Data Encryption Technique Using Random Number and Salective Encryption Algorithem

DOI : 10.17577/IJERTV3IS042413

Download Full-Text PDF Cite this Publication

Text Only Version

Data Encryption Technique Using Random Number and Salective Encryption Algorithem

Sonali Sharma

Computer Science And Engineering(Information Security) Disha institute Of Management And Technology

Raipur, India

Prof. Somesh Kumar Dewangan

Computer Science And Engineering(Information Security) Disha institute Of Management And Technology

Raipur, India

Abstract Symmetric key algorithms are a typically critical and useful cryptosystem, therefore it has critical applications in lots of field. Encryption will be the primary strategy to provide security towards the data, which is travelling over a communication link between any set of nodes, but Not bothered encryption is really a technique to save lots of computational energy, overhead, pace, time also to provide rapid security by only encrypting some sort of selected portion In wireless ad hoc network with restraint resources, this cryptosystem dependent on symmetric key algorithms is quite prefer a great nimble as well as dynamic natural environment, along with different protection strategies. In this paper, we introduce the concept of selective encryption into your design involving message security strategies. First, we provide the theory of selective encryption as well as propose some symmetric selective encryption algorithm dependant on symmetric key. A communication having uncertainty transmitted through sender for you to receiver, so that only authorized recipient can decrypt this cipher text. other unauthorized nodes don't have any knowledge with the transmitted messages generally speaking. We likewise employ other security ways of enhance this security involving proposed system. For implementing this method we conduct an extensive set of experiments dependant on matlab, and they also improve this efficiency involving message encryption.

Keywords Inventory Management, Stock, Assets.

  1. INTRODUCTION

    A fundamental technique of information protection in network connected with details and system safety measures is cryptography, which includes also been trusted as a classic software connected with information protection. Symmetric key algorithms have supported as a classic method to information defense for a long period, as they may guard some text in a very effortless method.sender and reciver on the information merely require a shared essential to be able to encrypt and decrypt the information. Here, symmetric important factors usually are often referred to as key important factors. In line with the features connected with symmetric important factors, fortunately they are often utilized as party important factors or maybe procedure key[4]. Even though there are lots of positive advantages concerning symmetric important factors, considered one of his or her essential flaws may be the quick period of the important thing, that leads to be able to worries concerning safety measures [2]. Thus, all of us consider a symmetric key formula ought to be utilized together with other safety measures parts to reinforce it is safety measures. The use of cryptography is particularly commonplace inside nowadays technology period, and standard these include the use of

    cryptographic strategies to armed forces marketing and sales communications, personal purchases, etc.The defense connected with information secrecy and honesty usually are attained by way of process of encryption and decryption. Nonetheless, based on the top features of wi-fi products, a wireless ad hoc system offers exclusive safety measures and efficiency requirements intended for regular cryptographic algorithms. At present, there are a number connected with systems to deliver protection intended for information secrecy and honesty. Considered one of major cryptographic techniques, symmetric essential algorithms usually are trusted because efficiency connected with information defense. Commonly, a symmetric essential cryptosystem utilizes a key(same key) intended for the two side server side or maybe receiver side. You can declare intended for the two encryption and decryption course of action same essential is employed. This kind of key essential is merely shared with the sender and reciver on the communicating parties and stored confidential to be able to other immaterial people. The secrecy on the information will likely be safeguarded properly, if the key essential is stored confidential and distributed securely. Determine 1 shows the schematic diagram connected with symmetric essential encryption and decryption process. For any wireless and mobile system, given that wireless products are often built with electric batteries as his or her power, they've got minimal computational ability and the difficulty of energy preserving is probably the most important worries. Subsequently, an efficient selective encryption formula is really a probable treatment for preserve significant power intended for wireless products, and while doing so, to deliver satisfactory defense intended for information conversation.

    Figure 1. An example of encryption and decryption processes.

    In this article, we study the issue of selective encryption for wireless and mobile networks. At first we discuss the characteristics of wireless ad hoc networks and the necessity of selective encryption. Then, we present a probabilistic selective encryption algorithm based on various security strategies, which encrypts the transmitted packets by via of probabilistic function and stochastically selective algorithm. Through applying the selective and probabilistic methods, our

    Figure 1: An example of encryption and decryption Processes

    proposed scheme enhances the reliability of selective algorithms, and avoids the relevance between different messages encrypted by symmetric keys. Thus, it effectively prevents data disclosure to untrustworthy nodes and economizes the overhead spent on the data protection for a network. Such a probabilistic solution is suitable to dynamic and open environments.

  2. RELATED WORKS

    New research continues to be extensively carried on the division of cryptography and also data encryption [6, 8, 11]. A range of cryptographic techniques for example symmetric key, asymmetric key, digital trademark, are developed to produce secure information protection. As an example, Thamrin et ing. [17] study the challenge of arbitrary number generation for generating pseudo arbitrary number inside a cryptosystem. They make use of a pseudo RNG (hardware- based pseudorandom number generator) and a true RNG (true arbitrary number generator) in order to create a cross generator. This kind of combinational system can boost the randomness and also reliability regarding key era. Zhou et ing. [20] investigate digital trademark using self applied certificate. In line with the properties regarding public key- based certificate, a consumer S uses the open key given by an authority and also hash function to join up with this authority. There after, the power will determine and difficulty one promise G in order to verify this signers trademark. Prakash and also Uthariaraj [15] current an n-way cryptosystem pertaining to multicast, which works on the hierarchical structure to regulate the nodes inside a network, and symmetric keys are used to achieve the design regarding multi-crypt. Several important operates of key management, for example rekeying, key revocation, are introduced to scale back the overhead of key exchange. To supply more prospective in regards to the performance from the compared algorithms, this area discusses the outcome obtained through other methods. It was concluded inside [5] of which AES is usually faster ad even more efficient than other encryption algorithms. When the transmission regarding data is known as there is usually insignicant big difference in efficiency of unique symmetric key schemes A report in [6] is usually conducted pertaining to different well-known secret key algorithms for example DES, 3DES, AES, and also Blowsh. We were looking at implemented, and also their efficiency

    was when compared by encrypting input less regarding varying contents and measurements. The outcomes showed of which Blowsh had a great performance when compared to other algorithms. But it showed of which AES had a greater performance than 3DES and also DES. Furthermore, it shows of which 3DES provides almost 1/3 throughput regarding DES, or to put it differently it needs three times than DES in order to process the identical amount regarding data. A report in [4] is usually conducted pertaining to different well-known secret key algorithms for example RC4, AES, and also XOR. We were looking at implemented, and his or her performance was compared by simply encrypting for realtime video streaming of varying contents. The final results showed; encryption wait overhead applying AES is below the overhead using RC4 and also XOR criteria. Therefore, AES is often a feasible treatment for secure realtime video transmissions. It had been shown inside [1] of which energy usage of different frequent symmetric key encryptions on hand-held units. It can be found that following only 1000 encryptions of a 5 MB le using Triple-DES the battery power is 45% and also subsequent encryptions aren't possible because battery is dissipated rapidly.

    Conventional Protection Strategies Zhou and also Yang [19] current a shades signature method by making use of hyper- elliptic figure encryption. A trusted signer has the capacity to generate shades signature and verify this signature with no knowledge in regards to the message. Bao and also Deng [1] layout a simple and quick cryptosystem depending on symmetric key encryption. By means of the combination of block cipher and also stream cipher, they reap the benefits of both of the advantages: a solution key is distributed by the safety of prevent cipher, though the communicated plaintext is usually encrypted by the stream cipher. Diament et ing. [5] propose to her a combined receiver cryptosystem, which desires dual tips from both the first along with the second receivers in order to decrypt the ciphertext. Throughout its key construction course of action, the Diffie-Hellman standard protocol is followed for key exchange. Küsters and also Tuengerthal [9] investigate the computational consumption utilised by symmetric key encryption. Especially, they current a a symbol criterion pertaining to key exchange protocols, as well as ciphertext encrypted by simply their labeled keys does not need to carry any extra information. W. The Present Selective Encryption Systems Currently, selective encryption algorithms tend to be mainly applied in the field of secure multimedia systems communications, because volume regarding multimedia information is enormous to transmit along with the cost will probably be overwhelmed if each package is encrypted or decrypted.

    Lian et ing. [10] current a movie encryption structure for Superior Video Coding (AVC) codec. Inside their algorithm, only individuals sensitive information are chosen to be encrypted, for example residue information and movement vector. Especially, the intra-prediction mode is encrypted based on context-based adaptive changing length html coding. Jun et ing. [7] propose to her a two-way not bothered encryption structure for MPEG movie transmission, to be

    able to speed the process regarding encryption, in which each shape is cut up to mirielle slices, each and every slice is usually first applied with XOR operations, and next the resultant peel is selectively encrypted by using a symmetric key. Massoudi

    et ing. [12] define a series of evaluation common for JPEG 2000 pressurized image transfer, including encryption relation, cryptographic safety measures, compression friendliness, structure compliance, and so on. In unique, selective encryption algorithms are definitely more preferable by simply wireless networks simply because can preserve energy pertaining to wireless units.

    Xiao et ing. [18] propose an application instance regarding selective algorithms and also adopt the lightweight media data encryption procedure. They utilize traditional prevent cipher in order to encrypt this plaintext partly (part I), after which use this plaintext in order to encrypt the others part (part II). From the modification from the ratio concerning parts My partner and i and II, this encryption swiftness is tweaked accordingly. Their criteria is used on video seminar for wifi terminals.

  3. THE SALECTIVE ENCRYPTION ALGORITHEM

    AES-Rijndael having 128/192/256 touch keys as well as 16 byte files treats files in 4 categories of 4 bytes, operating a complete block divorce lawyers every round. During that time, AES are believed not well suited for visual data like digital image as a consequence of long calculation process. Recent advances in equipment capability as well as improvement with software have led to achieve the optimal delivery rate if we can find the size of input talk about by putting into action our BEACH algorithm process. The result demonstrates the size of input talk about among 20 × 20 to help 30 × 30 will get the least execution time. In this particular paper, we proposed a story encryption criteria called SEA and that is selective as well as improves the AES criteria. The Architecture of BEACH is found in Figure 2. The Architecture allows anyone to perform core perception of our algorithm can be an optional way implemented through Selector component given with Figure 2. The electronic digital visual data involve some different forms, like online video media, audio, Image, text document, and such like. As many of us known, many types of platforms by many types of devices are within the wire/wireless system. Protection in opposition to unwanted eavesdropping is essential for the viability involving wireless hiburan services. Moreover, in a lot of wireless purposes, network means, such as bandwidth, as well as node means, such as battery, must always be conserved. Since whole encryption involving transmitted files streams can certainly place a heavy signal control burden in originating as well as receiving nodes, one is concluded in consider the technique of partial encryption on the data avenues.

    In incomplete encryption a percentage on the transmitted files stream is processed through an encryption criteria, with the remaining of your data stream being submitted the clear. The

    questions to become addressed with partial encryption usually are:

    1. Just what data has to be encrypted to offer the needed higher level of security

    2. What is the percentage on the data stream that really must be protected? Obviously, the files chosen to become protected has to be the most important bits regarding reconstruction on the content from the overall files stream, and this also idea provides lead incomplete encryption to help sometimes always be denoted as selective encryption.

    Figure2: Architecture of SEA

  4. ISSUES OF SELECTIVE ENCRYPTION ALGORITHM

    selective encryption usually are widely acknowledged in energy-aware contexts, due to the fact that they are able to reduce the particular overhead used on data encryption/decryption, and improve efficiency from the network. Critical factors as well as metrics in selective encryption include things like:

    1. Stability Criterion

      selective encryption is actually proposed each in programs where it can be sufficient to be able to damage the attackers

      degraded as well as in programs where it can be hoped that the attacker could gain no useful information at all about the information an even we may call secret. Obviously, it is not particularly damning to show that a hed unit only meant to degrade content does not make this secret. It can be true, however, that degraded is actually vague as being a metric because it will change by distinct attacker and be affected by the cost from the alternative invest in. A more complication is actually that in certain applications the particular intention is to both degrade the information to make it desirable to buy yet get away from enough fidelity that the degraded articles can serve being an advertisement to the purchased articles.

    2. Stability Validation

      now and again researchers confirm security by feeding a selectively encrypted stream to a standard decoder setup and paying attention to resulting reconstructions. Within others, researchers use a cryptanalytic method, playing the particular role of active attacker able to cooperate with a improved decoder along with available details to eliminate the discerning encryption.

    3. Complexity

      one popular goal associated with selective encryption is a decrease in the fraction of material that should be encrypted. This reduction ought to be measured and turn into offset versus increases in complexity in, say, additional parsing operations necessary to implement discerning encryption.

    4. Algorithmic Restrictions

    some discerning encryption techniques limit them selves to working together with fixed compression setting algorithms (e. gary the gadget guy., standard MPEG), while others allow a few variation from the compression algorithm to enhance selective encryption.

  5. FULL ENCRYPTION ALGORITHEM

    To be able to protect the particular confidentiality regarding communicated messages, selective encryption formula takes benefit of major kinds of cryptographic methods, symmetric and also asymmetric essential algorithms, to guarantee the protection of sold back information. On the other hand, due towards constrained computational electrical power of wi-fi devices, it's not realistic for you to encrypt many information always while using the public essential algorithms (PKI). That's why, all standard data verbal exchanges between 2 nodes are going to be encrypted by means of symmetric essential, and for the time being, these symmetric keys are going to be distributed by public essential encryption formula. In some sort of network, each time a node desires to communicate together with another node, a magic formula key (symmetric key) are going to be generated for their communication [16]. We will denote the particular initiating node while S and also receiving node while R. If a good initiating node Azines moves in to the neighborhood regarding node r,

    Figure 3:The schematic diagram of key distribution

    These figure illustrates the task of key key supply between a couple nodes. The messages sender composes some sort of communicating obtain message req which contains not simply its identifier IDS, and also its open public key PKS, when it comes to their in the future mutual authentication. When the receiver gets a real communication obtain, a key key (symmetric key) SKS will probably be generated through the receiver in addition to encrypted with all the public critical PKS of the requester, which is within the

    communicating obtain message. After, the recipient composes some sort of communicating response rep communication and acknowledgement it to the communicating sender, in order to indicate in which their communication has been successfully established. After the actual sender gets the response from the receiver, it will use it's corresponding exclusive key PRS for you to decrypt the secret key SKS issued from the receiver.

  6. PROBLEM DEFFINETION AND PROPOSED WORK

Full encryption takes a longer time in toss a coin and probabilistic encryption. In toss a coin selective encryption algorithm in which the message is devided into 2 groups odd or even number of message in this either a odd or even number of message are encrypted. Selective encryption will be done on the selective part of the data and then the selected part will be encrypted. According to this paper survey we fond problem which if defined above and we propose future work which is possible to done in this filed. we propose that use random massage instead of select only odd or even number of massage and also use random encryption technique for every randomly selected massage.

ACKNOWLADGEMENT

I am very much grateful to Department of CSE, DIMAT to give me opportunity to work on attack and routing protocols in MANET. I sincerely express my gratitude to Mr. somesh dewangan Dept. of M.Tech CSE, DIMAT for giving constant inspiration for this work. I am also thankful to Mrs. Preeti Tuli, Dept. of CSE, DIMAT for helping me directly and indirectly during this work. I am really thankful to my all friends for their blessing and support.

REFFERENCE

  1. F. Bao, and R. H. Deng, Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks, Proceedings of IEEE Global Telecommunications Conference, pp. 271350, 2007.

  2. A. Boukerche, Handbook of Algorithms for Wireless and Mobil Networks and Computing, CRC Chapman Hall, 2005.

  3. A. Boukerche, Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks, Wiley & Sons, 2008.

  4. J. Broch, D. A. Maltz, and D. B. Johnson, Eds., A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols, Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking, pp. 8597, 1998.

  5. T. Diament, H. K. Lee, and A. D. Keromytis, Eds., The dual receiver cryptosystem and its applications, Proceedings of 11th conference on Computer and communications security, pp. 330343, 2004.

  6. D. Jena, S. K. Panigrahy, and S. K. Jena, A novel and efficient cryptosystem for long message encryption, Proceedings of Intl Conference on Industrial and Information Systems, pp. 79, 2009.

  7. L. Jun, L. Zou, and C. Xie, Eds., A two-way selective encryption algorithm for MPEG video, Proceedings of International Workshop on Networking, Architecture, and Storages, 2006.

  8. N. Komninos, D. Vergados, and C. Douligeris, Layered security design for mobile ad hoc networks, Computers & Security, vol. 25, pp. 121 130, 2006.

  9. R. Küsters, and M. Tuengerthal, Computational soundness for key exchange protocols with symmetric encryption, Proceedings of 16th Conf. on Computer and communications security, pp. 91100, 2009.

  10. S. Lian, Z. Liu, and Z. Ren, Eds., Secure advanced video coding based on selective encryption algorithms, IEEE Transactions on Consumer Electronics, Vol. 52, pp. 621629, 2006.

  11. W. Lou, W. Liu, and Y. Fang, SPREAD: enhancing data confidentiality in mobile ad hoc networks, Proceedings of 23rd Conference of the IEEE Computer and Communications Societies, pp. 24042413, 2004.

  12. A. Massoudi, F. Lefebvre, and C. De Vleeschouwer, Eds., Secure and Low Cost Selective Encryption for JPEG2000, Proceedings of 10th IEEE International Symposium on Multimedia, pp. 3138, 2008.

  13. NS-2, available at http://www.isi.edu/nsnam/ns/, Information Sciences Institute, University of Southern California.

  14. U. Potdar, K. T. Talele, and S. T. Gandhe, Comparison of MPEG video encryption algorithms, Proceedings of Intl Conference on Advances in Computing, Communication and Control, pp. 289294, 2009.

  15. A. J. Prakash, and V. R. Uthariaraj, Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication, Proceedings of 1st

    Intl Conference on Networks and Communications, pp. 246253, 2009.

  16. Y. Ren, and A. Boukerche, An Efficient Trust-Based Reputation Protocol for Wireless and Mobile Ad Hoc Networks: Proof and Correctness, Proceedings of GLOBECOM, pp. 18921896, 2008.

  17. N. M. Thamrin, G. Witjaksono, and A. Nuruddin, Eds., An Enhanced Hardware-based Hybrid Random Number Generatr for Cryptosystem, Proceedings of International Conference on Information Management and Engineering, pp. 152156, 2009.

  18. C. Xiao, S. Ma, and J. Niu, Eds., A Novel Security Scheme for Video Conference System with Wireless Terminals, Proceedings of 5th IEEE International Symposium on Embedded Computing, pp. 101106, 2008.

  19. X. Zhou and X. Yang, On certain integrals of Lipschitz-Hankel type involving products of Bessel functions, Proc. of Pacific-Asia Conf. on Knowledge Engineering and Software Engineering, pp. 186189, 2009.

  20. Y. Zhou, Z. Cao, and R. Lu, An efficient digital signature using selfcertified public keys, Proceedings of the 3rd international conference on Information security, pp. 4447, 2004.

Leave a Reply