INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher
|
|
- Felix McCarthy
- 6 years ago
- Views:
Transcription
1 Design of a Cryptosystem Using Two-Level Hill Sarla Dewangan 1, Mrs. Shikha Pandey 2, Mohammad Imroze Khan 3 1 M-Tech scholar, 2 Assistant Professor, 3 Assistant Professor 1,2 Rungta College of Engineering & Technology, Bhilai (C.G.), National Institute of Technology, Raipur (C.G.), sarla.dewangan@gmail.com, 2 shikhamtech2008@gmail.com, 3 imroze786@gmail.com Abstract: Pioneered in the field of polygraph substitution cipher, operation of Hill is based upon the linear algebraic equation by working on more than three symbols simultaneously. Its high speed of processing is advantageous and so it has inherent property of opposing the analysis based upon frequency letter. The advantage of faster processing time is due to the mode of operation, in which matrices are multiplied linearly. But due to its linearity, it s very difficult to decrypt any encrypted message as it consists of all matrices of a given dimension that are invertible over Z m. This is the same reason why it is considered to be difficult for decrypting image of same shade over a large space, which makes it useless to withhold any specific aspect out of an image, which might be pointing out any impression over it. The main aim of this paper is to use a technique for image encryption, which is different from the conventional one. Keywords: Cryptosystem, Encryption, Decryption, Hill 1. INTRODUCTION With the advancement of network technology, there is a crucial problem regarding the security of the information. Increasing network transmission ability and popular multimedia technology application gradually leads us to retrieve information clearly and directly from images. Therefore, the security of data is very complicated and imperative issue now [3]. Cryptography, which is the science of encryption, plays an important role in communication like mobile phones, pay-tv, e-commerce, private transformation, financial information transmission, ATM cards security, computer passwords etc are those examples which touches on many things in our daily lives [2, 9]. Science is the study of principles, rules and laws, whereas art is the study of methods to do something. Hence, we consider Cryptography as the art and science, because it includes the principles and methods of transforming an intelligible message (plaintext) into one that is unintelligible ( text) and then retransforming the message into its original form [1, 2, 6]. Now-a-days, Cryptography is also compared with both mathematics and computer science and it has also the affiliation to information theory, computer security and engineering [2]. Substitution cipher is one of the most basic components of the classical cipher. It is an encryption method, which substitutes the units of plaintext with cipher text according to particular system. The units may be in the form of single letters, pairs of letters, triplets of letters, mixture of the above and so forth. By performing the inverse substitution, the receiver can decipher the text [5, 8, and 10]. The units of plaintext are retained in the similar sequence as in the cipher text, but the units themselves are changed. There are different types of substitution cipher. The cipher is called as simple substitution ciphers, when the cipher works on single letters. The cipher is said to be polygraphic, when it works on group of letters. can be classified in terms of mono alphabetic and poly alphabetic. A fixed substitution is used by the mono alphabetic cipher over the entire message, whereas a number of substitutions are used by the poly alphabetic cipher at different times in the message. Hill cipher is one of the mono alphabetic polygraphic substitution cipher. It is a block cipher which has many advantages like distinguishing letter frequencies of the plaintext, its simplicity because of the use of the multiplication of matrices, and inversion for enciphering and deciphering, its high speed and high throughput [1, 3, and 6]. In our paper, we encrypt gray scale as well as color images using the pseudorandom key matrix. 2. PSEUDO-INVERTIBLE KEY MATRIX The pseudo-inverse of a m x n matrix A is a matrix that generalizes to arbitrary matrices the notion of inverse of a square, invertible matrix. The pseudo-inverse can be expressed from the singular value decomposition (SVD) of A, as follows. Page 37
2 Let the SVD of A be A = U S VT Where U, V are both orthogonal matrices and S is a diagonal matrix containing the (positive) singular values of A on its diagonal. Then the pseudo-inverse of A is the n x m matrix defined as A = V S UT Here, A has the same dimension as the transpose of A. The pseudo-inverse matrix has the following properties: AA = (AA )* A A = (A A)* AA A = A A AA = A 3. HILL CIPHER Hill cipher is an application of linear algebra to cryptology. It was developed by the mathematician Lester Hill. The Hill cipher algorithm takes m successive plaintext letters and substitutes them by m cipher text letters. The substitution is determined by m linear equations in which each character is assigned a numerical value (a=0, b=1 z = 25) [4, 8, 10]. Let m be a positive integer, the idea is to have m linear combinations of the m alphabetic characters in one plain text element and produce corresponding m characters in one cipher text element. Then, a m m matrix A as shown below in equation (1) is used as a key of the system such that A is invertible modulo 26 [1, 2]. Let a ij be the entry of A. A = a 11 a 12 a 1m a 21 a 22 a 2m a m1 a m2 a mm (1) For the plain text block, the numerical equivalents of m letters are given by Equation (2) as follows. x = (x 1, x 2 x m ) (2) and a key matrix A, the corresponding cipher text block are given by Equation (3) as follows. y = (y 1, y 2,.,y m ) (3) Thus the Encryption will be computed as follows in Equation (4) (y 1, y 2,., y m )) = (x 1, x 2,., x m )A (mod 26) (4) The cipher text is obtained from the plain text by means of a linear transformation. Thus the Decryption will be computed as follows in Equation (5) (x1, x2,.,xm) = (y1, y2,.,ym) A 1 (mod26) (5) Where A -1 is given by Equation (6) A 1 = a 11 a 12 a 1m a 21 a 22 a 2m a m1 a m2 a mm Since the block length is m, there are 26 different m letters blocks possible, each of which can be regarded as a letter in a 26 letter combination. Hill s method amounts to a mono-alphabetic substitution on this alphabet. 1 (6) A11 is a 1 x 1 matrix and is given by the Equation (7) A11 = a 11, (7) A12 is a 1 x (n-1) matrix and is given by the Equation (8) A12 = a 12 a 13 a 1n (8) A21 is a (n-1) x 1 matrix and is given by the Equation (9) A21 = a 21 a 31 a n1, (9) A22 is a (n-1) x (n-1) matrix and is given by the Equation (10) A22 = a 22 a 23 a 2n a 32 a 33 a 3n a n2 a n3 a nn (10) So, A12 A21 = I - A112 = I - a112 (11) And A12 (a11i + A22) = 0. [1,7] (12) 4. TWO-LEVEL HILL CIPHER As we know that both grayscale and color images can be encrypted using Hill cipher technique [6], they can also be encrypted using our proposed Two-Level Hill algorithm, the modulus will be 256(the no. of levels is considered as the no. of alphabets). On working with color images on encryption side, firstly the color image is decomposed into R-G-B components. Secondly, each component is encrypted by the algorithm individually. At last, the encrypted components are combined together to obtain the encrypted color image. In a Two Level Hill, Hill- technique is applied twice onto the blocks. Once, it is applied onto the Page 38
3 temporary block. Then, the resultant matrix is transposed b) the resultant matrix is transposed and Hill and Hill cipher is again applied to this matrix. The cipher is again applied to this matrix. algorithms are given below and the block diagram for the The final matrix obtained is placed in the ith encryption and decryption processes is shown in Figure 1 block of encrypted image. and Figure 2 respectively. Finally encrypted image of length L is obtained. 4.1 Sender Side: At the Sender s side, we implement encryption process. 4.2 Receiver Side: At the Receiver s side, we implement decryption process. Original image (P) Construct i th temporary block from i th pixel of each block Rgb2Gray (P1) Divide P1 in m x m symmetric Blocks (provide padding) Pseudo invertible Key Matrix image of order m x m (P2) Inverse Hill of Length L Place Resultant Image of Length L in i th Block to form m x m matrix Two Level Hill Inverse Transpose Inverse Hill Two Level Hill Hill Transpose Hill Restore Temporary Block to form a m x m matrix by replacing i th pixel of each block Pseudo invertible key matrix image of order m x m (P) Place Resultant Image in i th block of Separate Pseudo invertible Key to obtain m x m Symmetric Blocks Find Image Resolution Original Image of Length L Figure 1: Sender s End Flowchart Encryption: Generate a Pseudorandom key image of order m x m (P2). Convert original image P in RGB2Gray (P1). Divide P1 into m x m symmetric blocks. The i th pixels of each block are brought together to form a temporary block. a) Hill cipher technique is applied onto the temporary block. Figure 2: Receiver s End Flowchart Decryption: Encrypted image of length L is placed such that it forms an m x m matrix. Inverse Hill cipher is applied to m x m matrix. The resultant matrix is reverse transposed and inverse Hill cipher is again applied to resultant matrix to form a temporary block. Temporary block is restored to form a m x m symmetric blocks by replacing i th pixel in each block Page 39
4 Separate pseudorandom key (P2) from m x m symmetric blocks to restore original image. 5. RESULT Hill cipher is a block cipher that has several advantages such as disguising letter frequencies of the plaintext, its simplicity because of using matrix multiplication and inversion for enciphering and deciphering, its high speed, and high throughput. However, Hill cipher succumbs to a known plaintext attack and can be easily broken with such attacks [2,3,]. Although the algorithm presented in this paper aims at image encryption, it is not just limited to this area and can be widely applied in other information security fields such as video encryption. (d) (a) (b) (e) Figure 3: Encryption Using Two-Level Hill (a) Original Image, (b) Histogram of Original Image, (c) Key Image, (d) Histogram of Key Image, (e) We have taken one image as original image, another as the key image, which are shown in Figure 3(a) and 3(c) respectively. The histograms of both the images are shown in Figure 3(b) and 3(d) respectively. They are encrypted them using the Two-level Hill cipher algorithm. The result is shown in Figure 3(e) as the encrypted image. Figure 4 shows the result of decryption process. Here, we have decrypted the image shown in Figure 3(a). (c) (a) Page 40
5 (b) Figure 4: Decryption Using Two-Level Hill (a) Decrypted Image, (b) Histogram of Decrypted Image 6. CONCLUSIONS The competent method of encryption of an illustration is presented in this paper. Two-Level Hill is a fast encryption technique which can provide satisfactory results against the normal hill cipher technique. It can easily resist to the infamous Known Plain Text Attack (KPTA) for secure transmission of graphic encoded information while taking over various limitation in the aspect of efficiency and security of various encryption technologies of previous generation. Hence this hybrid system proves to be a very sound technique for transferring messages from sender to the receiver, achieving confidentiality as well as message authentication. REFERENCES [1] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda. Image Encryption Using Advanced Hill Algorithm, International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May [2] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. Novel Methods of Generating Self-Invertible Matrix for Hill Algorithm, International Journal of Security, Vol 1, Issue 1, 2007, pp [3] S.K.Muttoo, Deepika Aggarwal, Bhavya Ahuja. ASecure Image Encryption Algorithm Based on Hill System, Buletin Teknik Elektro dan Informatika (Bulletin of Electrical Engineering and Informatics) Vol.1, No.1, March 2012, pp. 51~60 ISSN: [4] Rushdi A. Hamamreh, Mousa Farajallah, Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill, International Journal of Computer Science and Network Security, [5] Bibhudendra Acharya, Mohammad Imroze Khan, S K Patra, G Panda. Implementation of Hybrid Cryptosystem Using Non-Invertible Matrices Based on Hill and RSA Algorithm [6] Saroj Kumar Panigrahy, Bibhudendra Acharya, Debasish Jena Image Encryption Using Self-Invertible Key Matrix of Hill Algorithm 1st International Conference on Advances in Computing, Chikhli, India, February 2008 [7] Bibhudendra Acharya, Debasish Jena, Sarat Kumar Patra, and Ganapati Panda. Invertible, Involutory and Permutation Matrix Generation Methods for Hill System, International Conference on Advanced Computer Control, [8] W. Stallings, Cryptography and Network Security, 4 th edition, Prentice Hall, 2005 [9] Blakley G.R., Twenty years of cryptography in the open literature, Security and Privacy 1999, Proceedings of the IEEE Symposium, 9-12 May 1999 [10] A. J. Menezes, P.C. Van Oorschot, S.A. Van Stone, Handbook of Applied Cryptography,CRC press, 1996 Page 41
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of
More informationScience & Technology (DCRUST), Sonepat
A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &
More informationA Modified Version of Hill Cipher
A Modified Version of Hill Cipher A.F.A.Abidin 1, O.Y.Chuan 2 Faculty of Informatics Universiti Sultan Zainal Abidin 21300 Kuala Terengganu, Terengganu, Malaysia. M.R.K.Ariffin 3 Institute for Mathematical
More informationA New variant of Hill Cipher Algorithm for Data Security
Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi
More informationCryptography. What is Cryptography?
Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used
More informationThe Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American
Danielle Curran Dr. Derek Bruff Math 115F: Cryptography October 26, 2010 The Hill Cipher In 1929 Lester Hill, a professor at Hunter College, published an article in the American Mathematical Monthly called
More informationA Class of Non Invertible Matrices in GF (2) for Practical One Way Hash Algorithm
A Class of Non Invertible Matrices in GF (2) for Practical One Way Hash Algorithm Artan Berisha Faculty of Mathematical and Natural Scienes University of Prishtina, Kosovo Behar Baxhaku Faculty of Mathematical
More informationAn Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES
An Image Encryption Method: SD-Advanced Image Encryption Standard: SD-AIES Somdip Dey St. Xavier s College [Autonomous] Kolkata, India E-mail: somdipdey@ieee.org somdipdey@acm.org ABSTRACT The security
More informationA Combined Encryption Compression Scheme Using Chaotic Maps
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression
More informationS. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation
2.3-Cipher Block Modes of operation 2.3-1 Model of Conventional Cryptosystems The following figure, which is on the next page, illustrates the conventional encryption process. The original plaintext is
More informationMulti-Level Encryption using SDES Key Generation Technique with Genetic Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationSubstitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.
Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard
More informationA Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix
IAENG International Journal of Computer Science, 32:4, IJCS_32_4_ A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix S. Udaya Kumar V. U. K.
More informationAnalysis of Cryptography and Pseudorandom Numbers
ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the
More information10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of
More informationCryptography: Matrices and Encryption
Cryptography: Matrices and Encryption By: Joseph Pugliano and Brandon Sehestedt Abstract The focus of this project is investigating how to generate keys in order to encrypt words using Hill Cyphers. Other
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 3 January 13, 2012 CPSC 467b, Lecture 3 1/36 Perfect secrecy Caesar cipher Loss of perfection Classical ciphers One-time pad Affine
More informationResearch Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)
International Journals of Advanced Research in Computer Science and Software Engineering ISS: 2277-128X (Volume-7, Issue-6) Research Article June 2017 Image Encryption Based on 2D Baker Map and 1D Logistic
More informationAsymmetric Image Encryption based on Cipher Matrices
Asymmetric Image Encryption based on Cipher Matrices Sukant Kumar Chhotaray Roll- 507EC004 Department of Electronics and Communication Engineering National Institute of Technology Rourkela Rourkela 769
More informationChannel Coding and Cryptography Part II: Introduction to Cryptography
Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de
More informationJNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World
Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not
More informationA Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix
Research Inventy: International Journal Of Engineering And Science Vol., Issue 9 (April 3), Pp - Issn(e): 7-47, Issn(p):-643, Www.Researchinventy.Com A Block Cipher Involving a Key Matrix a Key bunch Matrix,
More informationVertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem
Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More information2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography
CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis
More informationAn Application of Graph Theory in Cryptography
Volume 119 No. 13 2018, 375-383 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Application of Graph Theory in Cryptography P. Amudha 1 A.C. Charles Sagayaraj 2 A.C.Shantha Sheela
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationAdvanced Cryptographic Technique Using Double Point Crossover
Advanced Cryptographic Technique Using Double Point Crossover P. Lakshmi Devi 1, G. Sai veena 2 Associate professor 1, Annamacharya Institute of Technology & Sciences, Rajampet, A.P, India M.Tech scholar
More informationSurvey: Recent Modifications in Vigenere Cipher
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha
More information3D (6 X 4 X 4) - Playfair Cipher
3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationIMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY
IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY Pawanveer Singh 1, Dr. Amanpreet Singh 2, Shelja Jhamb 3 1 Post Graduate Department of Mathematics, Lajpat Rai D. A. V. College Jagraon, (India) 2 Post Graduate
More informationA.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.
An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions Ravindra Babu Kallam Research Scholar, J.N.T.U,
More informationPrime Field over Elliptic Curve Cryptography for Secured Message Transaction
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationAn Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion
Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using
More informationKeywords: Playfair, Matrix, XOR operation
Modified Playfair Cipher for Encrypting Images Faisal Mohammed Abdalla 1, Khadiga Mohammed Adam Babiker 2 1 Collage of computer science and information technology, Karary University, Omdurman, Sudan 2
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationCryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building
Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography
More informationProposal for Scrambled Method based on NTRU
Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,
More informationA simple approach of Peer-to-Peer E-Cash system
A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationFile text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et
More informationThe Design of an Anonymous and a Fair Novel E-cash System
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of
More informationFPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed
FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed Vijaya Kumar. B.1 #1, T. Thammi Reddy.2 #2 #1. Dept of Electronics and Communication, G.P.R.Engineering College,
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationIssues in Information Systems Volume 18, Issue 2, pp , 2017
IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL Abhijit Sen, Kwantlen Polytechnic University, abhijit.sen@kpu.ca ABSTRACT Microsoft Excel offers a number of data manipulation tools that
More informationMODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3
ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)
More informationC.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan
Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.
More informationRobust Lossless Image Watermarking in Integer Wavelet Domain using SVD
Robust Lossless Image Watermarking in Integer Domain using SVD 1 A. Kala 1 PG scholar, Department of CSE, Sri Venkateswara College of Engineering, Chennai 1 akala@svce.ac.in 2 K. haiyalnayaki 2 Associate
More informationInternational Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES
Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The
More informationInternational Journal of Mathematical Archive-7(2), 2016, Available online through ISSN
International Journal of Mathematical Archive(), 6, Available online through www.ijma.info ISSN 9 6 MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERS A. CHANDRASEKHAR, D. CHAYA KUMARI*, CH.PRAGATHI AND ASHOK
More informationCryptosystems. Truong Tuan Anh CSE-HCMUT
Cryptosystems Truong Tuan Anh CSE-HCMUT anhtt@hcmut.edu.vn 2 In This Lecture Cryptography Cryptosystem: Definition Simple Cryptosystem Shift cipher Substitution cipher Affine cipher Cryptanalysis Cryptography
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More informationBasic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline
CSC/ECE 574 Computer and Network Security Topic 2. Introduction to Cryptography 1 Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationBlock Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition
Journal of Computer Science 6 (2): 133-140, 2010 ISSN 1549-3636 2010 Science Publications Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition K. Anup Kumar and V.U.K.
More informationA Data Hiding Model for Image Steganography Using Primes: Towards Data Security
International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant
More informationCryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationMath236 Discrete Maths with Applications
Math236 Discrete Maths with Applications P. Ittmann UKZN, Pietermaritzburg Semester 1, 2012 Ittmann (UKZN PMB) Math236 2012 1 / 1 Block Ciphers A block cipher is an encryption scheme in which the plaintext
More informationRecurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications
Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications D.A. Karras 1 and V. Zorkadis 2 1 University of Piraeus, Dept. of Business Administration,
More informationLECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)
Department of Software The University of Babylon LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY (One-Way Functions and ElGamal System) By College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview
Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationFoundations of Cryptology
Multimedia Security Mauro Barni University of Siena Cryptography Cryptography is the art or science of keeping messages secret; the word cryptography is derived from Greek and literally means secret (crypto-)
More informationJournal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION
Volume 2, No. 7, July 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION Manikandan. G *1, Krishnan.G
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationImage Watermarking by SCHUR Decomposition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1155-1159 International Research Publications House http://www. irphouse.com Image Watermarking
More informationSECURE METHOD FOR EMBEDDING PLAINTEXT ON AN ELLIPTIC CURVE USING TDMRC CODE AND KOBLITZ METHOD
SECURE METHOD FOR EMBEDDING PLAINTEXT ON AN ELLIPTIC CURVE USING TDMRC CODE AND KOBLITZ METHOD 1 CIMI THOMAS M, 2 DR. VARGHESE PAUL 1 Research Scholar, Department Of Computer Science, Karpagam University,
More informationPART I Symmetric Ciphers
PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3
More informationA Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
Journal of omputer Science 4 (): 7-4, 8 ISSN 549-3636 8 Science Publications A Block ipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationIMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION
Gulf Journal of Mathematics Vol 4, Issue 4 (2016) 103-107 IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION M. ESSAID 1, A. JARJAR 2, I. AKHARRAZ 3 A. SAAIDI 4 AND A. MOUHIB 5 Abstract. In this paper we
More informationDr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India
Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),
More informationThe Beta Cryptosystem
Bulletin of Electrical Engineering and Informatics Vol. 4, No. 2, June 2015, pp. 155~159 ISSN: 2089-3191 155 The Beta Cryptosystem Chandrashekhar Meshram Department of Mathematics, RTM Nagpur University,
More informationBLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION
132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationHill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key
International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and
More informationIntroduction to Cryptography. Vasil Slavov William Jewell College
Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationTransmission and Reception of Image using Encryption and Decryption Technique Anita Khandelwal 1, Bhavneesh Malik 2 1 M.Tech Scholar, RIEM Rohtak
Transmission and Reception of Image using Encryption and Decryption Technique Anita Khandelwal 1, Bhavneesh Malik 2 1 M.Tech Scholar, RIEM Rohtak 2 Assistant Professor, HOD ECE Department, R.I.E.M, MDU,
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationNETWORK SECURITY & CRYPTOGRAPHY
Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter
More informationEnhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication
Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College
More informationRANDOM KEY & THE NTH PRIME NUMBER BASED SYMMETRIC KEY ENCRYPTION ALGORITHM
RANDOM KEY & THE NTH PRIME NUMBER BASED SYMMETRIC KEY ENCRYPTION ALGORITHM Mrs Mukta Sharma 1, Dr. R B Garg 2, 1 Department of Computer Science, Research Scholar, TMU, Moradabad (India) 2 Ex-Professor,
More informationCSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography
CSCI 454/554 Computer and Network Security Topic 2. Introduction to Cryptography Outline Basic Crypto Concepts and Definitions Some Early (Breakable) Cryptosystems Key Issues 2 Basic Concepts and Definitions
More informationA Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis
A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis Soosaimicheal Aruljothi (Corresponding author) Research Scholar, Department of Computer Applications, Kalasalingam University,
More informationClassical Encryption Techniques
Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More information[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-
Steganography Using Prime Technique Authors Vinam Tomar Guided By- Kamal Saluja Ganga Technical Campus, Soldha Email-vinamtomar@gmail.com Abstract Steganography is the art and science of communicating
More informationA nice outline of the RSA algorithm and implementation can be found at:
Cryptography Lab: RSA Encryption and Decryption Lab Objectives: After this lab, the students should be able to Explain the simple concepts of encryption and decryption to protect information in transmission.
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationImage Encryption Algorithm Based on. Logistic Map and Pixel Mapping Table. Hazem Al-Najjar Asem Al-Najjar
Encryption Algorithm Based on Logistic Map and Pixel Mapping Table Hazem Al-Najjar Asem Al-Najjar Encryption Algorithm Based on Logistic Map and Pixel Mapping Table Hazem Mohammad Al-Najjar Technical College
More informationTopics. Number Theory Review. Public Key Cryptography
Public Key Cryptography Topics 1. Number Theory Review 2. Public Key Cryptography 3. One-Way Trapdoor Functions 4. Diffie-Helman Key Exchange 5. RSA Cipher 6. Modern Steganography Number Theory Review
More information