Documente Academic
Documente Profesional
Documente Cultură
2. Literature Survey
3. Proposed Algorithm AB AD A’ D
è(Crossover) è(Mutation)
The algorithm consists of two phases where the first phase
CD CB C’ B
is of generating random numbers and the other performs
encryption/ decryption.
Double Crossover
3.4 Key Generation Suppose that the Message is AB and Key is CD
The algorithm uses a 4-tuple key {p, q, s, k} where p and
q are large prime numbers, s is a chosen random number Where, A is part of Plain text before first breaking point
which is relatively prime to n, the product of p and q and k, B is part of Plain text between first and second
the key size. The key size is of Variable one. breaking points.
Then, the algorithm uses the Blum, Blum, Shub C is part of Plain text after the second breaking
Generator for generating the random numbers (Which is point.
described in Section 2.1) which are used as keys in each D is part of Key before first breaking point.
iteration for encryption. E is part of Key between first and second breaking
1. Choose p=7 and q=19
point.
2. Implies, n= 7 X 19 = 133
F is part of Key after the second breaking point.
3. Choose s=100, relatively prime with 133
4. Then, X0=s2mod n= (100)2 mod 133= 25
X1=(X0)2 mod n= (25)2 mod 133= 93 ABC DBF D B’ F
X2=(X1)2 mod n= (93)2 mod 133= 4 è(Double Crossover) è(Mutation)
X3=(X2)2 mod n= (4)2 mod 133= 16 DEF AEC A E’ C
. .
. . Then, the Plain Text’s (Binary representation of ASCII
Here, the key is represented as {7, 19, 100, 8 }. code) is cross-over’d with Key (Binary representation)
generated by BBS (Section 3.1)
3.5 Encryption/ Decryption Algorithm
The proposed algorithm follows the below given method Here, The Cipher text that will be sent consists of 2 numbers
for encryption and decryption. The Random numbers should A’D and C’B instead of AB in the reverse number (if single
be generated concurrently in both the processes. crossover is performed) and DB’F and AE’C instead of
3.2.4 Encryption ABC in the reverse order (if double crossover is performed).
The Encryption process is carried out as :
for every bit in the file until EOF For the plain text “TEXT” the encryption process is as
if random number generated is odd follows:
perform CROSSOVER between plain text(binary
representation of ASCII value) and the random Character ASCII Value Binary Value
number(in binary representations ) where the T 83 01010011
breaking point is xi%k . E 69 01000101
else if the number generated is even X 87 01010111
perform Double CROSSOVER between plain T 83 01010011
text(binary representation of ASCII value) and the
random number(in binary represenations) where the 01010011(83) 01011001 01001001(73)
first breaking point is xi%k and second one is è(Crossover) è(Mutation)
(xi+s)%k. 00011001(25) 00010011 00000011(3)
perform MUTATION at the (2*xi)%k position in the
offsprings.. So the Cipher Text is (3, 73). This process is continued until
all the text in source file (Plain text) is completed.
The set of two numbers from the above output is the cipher 3.2.5 Decryption
text.
Single Crossover The Decryption process is carried out as :
Generate random numbers concurrently.
Suppose that the Message is AB and Key is CD for every bit in the file(cipher text) until EOF
Where, A is part of Plain text before breaking point if random number generated is odd
B is part of Plain text after breaking point. read two characters at a time.
C is part of Key before breaking point. perform CROSSOVER between the second number
D is part of Key after breaking point. read and the xi(binary representations) where the
breaking point is n%k .
perform MUTATION at the (2*xi)%k position in the
crossovered numbers.
(IJCNS) International Journal of Computer and Network Security, 57
Vol. 2, No. 4, April 2010
perform CROSSOVER between first offspring of the Ease of analysis : The algorithm is explained concisely over
above phase and the first character read(in binary here. Even though it is difficult to cryptanalyze . RSA and
representations). DES lacks in this feature.
else if the number generated is even
perform Double CROSSOVER between the second 5. Conclusion and Future Enhancements
number and the key (binary representation of ASCII
Hence, The paper proposes a new algorithm which is
value)where the first breaking point is xi%k and
equivalently secure with RSA and Triple DES and which
second one is (xi+s)%k .
can be easily implemented on the hardware.
perform MUTATION at the (2*xi)%k position in the
crossovered numbers. Future process will be devoted to extend the algorithm to
perform CROSSOVER between first number of the achieve the other security services like Authentication, Data
above output and the first character read(binary Integrity etc.,
representations).
References
The first number of the above output is the plain text(if
single crossover is to be performed) [1] Lenore Blum, Manuel Blum, and Michael Shub.,
“Comparision of two pseudo random number
generators” Proc. CRYPTO’82, pages. 61-78,
A’ D A’ D A D
Newyork, 1983.
è(Crossover) è(Mutation)
[2] William Stallings, “Cryptography and Network
C D C’ D C’ D
Security”, Prentice Hall, 3rd Edition.
[3] Subramil Som, Jyotsna Kumar Mandal and Soumya
A D A B à Plain Text Basu, “A Genetic Functions Based Cryptosystem
è(Crossover) (GFC)”, IJCSNS, September 2009.
C’ B C’ D [4] Ankit Fadia, “Network Security”, Macmillan India Ltd.