ISSN: Page 320

Similar documents
A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Design Implementation of Composite Field S-Box using AES 256 Algorithm

Implementation of Full -Parallelism AES Encryption and Decryption

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

CPSC 467b: Cryptography and Computer Security

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY

Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data

CPSC 467b: Cryptography and Computer Security

Design and Analysis of New Symmetric Block Cipher Algorithm

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Uses of Cryptography

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

FPGA Based Design of AES with Masked S-Box for Enhanced Security

Data Encryption Standard (DES)

A Proposed Method for Cryptography using Random Key and Rotation of Text

A New hybrid method in watermarking using DCT and AES

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box

I. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.

AES ALGORITHM FOR ENCRYPTION

NETWORK SECURITY & CRYPTOGRAPHY

Analysis of Cryptography and Pseudorandom Numbers

International Journal of Computer Engineering and Applications,

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Enhanced 3-D PLAYFAIR Cipher

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION

Cryptanalysis. Ed Crowley

Cryptography and Network Security

Cryptography ThreeB. Ed Crowley. Fall 08

Combination of RGB Substitution for Text to Image Encryption Technique using AES

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Block Ciphers. Secure Software Systems

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

ANALYSIS OF AES ENCRYPTION WITH ECC

Encryption Details COMP620

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 3, March 2014

Cryptography Introduction to Computer Security. Chapter 8

EEC-484/584 Computer Networks

CSCE 813 Internet Security Symmetric Cryptography

CHAPTER 1 INTRODUCTION

Area Optimization in Masked Advanced Encryption Standard

Network Security Issues and Cryptography

Cryptography Functions

Delineation of Trivial PGP Security

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher

U-II BLOCK CIPHER ALGORITHMS

Network Security Essentials

2.1 Basic Cryptography Concepts

ABSTRACT. system, specifically on a network and the internet. Developing applications using data

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CRYPTOGRAPHY & DIGITAL SIGNATURE

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Symmetric-Key Cryptography

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Bus Matrix Synthesis Based On Steiner Graphs for Power Efficient System on Chip Communications

Encryption / decryption system. Fig.1. Block diagram of Hummingbird

Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures

Content of this part

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Lecture 1 Applied Cryptography (Part 1)

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA

Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect

Crypto: Symmetric-Key Cryptography

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

VLSI Implementation of Advanced Encryption Standard using Rijndael Algorithm

Network Security Essentials Chapter 2

VLSI Implementation of Enhanced AES Cryptography

Design and Implementation of Rijndael Encryption Algorithm Based on FPGA

CPSC 467: Cryptography and Computer Security

Goals of Modern Cryptography

Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm

Cryptography and Network Security

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

Viability of Cryptography FINAL PROJECT

Cryptographic Concepts

Cryptographic Algorithms - AES

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

EEC-682/782 Computer Networks I

A SIMPLIFIED IDEA ALGORITHM

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Piret and Quisquater s DFA on AES Revisited

A Combined Encryption Compression Scheme Using Chaotic Maps

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

Transcription:

A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar Dept of Computer Science& Engg Alagappa University karaikudi ABSTRACT Security of data is important factor in data transmission through network. In this paper, we propose a new method using fuzzy set theory to enhance the security. The data in the form of text to be transmitted is encrypted by using the AES Rijndael algorithm. The encryption algorithm is the mathematical procedure for performing encryption of data. A key is used to cipher a message and to decipher it back to the original message. Then the scrambled encrypted text is converted into the form of numerics by applying the fuzzy set theory. The fuzzy logic will provide the text in the zero to one value. These numerical before decryption the numerical are again converted into scrambled text. After this, if the key provided by the user is the same key that is used for the encryption then original data will be retrieved. The paper, integrates the encryption of text and conversion of the unscrambled text from numerical to original by using fuzzy logic. In this paper, we involve matrix conversion of text after encryption. Hence, the intruders are unaware of the text that is encrypted. For this matrix conversion fuzzy membership functions are involved. Before decryption the matrix transformation is taken place to find text. After that, the decryption taken place by providing key. Keywords - Fuzzy set theory, Encryption, AES Rijndael Algorithm, Fuzzy logic. 1. INTRODUCTION In this paper we focus on the implementation of the fuzzification of the given text, after the encryption using symmetric key cryptography. Fuzzy logic is a problem-solving control system methodology that lends itself to implementation in systems ranging from simple, small, embedded micro-controllers to large, networked, multi-channel pc (or) workstation-based data acquisition and control systems. It can be implemented in hardware, software (or) a combination of both. Fuzzy logic provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, and noisy (or) missing input information. Fuzzy sets and fuzzy logic are powerful mathematical tools for modeling and controlling uncertain systems in industry, humanity and nature ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 320

they are facilitators for approximate reasoning in decision making in the absence of complete and precise information [10] [4]. The basic concept underlying fuzzy logic is that of a linguistic variable. A variable whose values are words (or) sentences in natural (or) artificial languages are called linguistic variables. Fuzzy sets are a generalization of classical sets and infinite valued logic is a generalization of classical logic. There is also correspondence between these two areas. Network Security is becoming more and more crucial as the volume of data being exchanged on the internet access [8]. Based on the above, the security involves four important aspects: Confidentiality, message authentication, integrity and non repudiation. Popular application of multimedia technology, and increasingly transmission ability of network gradually leads us to acquire, information directly and clearly through various methods. In cryptography, public-key cryptosystems are convenient in that they do not require the sender and receiver to share a common secret in order to communicate securely [7]. However, they often rely on complicated mathematical computations and are thus generally much more inefficient than comparable symmetric-key cryptosystems. Cryptography is the process of transforming plain text into unintelligible form called the cipher text. The technology of the encryption is called cryptology[6]. In this paper the text encryption is based on the symmetric key algorithm where both the encryption and the decryption keys are the same. Symmetric cryptography refers to encryption methods in which both the sender and receiver share the same key. 2. RELATED WORK This section gives brief overview on the related work done on fuzzification and its result. In this paper refers to security problem involving computers based system is getting more frequent for security attention. The number and variety of attacks by person and malicious software from outside organization, particularly and consequences of inside attacks also remain a major concern. Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science and electrical engineering. Applications of cryptography include ATM cards, computer passwords and electrical commerce. Public-key cryptography is a fundamental and widely used technology around the world. It is the approach which is employed by many cryptographic algorithms and cryptosystems. Publickey algorithms are most often based on the computational complexity of hard problems often from number theory. Most of the users do not have the required resources for the communication. Current algorithms which are available for the encryption either takes high processing time and not secure enough to help the limited bandwidth. ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 321

In this project, the encryption algorithm is an integral work of data encryption and decryption process. They should preserve high security to the data transmitted. Basically, encryption algorithms are divided into three major categories transposition, substitution and transposition-substitution technique. The symmetric key transmission is proposed in this paper. Symmetric means, the key used for encryption and decryption will remain. 2.1 Background Security is the main problem in the modern data communication. There are a lot of cyber-crimes have arises with the development of technology. Cryptography consists of cryptology and crypto analysis. Encryption comes under cryptology. In this paper the text encryption is based on the symmetric key algorithm where both the encryption and the decryption keys are the same. 2.1.1 AES Rijndael Algorithm The encryption algorithm is an integral work of image encryption and decryption process. They should preserve high security to the image transmitted. Basically, encryption algorithms are divided into three major categories transposition, substitution, and transposition substitution technique [3]. The symmetric key transmission is proposed in this paper. Symmetric key used for encryption and decryption will remains same. Rijndael algorithm is one of the AES (Advanced Encryption Standard) algorithms, used for text encryption technique. It is a block cipher algorithm, in which the block means the information to be encrypted is divided into blocks of equal length. It is an iterated block cipher, with a variable block length and variable key length. AES Rijndael Algorithm Operations Describe the set of rounds keys from the cipher key. Initialize the state array with the block data (plaintext). Add the initial round key to the starting state array. Perform nine rounds of state manipulation. Perform the tenth final round of state manipulation. Copy the final state array and as the encrypted data (cipher text). 2.2 Fuzzy set theory Fuzzy set theory is an extension of classical set theory where elements have varying degrees of membership. A logic based on the two truth values True and false is sometimes inadequate when describing human reasoning [5]. Fuzzy logic uses the whole interval between 0 (false) and 1 (True) to describe human reasoning. A fuzzy set is any set that allows its members to have different degree of membership function in the interval [0,1].The degree of membership (or) truth is not same as probability [9].Fuzzy truth is not likelihood of some event (or) conditions. The fuzzy truth represents membership in vaguely defined sets. 3. PROPOSED WORK ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 322

Symmetric key cryptography refers to encryption methods in which both the sender and receiver share the same key (and, less commonly, in which their keys are different, but related in an easily computable way) [1]. The modern study of symmetric ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher take as input a block of plaintext and a key, and output a block of cipher text of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some better security in one aspect or another than others. They are the mode of operations which must be carefully considered when using a block cipher in a crypto system. Rijndael algorithm is one of the AES (Advanced Encryption Standard) algorithm used for data encryption technique. It is a block cipher algorithm in which the block means the information to be encrypted is divided into blocks of equal length. It is an integrated block cipher, with a variable block length and variables key lengths [2]. Internally, the AES algorithms operations are performed on a two dimensional array of bytes called the state. The state consists of four rows of bytes, where Nb is the block length divided by 32. The function of AES Rijndael is as follows A) Sub Bytes Transformation The subbytes () Transformation is a non-linear byte substitution that operates independently on each byte of the state using a substitution table. B) Shift Rows Transformation In the shift rows () Transformation, the bytes in the last three rows of the state are cyclically shifted over different number of bytes. The first row will not get shifted. c) Mix Column Transformation In mix column () Transformation. The columns of the state are considered as polynomial and then multiplied by modulo with fixed polynomial individually. d) Add Round Key Transformations In the Add Round Key () Transformation, a round key is added to a state by a simple bitwise XOR operation. Each round key consists of Nb words from the key schedule those Nb words are each added into the columns of the state. 3.1 Encryption and Fuzzification 3.1.1 The feasibility of the application of fuzzy set theory in encryption To the secrecy evaluation on communication between various networks, it is concerned with the secrecy, the working effect of secret regulatory authorities and with the economic interests of the evaluated objects. The quality of the secrecy evaluation not only affects the message that is transmitted between the nodes. In the traditional process of encryption evaluation mainly the experts studied the security system of evaluated enterprises by the findings. Finally, they evaluate enterprises on the basis of the total points. There are a lot of ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 323

uncertainty and fuzziness in the course of this evaluation. For example, the fuzziness and difficult to quantify the indexes. Therefore, the fuzzy set theory and method were introduced in the secrecy evaluation. It is the organic combination of quantitative and qualitative evaluation, so the secrecy censorship evaluation becomes more scientific and realistic. put into matrix formation, get the fuzzy membership matrix. For the decryption of the text again the matrix transpose formation is created. The following steps are taken place in the decryption process retrieve the encrypted data from the remote system. Convert the matrix with encrypted text into matrix transpose formation. The fuzzy evaluation score is now received. After the retrieval of the data the decryption process is taken place by use the symmetric key algorithm. This file is compared with the original data for processing. A t the end of the process the original data can be retrieving and the data can be transferred between the users without any modifications. 4. EXPERIMENTAL RESULTS 3.1.2 Fuzzification of data by using Matrix Transformation In this paper, we propose a new method to transmit the data over the network. The communication involves the encryption of data before pass it to the receiver. For the data encryption the key is generated using the AES standard algorithm, which is symmetric. Then, store the encrypt file in the memory for comparing for later process. The matrix transformation is the next step in this process. For the matrix conversion the ASCII value of the encrypted text is considered. The conversion ends in the binary coded value which is in ones and zeros. After this step, get the encrypted data The proposed system will ends in the encryption and the fuzzification of the user defined text. In the following figure-1 show that the files to be encrypted have to be loaded. In the second figure-2 the symmetric key for the text to be encrypted is given and saved. As the third step the figure-3 shows that the saved key file and the original file for decryption. In the figure- 4 the conversion as matrix is taken place after the encryption of the text. This matrix transformation will provide the security and the authentication so that the intruders cannot able to know the transformation of the text. ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 324

Fig-1 Fig-4 5. CONCLUSION Fig-2 Fig-3 In this paper, a symmetric cryptosystem is introduced, enhancing a new method to encrypt the user defined text that eliminates the random and man-made factors of secrecy evaluation to the maximum. It plays an important role in enrichment and development of multi-object evaluation technique, which raises the secrecy level. Each block of the data is encrypted using symmetric key rounds which then will also get the matrix conversion. This work is done using Rijndael cryptography symmetric algorithm for encryption/decryption. Hence the matrix form of data consists of only the binary values of the original data. This will eliminate the modification of the data by the intruders. ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 325

6. REFERENCES [1] Dr. Brian Gladman, Rijndeal (by Joan Daeman & Vincent Rijmen), A Specification for the AES Algorithm, 15 April 2003. [2]J.Daeman and V.Rijndael, http://www.esat.kuleven.ac.be/rijmen/rijndael/rijndaelv2.zip,1999. [3]B.Gladman, A Specification for Rijndael, the AES Algorithm, May 2003http://fp.gladman.plus.com/cryptography_technology/Ri jndael.aes.spec.311.pdf [4] Hexiong Yang, Chongwen Li, Fuzzy Mathematics and Its Application, Tianjin: Tianjin Science & Technology Publishing House, 1990.37-101. [5]Le Luo, A method of quality evaluation of hydropower project based on fuzzy mathematics. Journal of Huazhong BIOGRAPHY: Ms.N.Kavinilavu Dr.S.S.Dhenakaran University of Science and Technology (Natural Science Edition), 2004, 32(08); 82-84. [6]V.Potdar and E.chang, Disguising text cryptography, International Network Conference in Plumouth, Uk, 6-9 July, 2004. [7] Shafi Golgwasser Mihir Bellare, Lecture Notes on Cryptography, July 2008. [8] William Stallings, Cryptography and Network Security, Fourth Edition, June 3, 2010. [9] U.S.Loses Focus on Fuzzy Logic (Machine Design, June 221, 1990).. [10] Fuzzy Sets and Applications: Selected Paprsby L.A Zadeh, ed. R.R Yager et al. (John Wiley, New York, 1987). Ms.N.KAVINILAVU is a Research scholar in the Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu, India. She has received her M.Sc in Information Technology from Alagappa University, Karaikudi, Tamilnadu in the year of 2011. She has presented her work in International and National level conferences. Her areas of research interests include Network Security. Prof.Dr.SS.DHENAKARAN is working as an associate professor in the department of Computer Science and Engineering Alagappa university, karaikudi,tamilnadu. He has received his Ph.d in Computer Science and Engineering from Alagappa University, karaikudi, Tamilnadu. He has published many papers in international journals and presented in the national and international conferences. ISSN: 2231-5381 http://www.internationaljournalssrg.org Page 326