Documente Academic
Documente Profesional
Documente Cultură
ISSN 2278-6856
Assistant Professor
Y.S.R Engineering college of Y.V.U
3
3rd B.Tech C.S.E
Y.S.R Engineering college of Y.V.U
Abstract
Data Security is plays a vital role in Data Communication
through Internet . Definitely there is a need to protect the data
from unauthorized access .To protect data Cryptography plays
an important role . Cryptography is a technique which allow
human-being to encrypt the data in such a way that the
decryption can be performed without the aid of sender. In
proposed algorithm logical OR operation is used to generate
key , XOR operation is used to encrypt data which is a
reversible process . By using Railfence algorihm data will be
shuffled . In this algorithm key will be changed from round to
round . This algorithm is more secure because it uses different
key for each round.Logical OR , XOR operations are very easy
to implement so that this can be implemented eassly .
1. 1.Introduction
Now-a-days wireless communication is used more
commonly than wired. During communication information
is transmitted/received from one system to other system or
between networks. While transferring the information[1]
the major thing to be concerned is to provide security[1] to
the information to avoid from the attack of intruders. The
security not only considers the adequate protection but also
should focus on external environment. The external
environment includes both the potential and rogue users.
Based on IP address data transmission is done. Through
the falsified address intruders may grab the data.
Information security consists of following factors
integrity[5], confidentiality[3], authentication[2] and nonrepudiation[4].
Authentication: The process of proving one's identity.
Privacy/Confidentiality: Ensuring that no one can
read the message except the intended receiver.
Integrity: Assuring the receiver that he received
message has not been altered in any way from the
original.
Non-repudiation: A mechanism to prove that the
sender really sent his message
Cryptography[4] is the tool used to provide security.
Modern cryptography is based on key.
2. Existing method
2.1Encryption algorithm:
Step 1: Start
Step 2: Input the plaintext message Pi, 1 i n.
Step 3: Declare the key value K.
Step 4: Generate 5 different key values Kj, 1 jmod6,
K1= K, K2 = 2*K, K3 = 3*K,
K4 = 4*K, K5 = 5*K;
Step 5: Ci = Pi + Kj;
Step 6: Repeat for i = 1 to n
j = 1 to mod 6
Ci = Pi + Kj;
= Left shift (Ci);
[Ci] final = Ones Complement of [
Output [Ci] final
Step 7: Stop
2.2Decryption algorithm
Completely reverse process of encryption algorithm.
];
3.Proposed method
3.1 Encryption process:
The message is in the form of plain text. It is represented
in matrix form and mathematical and logical operations on
matrices will act as key. XOR operation is performed for
original and key matrix. The result is arranged by using
rail-fence algorithm and it is cipher text.
3.1.1 Encryption algorithm
Step1: start
Step2: Input message is transmitted
Step3: Take character by character in plain text and
arrange them in matrix form
Step4: perform mathematical or logical operations
Step5: The result of the step4 act as key
Step6: perform XOR operation for original matrix and
key matrix
Step7: Rail fence algorithm is applied for resultant
matrix
Step8: The result of step7 is cipher text
Step9: stop
3.2 Decryption process
Cipher text is arranged in the matrix form using rail fence
algorithm. XOR operation is performed for each matrix
with key matrix which is used as encryption process. The
result of the XOR operation is in text form that is plain
text.
3.2.1 Decryption algorithm
Step1: start
Step2: cipher text is given as input
Step3: Arrange the cipher text in matrix form by
applying rail fence algorithm
Step4: Perform XOR operation on each matrix with key
matrix
Step5: Arrange character by character from resultant
matrix
Page 44
ISSN 2278-6856
5. Result
5.1 Encryption
Consider the message This message is very secret . Now
consider the first 9 characters from the message represent
it in matrix(A) form
A=
Represent each character in both matrices with their ASCII
values
Page 45
ISSN 2278-6856
Author
Features :
6. Limitations
Size of both matrices must be equal.
7. Conclusion
References
[1] Information Security: Text Encryption and Decryption
with Poly Substitution method and combining features
of cryptography.-R.Venkateswaram, Dr.V.Sundaram
,June 2010.
[2] A modified Hill cipher Involving Interweaving and
Iteration.- V. Umakanta Sastry, N. Ravi Shankar and
S. Durga Bhavani , July 2010.
[3] A block cipher having a key on one side of plain text
Matrix and its Inverse on the other side. Dr. V. U.
K.Sastry, Prof. D. S. R. Murthy, Dr. S. Durga Bhavani
.
[4] Cryptography and Network Security Principles and
Practices, Third Edition William Stallings
[5] Applied Cryptography Protocols, Algorithms and
Source Coding BRUE SCHNEIER, Second
Edition,John Wiley & Sons, Inc.
Page 46