a switch or hub is placed at central place and the entire computer are connected peer to peer with this central hub or switch.
AES PROPOSED
From the above table it has been shown that the proposed system requires only few amount of memory as compared to other algorithms. Basically the encryption time increases as the key length increases.
Time
of
Different
The proposed method has been implemented based on multi threading concept, which helps in efficient utilization of CPU. Hence encryption and decryption time is very optimum as compared to existing methods [8]. Below table and graph shows the time (seconds) required for encryption and decryption of text file of size 20,527bytes.
Algorithm Encryption Decryption Total Input Text file DES TDES AES Proposed
20,527
2 17 19
7 58 65
4 62 66
10 4 14
7 Conclusions
In this paper we have tried to benchmark performance analysis of popular secret key algorithms i.e. DES, TDES, and AES with TORDES algorithm. It has been proved that performance and security provided by TORDES algorithm is better than other secret key algorithms for small messages. A proposed direction for the future work could be to analyze the following factors. i) Key values steganography along with cipher text ii) Key factors for implementations like features with operating system, networking, etc. iii) The hardware implementation of TORDES in EVM and other machines
5 Performance Evaluations
5.1. Memory Space Requirement
The following table shows that memory requirement of proposed system is lesser as compared to existing system.
REFERENCES
[1] A Comparative Study of Performance based Crypto Analysis Features for Standard Data Encryption Algorithms with (MODDES). 2010 [2] P.Gope, Multi Operator Delimiter based Data Encryption Standard (MODDES), ICCNT 2009
[7] http://www.rsasecurity.com/company/news/releases/pr.asp? doc_id=462 submission, June 1998. [8] W.Stallings Cryptography and network security principles and practice, Fourth edition, Prentice hall, 2007 [9] Park Stephen K. and Keith W. Miller, "Random Number Generators
Good ones are hard to find", Communications of the ACM, October 1988. [10] "Basic Cryptographic Algorithms", an article available.www.itsc.state.md.us/oldsitelinfo/intemetSec-urity/ Crypto/Crytolntro. htm#Algorithms. [11] KUI-HE YANG, SHI-JIN NIU, Data Safe Transmission mechanism Based on Integrated Encryption Algorithm, 2009. [12] Tingy uan Nie, Teng Zhang,, A Study of DES & Blowfish Encryption Algorithm, 2009. [13] Fan Jing, Zhu Xian, Data Encryption by Two Keys,2009. [14] http://searchsecurity.techtarget.com/definition/cryptanalysis [15] P.P Charles & P.L Shari, "Security in Computing: 4th edition", Prentice-Hall, lnc.,2008. [16] van Tilborg, Henk C.A. (2000). Fundamentals of Cryptology. Kluwer Academic Publishers. pp. 3. ISBN 0-7923-8675-3. [17] http://www.randomnumbers.info/content/Random.htm [18] http://www.design-reuse.com/articles/13981/fpga-implementationof-aes-encryption-and-decryption.html [19] Nalini N, AES Algorithm Implemented for PDA Secure Communication with Java, 2007. [20] Daemen, Jjmen, V.:AES Proposal: Rijndael, Banksys/Katholieke, R Universiteit Leuven, Belgium, AES submission, June 1998 [21] D. Clark, Policy Routing in Internet Protocols, RFC 1102, SRI Network Information Center, May 1989. [22]Wikipedia.com
public static char getDel() { Random r=new Random(); int n=r.nextInt(10); return delus[n]; } public static void getInitDel() { toup=0; }} class ajay{ public static void main (String [] args) { try { SecretKey key = KeyGenerator.getInstance("DES").generateKey(); // Create encrypter/decrypter class DesEncrypter encrypter = new DesEncrypter(key); // Encrypt encrypter.encrypt(new FileInputStream("xyz.txt"), new FileOutputStream("plain.txt")); // Decrypt encrypter.decrypt(new FileInputStream("ciphertext.txt"), new FileOutputStream("encrypt.txt")); } catch (Exception e) { System.out.println("error"+e); } } }
Results
File transfer from one system to another
Code for TORDES package ds; import java.util.*; public class PStack2{ /*static char st[]={'*','+','-','*','+','-','*','+','-','*','+','-','*','+','-','*','+','-','*','+','-','*','+','','*','+','-','*','+','-','','+','-','*','+','-','*','+','-','*','+',' -','*','+','-','*','+','-','*','+','-','*','+','-'};*/ static char st[]={'*','+','-','+','*','-','-','+','*','-','*','+','+','-','*'}; static char delus[]={'@','#','~',':','$','~',':','$','#','@','$','@','~',':','#'}; static int top=0; static int toup=0; public static char getChar() { return st[top++]; } public static void getInit() { top=0; }