Sunteți pe pagina 1din 8

International Journal of Computer Engineering & Technology (IJCET)

Volume 7, Issue 2, March-April 2016, pp. 3643, Article ID: IJCET_07_02_005


Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=2
Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 09766375
IAEME Publication

ARTIFICIAL NEURAL CRYPTOGRAPHY


DATAGRAM HIDING TECHNIQUES FOR
COMPUTER SECURITY OBJECTS
REGISTER
Dr. R. Mala
Assistant Professor, Department of Computer Science,
Alagappa University, Karaikudi, Tamilnadu
K. Karthikeyan
Research Scholar, Department of Computer Science
Marudupandiyar College, Vallam, Thanjavur, Tamilnadu
ABSTRACT
Cryptography is the scientific study of mathematical and algorithmic
techniques relating to information security. Cryptographic techniques will
help to protect information in cases where an attacker can have physical
access to the bits representing the information, ex. When the information has
to be sent over a communication channel that can be eaves dropped on by an
attacker. Cryptographic primitives are the basic building blocks for
constructing cryptographic solutions to information protection problems. A
cryptographic primitive consists of one or more algorithms that achieve a
number of protection goals. There is no well-agreed upon complete list of
cryptographic primitives, nor are all cryptographic primitives independent, it
is often possible to realize one primitive using a combination of other
primitives.
Key words: Cryptography, Datagram Protocol, Cipher, Decipher, AES,
CSOR
Cite this Article: Dr. R. Mala and K. Karthikeyan. Artificial Neural
Cryptography Datagram Hiding Techniques For Computer Security Objects
Register, International Journal of Computer Engineering and Technology,
7(2), 2016, pp. 3643.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1

http://www.iaeme.com/IJCET/index.asp

36

editor@iaeme.com

Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register

1. INTRODUCTION
Cryptography is the art or science of keeping messages secret suppose that someone
wants to send a message to a receiver, and wants to be sure that no-one else can read
the message. However, there is the possibility that someone else opens the letter or
hears the electronic communication. In cryptographic terminology, the message is
called plaintext or cipher text. Encoding the contents of the message in such a way
that hides its contents from outsiders is called encryption. The encrypted message is
called the cipher text. The process of retrieving the plaintext from the cipher text is
called decryption. Encryption and decryption usually make use of a key, and the
coding method is such that decryption can be performed only by knowing the proper
key.
A method of encryption and decryption is called a cipher. Some cryptographic
methods rely on the secrecy of the algorithms; such algorithms are only of historical
interest and are not adequate for real-world needs. All modern algorithms use a key to
control encryption and decryption; a message can be decrypted only if the key
matches the encryption key.
There are two classes of key-based encryption
algorithms, symmetric (or secret-key) and asymmetric (or public-key) algorithms. The
difference is that symmetric algorithms use the same key for encryption and
decryption (or the decryption key is easily derived from the encryption key).
The Advanced Encryption Standard (AES) specifies a FIPS-approved
Cryptographic algorithm that can be used to protect electronic data. The AES
algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt
(decipher) information. Encryption converts data to an unintelligible form called
cipher text; decrypting the cipher text converts the data back into its original form,
called plaintext.
The AES algorithm is capable of using cryptographic keys of 128, 192, and 256
bits to encrypt and decrypt data in blocks of 128 bits. The algorithm specified in this
standard may be implemented in Software, firmware, hardware, or any combination
thereof. The specific implementation may depend on several factors such as the
application, the environment, the technology used, etc. The algorithm shall be used in
conjunction with a FIPS approved or NIST recommended mode of operation. Object
Identifiers (OIDs) and any associated parameters for AES used in these modes are
available at the Computer Security Objects Register (CSOR), located at
Implementations of the algorithm that are tested by an accredited laboratory and
validated will be considered as complying with this standard. Since cryptographic
security depends on many factors besides the correct implementation of an encryption
algorithm, Federal Government employees, and others, should also refer to NIST
Special Publication 800-21 for additional information and guidance

2. DESIGN AND ANALYSIS


Encryption is the process in which we can enjoy security by hiding the secret codes
without worrying about any one reading the contents. This process will normally be
used in Army Defense Forces.
The objectives to the problems are
1. It gives good results
2. Data security is fulfillment through Logical means.
3. To avoid physical security. That is used to communication channel.

http://www.iaeme.com/IJCET/index.asp

37

editor@iaeme.com

Dr. R. Mala and K. Karthikeyan

Need for computerization:


The top down approach of development was followed for the construction of this
application is broken into procedures until the input output &process of each sub
procedures are well defined.

Figure 4 Hierarchical Structure of Datagram Design

http://www.iaeme.com/IJCET/index.asp

38

editor@iaeme.com

Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register

Figure-1: Cryptographic Primitives

Figure 1 Cryptography Primitive Data Models

http://www.iaeme.com/IJCET/index.asp

39

editor@iaeme.com

Dr. R. Mala and K. Karthikeyan

Figure 2 Encryption Data Crypto Primitive Models

http://www.iaeme.com/IJCET/index.asp

40

editor@iaeme.com

Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register

Figure 3 Crypto Primitive Output Models

http://www.iaeme.com/IJCET/index.asp

41

editor@iaeme.com

Dr. R. Mala and K. Karthikeyan

3. RESULT AND DISCUSSION


Cryptographic algorithm that can be used to protect electronic data. The AES
algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt
(decipher) information. Encryption converts data to an unintelligible form called
cipher text; decrypting the cipher text converts the data back into its original form
called plaintext. The AES algorithm is capable of using cryptographic keys of 128,
192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The algorithm
specified in this standard may be implemented in software, firmware, hardware, or
any combination thereof. The specific implementation may depend on several factors
such as the application, the environment, the technology used, etc. The algorithm shall
be used in conjunction with a FIPS approved or NIST recommended mode of
operation. Object Identifiers (OIDs) and any associated parameters for AES used in
these modes are available at the Computer Security Objects Register (CSOR), located
at Implementations of the algorithm that are tested by an accredited laboratory and
validated will be considered as complying with this standard. Since cryptographic
security depends on many factors besides the correct implementation of an encryption
algorithm, Federal Government employees, and others, should also refer to NIST
Special Publication 800-21 for additional information and guidance. (NIST SP 800-21
is available)

4. CONCLUSION
This Cryptography Datagram Hiding Techniques Based on Computer Security
Objects Register research paper is very useful to keep the secret message safely
without reading the content by the others. It maintains the logical security. These
algorithms are only of historical interest and are not adequate for real-world needs of
security by hiding the secret codes without worrying about any one reading of the
contents. We conclude that this research work will be helpful for Army Defense
forces and public commercial purposes.

REFERENCES
[1]

[2]

[3]

[4]

[5]

[6]

H. Khan, Y. Javed, S. A. Khayam, F. Mirza. Embedding a Covert Channel in


Active Network connections. In Proceedings of IEEE Global Communications
Conference (GlobeCom), December 2004.
S. H. Sellke, C.-C. Wang, S. Bagchi, N. B. Shroff. Covert TCP/IP Timing
Channels: Theory to Implementation. In Proceedings of the 28th Conference on
Computer Communications (INFOCOM), April 2005
S. Gianvecchio, H. Wang, D. Wijesekera, S. Jajodia. Model-Based Covert
Timing Channels: Automated Modeling and Evasion. In Proceedings of Recent
Advances in Intrusion Detection (RAID) Symposium, September 2008.
S. Zander, G. Armitage, P. Branch. Covert Channels and Countermeasures in
Computer Network Protocols. IEEE Communications Magazine, 45(12):136142, December 2002
S. Zander, G. Armitage, P. Branch. A Survey of Covert Channels and
Countermeasures in Computer Network Protocols. IEEE Communications
Surveys and Tutorials, 9(3):44-57, October 2007
M. Van Horenbeeck. Deception on the Network: Thinking Differently About
Covert Channels. In Proceedings of 7th Australian Information Warfare and
Security Conference.

http://www.iaeme.com/IJCET/index.asp

42

editor@iaeme.com

Artificial Neural Cryptography Datagram Hiding Techniques For Computer Security Objects
Register
[7]

[8]

[9]

[10]

[11]

[12]

[13]

[14]

[15]

S. J. Murdoch. Hot or Not: Revealing Hidden Services by Their Clock Skew. In


Proceedings of 13th ACM Conference on Computer and Communications
Security (CCS), pages 27-36, November 2006.
W. Mazurczyk, Z. Kotulski. Covert Channel for Improving VoIP Security.
In Proceedings of Multi conference on Advanced Computer Systems (ACS),
pages 311-320, October 2006
R. C. Chakinala, A. Kumarasubramanian, R. Manokaran, G. Noubir, C. Pandu
Rangan, R. Sundaram. Steganographic Communication in Ordered Channels.
In Proceedings of 8th International Workshop on Information Hiding, pages 4257, July 2009.
P. Singh. Whispers On The Wire - Network Based Covert Channels Exploitation
& Detection. In Symposium on Security for Asia Network (SyScAN), September
2011.
S. Li, A. Ephremides. A Covert Channel in MAC Protocols based on Splitting
Algorithms. In Proceedings of Wireless Communications and Networking
Conference (WCNC), pages 1168-1173, March 2010.
Y. Liu, D. Ghosal, F. Armknecht, A.-R. Sadeghi, S. Schulz, S. Katzenbeisser.
Hide and Seek in Time - Robust Covert Timing Channels. In Proceedings of
14th European Symposium on Research in Computer Security, September 2009.
Er. Abhijeet, Mr. Praveen Tripathi, Er.Anuja Priyam and Er.Vivek Kumar.
Implementation of Public Key Cryptography In Kerberos with Prevention of
Security Attacks, International Journal of Computer Engineering and
Technology, 4(3), 2013, pp. 248253.
Henry Navarro and Leonardo Bennun. Descriptive Examples of The Limitations
of Artificial Neural Networks Applied To The Analysis of Independent
Stochastic Data, International Journal of Computer Engineering and
Technology, 5(5), 2014, pp. 4042.
Ahmad Salameh Abusukhon. Block Cipher Encryption For Text-To-Image
Algorithm, International Journal of Computer Engineering and Technology,
4(3), 2013, pp. 5059.

http://www.iaeme.com/IJCET/index.asp

43

editor@iaeme.com

S-ar putea să vă placă și