Twofish Cryptography Algorithm as Safety Equipment in Web-Based E-Commerce
|
|
- Tabitha Moody
- 6 years ago
- Views:
Transcription
1 4 th ICRIEMS Proceedings Published by The Faculty Of Mathematics And Natural Sciences Yogyakarta State University, ISBN Twofish Cryptography Algorithm as Safety Equipment in Web-Based E-Commerce Akik Hidayat 1,a), Detik Pristiana Warjaya 2,b), Erick Paulus 1,c), Asep Sholahuddin 1,d) 1) Department of Computer Engineering, Faculty of Mathematic and science, Padjadaran University, Bandung, Indonesia 2) Informatics engineering practitioners, Bandung, Indonesia ) Department of Computer Engineering, Faculty of Mathematic and science, Padjadaran University, Bandung, Indonesia 4) Department of Computer Engineering, Faculty of Mathematic and science, Padjadaran University, Bandung, Indonesia a) akik@unpad.ac.id b) detikmath08@gmail.com c) erick@unpad.ac.id d) asep.sholahuddin@unpad.ac.id Abstract. Along with many web-based development, online transaction become one of the payment options for goods and services. Fr that reason, infrastructure of data security has been built to provide convenience, comfort and security when transaction. This transaction process can lure cybercrime action against buyer and seller information, so it s necessary to safeguard the transaction process. This study conduct Twofish algorithm that is one of the algorithm cryptographic that can be implemented for web-based E-commerce as a safeguard process between buyer and seller. Kata Kunci : Cryptographic, Twofish,, E-Commerce INTRODUCTION Cybercrime as an action against a law that performed using sophisticated computer technology (Wisnubroto,1999), to overcome this situation, it s necessary to have an information protection that provides protection to buyer and seller information with cryptographic technique that is by encrypt the seller information or buyer information. This buy and sell activity bring out the term of E-commerce that is using computer network for doing communication business and commercial transaction (Yuan Gao,2005). One of the problems of the process of buy and sell on E-Commerce is the payment process itself, in general, the payment made by transaction through the Bank by transferring some amount of money to seller account, then the buyer to confirm to the seller that the money has been transferred. After the seller check whether or not transfer process, the seller delivering the goods or services to the buyer. That process has a drawback, especially in the efficiency of the time. It would be better if the transaction process is done on the concerned E-Commerce By the needed in online payment security process than the online payment secure infrastructure has been built to provide convenience, comfort and security while transaction. Another reason and also must be anticipated is the act of cybercrime against buyer and seller information in the online transaction. Based on that reason, we want to conduct studies that implement Twofish cryptographic algorithms on the web based E-Commerce as the security mechanism in online transactions. Twofish is modern symmetrical cryptographic that one of the AES (Advance Encrytion System) Candidate in algorithm process using XOR (exclusive or) Matrix MDS, PHT or Pseudo-Hadamard transformation process. Whitening, F function and key schedule done by looping the process 16 times. The Twofish algorithm be expected to secure the buyer transaction while doing online payment on web E-commerce. This student conduct to implemented Twofish algorithm on the web E-Commerce as an encryption process for buyer information. The aim of this study is to secure buyer data or information when transaction using a Twofish cryptographic algorithm. SE-7
2 METHOD The method that used in this study is action research, that is learn main literature about the Twofish algorithms from various published sources such as textbooks, Journals, and other literature related to the issues. Looking for information related to the research issues using internet facility and learning the concept of data security. Implementation Twofish algorithm on the web application using programing language PHP or javascript. RESULT AND DISCUSSION Twofish Algorithm Twofish using a Fiestel structure through 16 loops with an additional whitening at the input and output that consist three functions, that is F function, G function, and H function. FIGURE 1. Twofish Flow Diagram F function F function is a function that found in shift of the bit, g function, S-Box and PHT (Pseudo-Hadamard Transform). The input from f function is the whitening first result that is R 0, R 1, R 2, and R. F function looping 16 times on each rotation there is an exchange position from (R 0, R 1, R 2, R ) to (R 2, R, R 0, R 1). The following equation in the f function is : (Landgeet al., 2012). T 0 = g(r 0) (1) T 1 = g(rol(r 1,8)) (2) F 0= (T 0 + T 1 + K 2r+8) mod 2 2 () F 1=(T 0 + T 1 + K 2r+9) mod 2 2 (4) G function G function is the core function from Twofish, who calculating S-Box and mapping 2 word value that is R 0 and R 1 with the result of S-Box and MDS multiplication through h function. G function denoted in (.5) equation (Landge et al.,2012) g (R0, ROL (R1, 8)) = (h (R0, S), (h(rol (R0), 8), S)) (5) S value in this equation obtained on key scheduling process SE-8
3 H function H function is the function that consists two inputs with the length of data is four bytes respectively, this function has two phases with the last process experienced a matrix multiplication process. The first step is to spell out the input word that goes into one character so divided become ASCII value with for a character in each word. For example, the input value is baju when converted to hexa become 0x98, 0x97, 0x6A, 0x75. But before processing, change the order with little Indian conversion to become (0x75,0x6A,0x97,0x98). Denoted by with h(x,l) using that converter become x = (y 2,j = x j) with j = 0... After that, input into following equation (Schneier, 1996): Z value acquired by the output of the h function with MDS matrix value is given as follows(schneier, 1996). y 0 = q 1 [ q 0 [q [y 2,0] l 1,0 ] l 0,0] (6) y 1 = q 0 [ q 0 [q 1[ y 2,1] l 1,1] l 0,1] (7) y 2 = q 1 [ q 1 [q 0 [y 2,2] l 1,2] l 0,2] (8) y = q 0 [ q 1 [q 1 [y 2,] l 1,] l 0,] (9) Z Z Z Z 0 1 = 2 Z = j0 Z MDS Y Y Y Y j i = 0,.., (11) (10) Whitening Whitening is the process that is done before and after the f function, the aim is to become the process more complicated. In the Twofish whitening algorithm, the first performed by the XOR operation in R 0, R 1, R 2, R, with the sub key zero to three in the first whitening a four until seven at the last whitening. Key scheduling Key scheduling, known as generate key is the manufacturing process of the M key that entered into 40 piece of sub keys. In this study, the key length is only 16bytes. The first obtained k value by k= N/8, N is the eight of the key, so obtained k=16/8, then k=2. After that, the key will be split into four words, M 0, M 1, M 2, and M using Indian little conversion (Schneier, 1996). M i = m (4i j). 2 8j i = 0,.., (12) j That s four words are partitioned into two parts so that become M genap and M ganjil two members respectively (Schneier, 1996). M genap = (M 0,M 2) (1) M genjil = (M 1,M ) (14) Then look for s value for the next step as an S-Box. S value obtained by the formula matrix multiplication in GF(2 8 ) (Schneier, 1996). Si Si Si Si Z,0,1,2, = RS M M M M. M 8i 8i1 8i2 8i 8i7 (15) S i = S ( i, j). 2 8j i = 0,1 (16) j SE-9
4 S i = (S 1,S 0) (17) RS is a Red Solomon Code matrix which is the result of the mapping multiplication of GF(2 8 ) with GF(2)[x]/w(x), with w(x)=x 8 +x 6 +x +x Then the constant RS matrix obtained as follows (Schneier,1996). 01 A A 58 DB 9E RS = A F 1E C6 68 E5 (18) 02 A4 A1 55 FC 87 C1 5A AE DB The final step is to make the looping process 20 times to get 40 sub keys following equations (Schneier, 1996). P = (19) A i = h(2 ip,m genap) (20) B i = ROL(h((2i + 1)p,M ganjil),8) (21) K 2i = (A i + B i)mod2 2 (22) K 2i + 1 =ROL((A i + 2B i)mod 2 2,9) (2) D 9E 19 0 Twofish Algorithm Implementation Testing This process is done on the web, e-commerce using simulated data for the registration form using this following data. TABLE 1 Registration Form Table Data Parameter Value Byte Amount Key gpoi8sigm6iwrrct 16 Name Test 4 test@test.com 1 Password Number To view the encryption process, the third application named fiddler used. In the Figure 1. The encryption process that occurs in web e-commerce has been shown. FIGURE 1 Fiddler List Process Scan Result FIGURE 2. Entry Process or Login Process Data. SE-10
5 FIGURE Coupon Code Encryption Process FIGURE 4 Encryption Process In Payment Process FIGURE 5 Payment Process Successfully. FIGURE 6 Transaction Process Enkription Process SE-11
6 FIGURE 7 Transaction Process Table In the data above, the delivery process via HTTP protocol change from plaintext into ciphertext that cannot be read by the hackers who tried to steal a user or customer information. The key in this process actually having refraction so that the keys do not appear in the data transmission process, so information delivery is secure. CONCLUSION Implemented Twofish algorithm in web e-commerce with encrypting message or data on the client while distribution the data in web e-commerce to the server through the HTTP protocol and subsequent decrypting in the server side so that can secure client data or information while doing transaction using a Twofish cryptographic algorithm. REFFERENCE 1. Al, Wisnubroto Kebijakan Hukum Pidana dalam Penanggulangan Penyalahgunaan Komputer. Yogyakarta: Universitas Widyatama. 2. Bartle, G Introduction to real analysis. New York : John Wiley & Sons, Inc. Cyber Crime Statistics and Ttrends, (online), (Accessed 28 Oktober 2016). 4. Gao, Yuan Encyclopedia of Information Science and Technology. California: Idea Group Reference. 5. Landge, Irfan, Bharmal, Tasneem, dan Narwankar, Pooja Encryption and decryption of data using Twofish algorithm paper presented at the National Conference on Emerging Trends in Information Techonology, World Journal Science and Technology. Maharashtra, India. 21 April Mulyanta, S. Edi Pengenalan Protokol Jaringan Wireless Komputer. Yogyakarta: Andi 7. Rosa A. S. And Shalahuddin, M Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek, Bandung: Penerbit Informatika. 8. Sadikin, Rifki Kriptografi untuk Keamanan Jaringan.Yogyakarta: Penerbit Andi 9. Schneier, Bruce E.J Twofish: A 128-Bit Block Cipher, ( Accessed 28 Oktober 2016) SE-12
BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION
132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS
More informationThe Design of an Anonymous and a Fair Novel E-cash System
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of
More informationAn Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security
Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al
More informationA simple approach of Peer-to-Peer E-Cash system
A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization
More informationPGP: An Algorithmic Overview
PGP: An Algorithmic Overview David Yaw 11/6/2001 VCSG-482 Introduction The purpose of this paper is not to act as a manual for PGP, nor is it an in-depth analysis of its cryptographic algorithms. It is
More informationA Combined Encryption Compression Scheme Using Chaotic Maps
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression
More informationAn implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android
Journal of Physics: Conference Series PAPER OPEN ACCESS An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android To cite this article: M A Budiman et
More informationKey Separation in Twofish
Twofish Technical Report #7 Key Separation in Twofish John Kelsey April 7, 2000 Abstract In [Mur00], Murphy raises questions about key separation in Twofish. We discuss this property of the Twofish key
More information6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.
belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the
More informationAnalysis of the Use of Whirlpool s S-box, S1 and S2 SEED s S- box in AES Algorithm with SAC Test Novita Angraini, Bety Hayat Susanti, Magfirawaty
Information Systems International Conference (ISICO), 2 4 December 2013 Analysis of the Use of Whirlpool s S-box, S1 and S2 SEED s S- box in AES Algorithm with SAC Test Novita Angraini, Bety Hayat Susanti,
More informationOn the Twofish Key Schedule
On the Twofish Key Schedule Bruce Schneier 1,JohnKelsey 1, Doug Whiting 2, David Wagner 3, Chris Hall 1, and Niels Ferguson 1 1 Counterpane Systems, 101 E Minnehaha Parkway Minneapolis, MN 55419, USA {schneier,kelsey,hall,niels}@counterpane.com
More informationChapter 6: Contemporary Symmetric Ciphers
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 6: Contemporary Symmetric Ciphers Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Why Triple-DES?
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationA SIMPLIFIED IDEA ALGORITHM
A SIMPLIFIED IDEA ALGORITHM NICK HOFFMAN Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions
More informationKALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN
KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationStudy and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard
Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard Dr Atul Gonsai #1, Naimish Kakkad *2, Bhargavi Goswami $3, Dr Nikesh Shah @4 # Department of MCA, Saurashtra University, @
More informationVigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process To cite this article: A Subandi
More informationFundamentals of Cryptography
Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network
More informationEncryption using Venn-Diagrams and Graph
Encryption using Venn-Diagrams and Graph Parijit Kedia, Vellore Institute of Technology, Tamil Nadu, India Sumeet Agrawal, Vellore Institute of Technology, Tamil Nadu, India Abstract There are various
More informationWEBSITE DESIGN RESEARCH AND COMMUNITY SERVICE INSTITUTE IN BINA DARMA UNIVERSITY
International Conference on Information Systems for Business Competitiveness (ICISBC 203) 372 WEBSITE DESIGN RESEARCH AND COMMUNITY SERVICE INSTITUTE IN BINA DARMA UNIVERSITY Siti Sa uda ) Qoriani Widayati
More informationData Encryption Standard (DES)
Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More informationII. LITERATURE SURVEY
Secure Transaction By Using Wireless Password with Shuffling Keypad Shweta Jamkavale 1, Ashwini Kute 2, Rupali Pawar 3, Komal Jamkavale 4,Prashant Jawalkar 5 UG students 1,2,3,4, Guide 5, Department Of
More informationAnalysis of Cryptography and Pseudorandom Numbers
ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the
More informationA New variant of Hill Cipher Algorithm for Data Security
Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi
More informationJournal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION
Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G
More informationFile text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et
More informationAn Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion
Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationSharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
Int. J. Nonlinear Anal. Appl. 5 (2014) No. 2, 60-66 ISSN: 2008-6822 (electronic) http://www.ijnaa.semnan.ac.ir Sharing Several Secrets based on Lagrange s Interpolation formula and Cipher Feedback Mode
More informationCPS2323. Symmetric Ciphers: Stream Ciphers
Symmetric Ciphers: Stream Ciphers Content Stream and Block Ciphers True Random (Stream) Generators, Perfectly Secure Ciphers and the One Time Pad Cryptographically Strong Pseudo Random Generators: Practical
More informationEncryption / decryption system. Fig.1. Block diagram of Hummingbird
801 Lightweight VLSI Design of Hybrid Hummingbird Cryptographic Algorithm NIKITA ARORA 1, YOGITA GIGRAS 2 12 Department of Computer Science, ITM University, Gurgaon, INDIA 1 nikita.0012@gmail.com, 2 gigras.yogita@gmail.com
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 5a January 29, 2013 CPSC 467b, Lecture 5a 1/37 Advanced Encryption Standard AES Alternatives CPSC 467b,
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationCryptographic Algorithms - AES
Areas for Discussion Cryptographic Algorithms - AES CNPA - Network Security Joseph Spring Department of Computer Science Advanced Encryption Standard 1 Motivation Contenders Finalists AES Design Feistel
More informationAES Java Technology Comparisons
February 7, 1999 AES Java Technology Comparisons Alan Folmsbee, Sun Microsystems, Inc. Advanced Encryption Standard candidate algorithm comparisons based on the Java technology implementations. 1.0 Introduction
More informationImplementation of Location Based Services (LBS) in Android Mobile To Mapping Palm Oil Plantation Management at Riau Indonesia
ICST 2016 Implementation of Location Based Services (LBS) in Android Mobile To Mapping Palm Oil Plantation Fiza Febriyani 1 * and Gita Sastria 1 1 Department of Computer Science, Faculty of Mathematics
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 4 The Advanced Encryption Standard (AES) Israel Koren ECE597/697 Koren Part.4.1
More informationFPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption
More informationAN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS
Volume 2, Issue 7, PP:, SEPTEMBER 2014. AN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS P. Sagar Babu 1*, Prof.Ch.Srinivasa Kumar 2* 1. II. M.Tech (VLSI), Dept of ECE, AM Reddy Memorial
More informationBased on The DES_RSA Encryption Algorithm Improvement and Implementation
Based on The DES_RSA Encryption Algorithm Improvement and Implementation Abstract Hao Wang Changchun University of science and technology with the rapid development of information technology and net work,our
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST
More informationScience & Technology (DCRUST), Sonepat
A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &
More informationPAijpam.eu SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL S EQUATION P. Muralikrishna 1, S. Srinivasan 2, N. Chandramowliswaran 3
International Journal of Pure and Applied Mathematics Volume 85 No. 5 2013, 933-937 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v85i5.11
More informationSecret Key Cryptography
Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:
More informationWinter 2011 Josh Benaloh Brian LaMacchia
Winter 2011 Josh Benaloh Brian LaMacchia Symmetric Cryptography January 20, 2011 Practical Aspects of Modern Cryptography 2 Agenda Symmetric key ciphers Stream ciphers Block ciphers Cryptographic hash
More informationOutline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review
More informationInternational Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY
Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS
More informationDesign and Analysis of New Symmetric Block Cipher Algorithm
Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography
More informationKALASALINGAM UNIVERSITY
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE
More informationAdvanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50
Advanced Encryption Standard and Modes of Operation Foundations of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm AES has been originally requested
More informationAn Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India
More informationComputer and Data Security. Lecture 3 Block cipher and DES
Computer and Data Security Lecture 3 Block cipher and DES Stream Ciphers l Encrypts a digital data stream one bit or one byte at a time l One time pad is example; but practical limitations l Typical approach
More informationPerformance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect
244 Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect Krishnamurthy G.N, Dr. V. Ramaswamy, Leela G.H and Ashalatha
More informationL3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015
L3. An Introduction to Block Ciphers Rocky K. C. Chang, 29 January 2015 Outline Product and iterated ciphers A simple substitution-permutation network DES and AES Modes of operations Cipher block chaining
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to
More informationModified Playfair Cipher Using Random Key Linear Congruent Method
4 th INTERNATIONAL SEMINAR: RESEARCH FOR SCIENCE, TECHNOLOGY AND CULTURE (IRSTC 2017) Modified Playfair Cipher Using Random Key Linear Congruent Method Muhammad Syahrizal 1 *, Murdani 2, Surya Darma Nasution
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 5 January 23, 2012 CPSC 467b, Lecture 5 1/35 Advanced Encryption Standard AES Alternatives CPSC 467b,
More informationCRYPTOGRAPHY. Jakub Laszczyk. June 7th,
CRYPTOGRAPHY Jakub Laszczyk June 7th, 2018 @KarmanLtd Agenda About What is it? And History Part 1 - Hashing Part 2 - Symmetric Keys Part 3 - Asymmetric Keys Conclusion 2 About Karman Interactive is a mobile
More informationHANK-1,a new compact, efficient and secure block cipher algorithm for limited resources Devices
Proceedings of the 8 th ICEENG Conference, 29- May, 202 EE000 - Military Technical College Kobry El-Kobbah, Cairo, Egypt 8 th International Conference on Electrical Engineering ICEENG 202 HANK-,a new compact,
More informationA Modified Version of Hill Cipher
A Modified Version of Hill Cipher A.F.A.Abidin 1, O.Y.Chuan 2 Faculty of Informatics Universiti Sultan Zainal Abidin 21300 Kuala Terengganu, Terengganu, Malaysia. M.R.K.Ariffin 3 Institute for Mathematical
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationPlaintext (P) + F. Ciphertext (T)
Applying Dierential Cryptanalysis to DES Reduced to 5 Rounds Terence Tay 18 October 1997 Abstract Dierential cryptanalysis is a powerful attack developed by Eli Biham and Adi Shamir. It has been successfully
More informationDiversified Caesar Cipher for Impeccable Security
Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics
More informationUnderstanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009
Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 29 These slides were prepared by Daehyun Strobel, Christof
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationCryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack
Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack Vivek Kumar 1 and Sandeep Sharma 2 1,2 Department of Electronics and Communication Engineering, Dehradun Institute of Technology,
More informationIntroduction to Modern Symmetric-Key Ciphers
Introduction to Modern Symmetric-Key Ciphers 1 Objectives Review a short history of DES. Define the basic structure of DES. List DES alternatives. Introduce the basic structure of AES. 2 Data Encryption
More informationElastic Block Ciphers: The Feistel Cipher Case
Elastic Block Ciphers: The Feistel Cipher Case Debra L. Cook Moti Yung Angelos D. Keromytis Department of Computer Science Columbia University, New York, NY dcook,moti,angelos @cs.columbia.edu Technical
More informationCPS2323. Block Ciphers: The Data Encryption Standard (DES)
Block Ciphers: The Data Encryption Standard (DES) Content Block Ciphers: Constructing Pseudo Random Permutations using confusion/diffusion A call for an industry standard... and the NSA Lucifer and Feistel
More informationCryptography Introduction to Computer Security. Chapter 8
Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure
More informationImplementation of Digital Signage for Digital Communication Media Awan Setiawan, Iwan Abadi, Sheilfiyanti Abdul Rahman
Information Systems International Conference (ISICO), 2 4 December 2013 Implementation of Digital Signage for Digital Communication Media Awan Setiawan, Iwan Abadi, Sheilfiyanti Abdul Rahman Awan Setiawan,
More informationCache Timing Attacks on estream Finalists
Cache Timing Attacks on estream Finalists Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk Echternach, Jan. 9, 2008 Erik Zenner (DTU-MAT) Cache Timing Attacks
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 5 More About Block Ciphers Israel Koren ECE597/697 Koren Part.5.1 Content of this
More informationA New Technique for Sub-Key Generation in Block Ciphers
World Applied Sciences Journal 19 (11): 1630-1639, 2012 ISSN 1818-4952 IDOSI Publications, 2012 DOI: 10.5829/idosi.wasj.2012.19.11.1871 A New Technique for Sub-Key Generation in Block Ciphers Jamal N.
More informationViability of Cryptography FINAL PROJECT
Viability of Cryptography FINAL PROJECT Name: Student Number: 0151677 Course Name: SFWR ENG 4C03 Date: April 5, 2005 Submitted To: Kartik Krishnan Overview: The simplest definition of cryptography is The
More informationLinear Cryptanalysis of Reduced Round Serpent
Linear Cryptanalysis of Reduced Round Serpent Eli Biham 1, Orr Dunkelman 1, and Nathan Keller 2 1 Computer Science Department, Technion Israel Institute of Technology, Haifa 32000, Israel, {biham,orrd}@cs.technion.ac.il,
More informationIncrease Throughput of CCM Security Mode Using MKP
Applied Mathematics, 2014, 5, 581-592 Published Online March 2014 in SciRes. http://www.scirp.org/journal/am http://dx.doi.org/10.4236/am.2014.54055 Increase Throughput of CCM Security Mode Using MKP Zuriati
More informationIMPROVEMENT KEYS OF ADVANCED ENCRYPTION STANDARD (AES) RIJNDAEL_M
IMPROVEMENT KEYS OF ADVANCED ENCRYPTION STANDARD (AES) RIJNDAEL_M 1,2 MOHANAAD SHAKIR, 2 ASMIDAR BIT ABUBAKAR, 2 YOUNUS BIN YOUSOFF, 3 MUSTEFA SHEKER 1 Alburaimi University Collage(BUC), Oman, 2 University
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationAssignment 9 / Cryptography
Assignment 9 / Cryptography Michael Hauser March 2002 Tutor: Mr. Schmidt Course: M.Sc Distributed Systems Engineering Lecturer: Mr. Owens CONTENTS Contents 1 Introduction 3 2 Simple Ciphers 3 2.1 Vignère
More informationSOLUTIONS FOR HOMEWORK # 1 ANSWERS TO QUESTIONS
SOLUTIONS OR HOMEWORK # 1 ANSWERS TO QUESTIONS 2.4 A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A block cipher is one in which a block of plaintext is treated
More informationAbstract Keyword Searching with Knuth Morris Pratt Algorithm
Scientific Journal of Informatics Vol. 4, No. 2, November 2017 p-issn 2407-7658 http://journal.unnes.ac.id/nju/index.php/sji e-issn 2460-0040 Abstract Keyword Searching with Knuth Morris Pratt Algorithm
More informationIntroduction to Symmetric Cryptography
Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationStream Ciphers and Block Ciphers
Stream Ciphers and Block Ciphers Ruben Niederhagen September 18th, 2013 Introduction 2/22 Recall from last lecture: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.
More informationHill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key
International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and
More informationComparison of Blowfish and Cast-128 Algorithms Using Encryption Quality, Key Sensitivity and Correlation Coefficient Analysis
Research Paper American Journal of Engineering Research (AJER) e-iss : 2320-0847 p-iss : 2320-0936 Volume-3, Issue-7, pp-6-66 www.ajer.org Open Access Comparison of Blowfish and Cast-28 Algorithms Using
More informationLecture 2: Secret Key Cryptography
T-79.159 Cryptography and Data Security Lecture 2: Secret Key Cryptography Helger Lipmaa Helsinki University of Technology helger@tcs.hut.fi 1 Reminder: Communication Model Adversary Eve Cipher, Encryption
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationChapter 8. Encipherment Using Modern Symmetric-Key Ciphers
Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 8.1 Chapter 18 Objectives To show how modern standard
More informationDicky Nofriansyah*, Ganefri, Sarjon Defit, Ridwan, Azanuddin, Haryo S Kuncoro 1,4,5. Departement of Information System, STMIK Triguna Dharma 1
International Journal of Artificial Intelegence Research Vol 1, No 2, December 2017, pp.40-49 ISSN:2579-7298 Application to Determination of Scholarship Worthiness Using Simple Multi Attribute Rating Technique
More informationUnderstanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl
Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 5 More About Block Ciphers ver. November 26, 2010 Last modified 10-2-17
More informationSecret Key Cryptography
Secret Key Cryptography General Block Encryption: The general way of encrypting a 64-bit block is to take each of the: 2 64 input values and map it to a unique one of the 2 64 output values. This would
More informationTAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES
Chapter 5 TAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES 5.1 Introduction This chapter explains new applications of tamperproof preparation and transmissions of online question
More informationkey distribution requirements for public key algorithms asymmetric (or public) key algorithms
topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems
More informationA Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
Journal of omputer Science 4 (): 7-4, 8 ISSN 549-3636 8 Science Publications A Block ipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
More information