An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

Similar documents
An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process

A comparative study of Message Digest 5(MD5) and SHA256 algorithm

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Cryptography. Thierry Sans

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

SSL/TLS Vulnerability Detection Using Black Box Approach

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography Introduction to Computer Security. Chapter 8

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

Classical Encryption Techniques

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

USING THE RSA AS AS AN ASYMMETRIC NON-PUBLIC KEY ENCRYPTION ALGORITHM IN THE SHAMIR THREE- PASS PROTOCOL

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Lecture 4: Symmetric Key Encryption

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Classical Encryption Techniques

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

CSC 474/574 Information Systems Security

Cryptographic Concepts

Lecture 3: Symmetric Key Encryption

A Modified Playfair Encryption Using Fibonacci Numbers

CSCE 813 Internet Security Symmetric Cryptography

Implementation Analysis of GLCM and Naive Bayes Methods in Conducting Extractions on Dental Image

Stream ciphers. Lecturers: Mark D. Ryan and David Galindo. Cryptography Slide: 91

Information Systems Security

Cryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Analysis of labor employment assessment on production machine to minimize time production

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Computers and Security

Cryptography BITS F463 S.K. Sahay

Geldy : A New Modification of Block Cipher

Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

CRYPTOGRAPHY. BY, Ayesha Farhin

Modified Playfair Cipher Using Random Key Linear Congruent Method

Cryptography Worksheet

Worksheet - Reading Guide for Keys and Passwords

Overview of Conventional Encryption Techniques

Cryptography and Network Security

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

A SIMPLE 1-BYTE 1-CLOCK RC4 DESIGN AND ITS EFFICIENT IMPLEMENTATION IN FPGA COPROCESSOR FOR SECURED ETHERNET COMMUNICATION

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

Secret Key Cryptography

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition

Block Encryption and DES

Optimizing the hotspot performances by using load and resource balancing method

Nearby Search Indekos Based Android Using A Star (A*) Algorithm

Chapter 2: Classical Encryption Techniques

Nature Sunday Academy Lesson Plan

Network Security Essentials

Journal of Physics: Conference Series PAPER OPEN ACCESS. To cite this article: B E Zaiwani et al 2018 J. Phys.: Conf. Ser.

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

P2_L6 Symmetric Encryption Page 1

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Survey: Recent Modifications in Vigenere Cipher

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

Cryptography. Historical Encoding. Encryption Media. Intro to Encryption 8/24/2010. COMP620 Information Privacy & Security 1

Practical Aspects of Modern Cryptography

Textbook: Ahmet Burak Can Hacettepe University. Supplementary books:

Chapter 6: Contemporary Symmetric Ciphers

1-7 Attacks on Cryptosystems

Some Stuff About Crypto

Combining TCP and UDP for Secure Data Transfer

Cryptanalysis. Ed Crowley

Computer and Data Security. Lecture 3 Block cipher and DES

Hardware Design and Software Simulation for Four Classical Cryptosystems

Security: Cryptography

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

2

Cryptography ThreeB. Ed Crowley. Fall 08

The Observation of Bahasa Indonesia Official Computer Terms Implementation in Scientific Publication

Cryptosystems. Truong Tuan Anh CSE-HCMUT

Foundations of Cryptology

PART I Symmetric Ciphers

APNIC elearning: Cryptography Basics

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Analysis of Cryptography and Pseudorandom Numbers

Cryptography. Summer Term 2010

Introduction to Cryptography

Lecture 2: Shared-Key Cryptography

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication

Twofish Cryptography Algorithm as Safety Equipment in Web-Based E-Commerce

Cryptography. Dr. Michael Schneider Chapter 10: Pseudorandom Bit Generators and Stream Ciphers

Introduction to information Security

Hybrid learning vector quantization (LVQ) algorithm on face recognition using webcam

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Cryptography Lesson Plan

Transcription:

Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al 2018 J. Phys.: Conf. Ser. 978 012086 View the article online for updates and enhancements. This content was downloaded from IP address 148.251.232.83 on 13/06/2018 at 23:59

An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security M A Budiman, Amalia and N I Chayanie Departemen Ilmu Komputer, Fakultas Ilmu Komputer dan Teknologi Informasi, Universitas Sumatera Utara, Jl. Universitas No. 9-A, Kampus USU, Medan 20155, Indonesia Email: mandrib@usu.ac.id, amalia@usu.ac.id, noerindachayanie@student.usu.ac.id Abstract. Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4 + Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n 2 ), while the complexity of Zig-zag Cipher and RC4 + Cipher are θ(n 2 ) and θ(n), respectively. 1. Introduction Communication is the process of transferring information from one party to another. One example of communication is sending letters. With more advanced developments, the letter is no longer done by handwriting but by means of electronic messaging. Sending massages electronically via insecure channels may allow unauthorized parties to read the messages. To maintain the messages confidentiality, one solution is to encrypt the messages using cryptographic algorithms. Cryptography is the science and art to preserve messages confidentiality. According to Request for Comments (RFC), cryptography is a mathematical science that deals with transforming data to make the meaning unintelligible (to hide the meaning of the data), to prevent it from unauthorized changes, or to prevent it from unauthorized use. A cryptographic system is a system that can be used to change a message in order to make the message not understood by anyone other than the recipient. This process is called encryption [1]. Two types of cryptography are classical cryptography and modern cryptography. To further improve security, a combination of classical and modern algorithms is performed. Classical cryptographic algorithm to be used for this data encoding process is Zig-zag Cipher and modern algorithm that will be used is RC4 + Cipher. Zig-zag Cipher is one of the classical cryptography that use transposition techniques that use character permutations, in which the original message unreadable unless the person has the key to decrypt the message [2]. The Zig-zag Cipher algorithm includes an unsafe classical cryptography algorithm. This is evidenced by research that proves that the more difficult algorithm of the Zig-zag Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by Ltd 1

Cipher algorithm, that is Affine Cipher can already be solved by cryptanalysis [3]. RC4 + Cipher is one type of RC4 algorithm, which uses a variable whose key length is from 1 to 256 bits used to initialize a 256 bit long table. The two algorithms combined are called Super Encryption. By combining these two algorithms, we can get a stronger cipher so it is not easy to break, and also to prevent of using a single cipher only which is comparatively weak [4]. 2. Method One of the key symmetric algorithms in the form of stream cipher is RC4 + cipher algorithm. Undoubtedly, the importance of stream ciphers in computer applications cannot be ignored. Therefore, a standardized model for the stream cipher design is certainly today s requisite [5]. RC4 + uses a structure like RC4 and adds some operations to amplify the cipher. This structure tries to exploit good points on RC4 then provides some additional features for better security limits [6]. The RC4 + cipher algorithm has two main parts: Key Scheduling Algorithm (KSA) in Table 1 and Pseudo Random Generation Algorithm (PRGA) in Table 2. Table 1. KSA of RC4 + Cipher [6] for i from 0 to 255 S[i] := i endfor j := 0 for i from 0 to 255 j := (j + S[i] + key[i mod keylength]) mod 256 swap values of S[i] and S[j] endfor Table 2. PRGA of RC4 + Cipher [6] while cipherkey < plaintext : i := i + 1 a := S[i] j := j + a Swap S[i] and S[j] := a) (b := S[j]; S[i] := b; S[j] c := S[i<<5 j>>3] + S[j<<5 i>>3] output (S[a+b] + S[c 0xAA]) S[j+b] endwhile Where i and j are 8-bit array indexes, S is all possible 256 permutations, << and >> are left and right shift, is exclusive OR. The technique applied to the Zig-zag Cipher algorithm is the technique of transposing the encryption cipher and decrypting the message by altering the order of the letters in the plaintext to the ciphertext in such a way that the contents of the message are not understood except by certain people. How to make Zig-zag Cipher algorithm as powerful as modern algorithm that is by using ASCII characters and then convert it to binary by playing in its bit. Each symbol that appears on the computer screen has a different ASCII code, the length of each ASCII code in binary is 8 bits and there are 28 unique symbols contained in the ASCII table [7]. 2

Zig-zag transpositions can be performed in succession by forming rows or columns arranged in matrix format. If the digit of the key is i, then the position of the transposition message matrix column is read as follows: (1, i) (2, i + 1) (3, i) (4, i + 1) (5, i)... (m, n).......... (1) After a transposition is processed with a lock on a symmetric encryption cipher, the same key is used for process of decryption. If the digit of the key is i, then the position of the transposition message matrix row is read as follows: (i, 1) (i + 1, 2) (i, 3) (i + 1, 4) (i, 5)... (m, n)... (2) The number of digits in the key used in the zig-zag cipher algorithm depends on the number of rows when using row transpositions and depends on the number of columns when using transposition columns [8]. 3. Result and Discussion The result showed that complexity of the combined algorithm is θ(n 2 ), while the complexity of Zig-zag Cipher and RC4 + Cipher are θ(n 2 ) and θ(n), respectively. The test results obtained for the.doc file extension are divided into several parts: plaintext text in Figure 1, plaintext symbols in the Figure 2 and the plaintext complex (text, symbols and images) in Figure 3. Figure 1. The Length of Text s Plaintext.doc File Over Time Encryption Process Graph Figure 2. The Length of Symbol s Plaintext.doc File Text Over Time Encryption Process Graph 3

Figure 3. The Length of Complex s Plaintext.doc File Over Time Encryption Process Graph The test results obtained for the pdf file extension are also divided into several parts: plaintext text in Figure 4, plaintext symbols in Figure 5 and plaintext complexes (text, symbols and drawings) in Figure 6. Figure 4. The Length of Text s Plaintext Pdf File Over Time Encryption Process Graph Figure 5. The Length of Symbol s Plaintext Pdf File Over Time Encryption Process Graph 4

Figure 6. The Length of Complex s Plaintext Pdf File Over Time Encryption Process Graph 4. Conclusion The conclusions of an implementation of RC4 + Algorithm and Zig-zag Algorithm in Super Encryption Scheme for Text Security are: The transposition method of Zig-zag Cipher algorithm used at the time of encryption must be the same as the transposition method used at the time of decryption to obtain the same plaintext result. When encrypting more than once using Zig-zag Cipher algorithm and RC4 + Cipher algorithm with plaintext and same key will produce different ciphertext. This is due to the addition of capital letters to the remaining Zig-zag Cipher matrix algorithms that have not been filled. The result of the decryption process of Zig-zag Cipher algorithm combination and RC4 + Cipher algorithm is the same although the encryption obtained is different when encrypting more than once with the same plaintext and key. Based on the plaintext length graph of the process time, the plaintext length is proportional to the linear graph. That is, the longer plaintext then the time required to perform the encryption is longer too. Based on the complexity value of both algorithm used is Zig-zag Cipher algorithm and RC4 + Cipher algorithm obtained by result Θ(n 2 ). This complexity sometimes has a faster time so that it s form a parabolic graph. References [1] Churchhouse RF 2002 Code and Ciphers: Julius Caesar, the Enigma and the Internet (Cambridge: Cambridge University Press). [2] Ariyus D 2008 Pengantar ilmu Kriptografi, Teori, analisis dan Implementasi (Yogyakarta: Penerbit Andi). [3] Biryukov A, De Canniere C, Braeken A and Preneel B 2003 A toolbox for cryptanalysis: Linear and affine equivalence algorithms Eurocrypt 2656 pp 33-50. [4] Iswahyudi C, Setyaningsih E and Widyastuti N 2012 Pengamanan kunci enkripsi citra pada algoritma super enkripsi menggunakan metode end of file Proc. SNAST 3 pp 278-85. [5] Alghazzawi DM, Hasan SH and Trigui MS 2013 Stream Ciphers: A Comparative Study of Attacks and Structures Int. J. Comput. Appl. 83(1) pp 27-9. [6] Paul G and Maitra S 2012 RC4 Stream Cipher and Its Variants (London: CRC Press Taylor & Francis Group). [7] Budiman MA and Rachmawati D 2017 On Using Goldbach G0 Codes and Even-Rodeh Codes for Text Compression IOP Conf. Series: Mater. Sci. Eng. 1 1-5. [8] Padmapriya, Ph.D, A. & Mu. Annalakshmi, 2013. Zigzag Ciphers: A Novel Transposition Method. International Journal of Computer Applications (0975 8887), 8-12. Annalakshmi M and Padmapriya A 2013 Zigzag Ciphers: A Novel Transposition Method Proc. IJCA 2 pp 5

8-12. 6