International Journal of Mathematical Archive-7(2), 2016, Available online through ISSN

Similar documents
International Journal of Mathematics Trends and Technology- Volume29 Number2 January 2016

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

Cryptosystems. Truong Tuan Anh CSE-HCMUT

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography

EE 595 (PMP) Introduction to Security and Privacy Homework 1 Solutions

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Worksheet - Reading Guide for Keys and Passwords

Classic Cryptography: From Caesar to the Hot Line

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Channel Coding and Cryptography Part II: Introduction to Cryptography

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher

Nature Sunday Academy Lesson Plan

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

Classical Cryptography

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

CHAPTER 5 NEW ENCRYPTION SCHEME USING FINITE STATE MACHINE AND GENERATING FUNCTION

Lecture 4: Symmetric Key Encryption

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.

Secret Key Cryptography

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

Basic Concepts and Definitions. CSC/ECE 574 Computer and Network Security. Outline

LECTURE NOTES ON PUBLIC- KEY CRYPTOGRAPHY. (One-Way Functions and ElGamal System)

International Journal of Mathematical Archive-6(8), 2015, Available online through ISSN

The Hill Cipher. In 1929 Lester Hill, a professor at Hunter College, published an article in the American

CSCI 454/554 Computer and Network Security. Topic 2. Introduction to Cryptography

Advanced Cryptographic Technique Using Double Point Crossover

CIS 3362 Final Exam 12/4/2013. Name:

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key

Outline. Cryptography. Encryption/Decryption. Basic Concepts and Definitions. Cryptography vs. Steganography. Cryptography: the art of secret writing

Cryptography Part II Introduction to Computer Security. Chapter 8

Lecture 3: Symmetric Key Encryption

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

CHAPTER 1 INTRODUCTION TO CRYPTOGRAPHY. Badran Awad Computer Department Palestine Technical college

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

International Journal of Mathematical Archive-7(9), 2016, Available online through ISSN

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

Topics. Number Theory Review. Public Key Cryptography

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

Improved ELGAMAL Encryption for Elliptic Curve Cryptography

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT

A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS

Analysis of Cryptography and Pseudorandom Numbers

International Journal of Computer Engineering and Applications,

Shared Secret = Trust

UNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan

Cryptography BITS F463 S.K. Sahay

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

International Journal of Mathematical Archive-6(10), 2015, Available online through ISSN

Enhanced 3-D PLAYFAIR Cipher

Introduction to Cryptology. Lecture 2

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Hardware Design and Software Simulation for Four Classical Cryptosystems

Cryptography Introduction to Computer Security. Chapter 8

Prime Field over Elliptic Curve Cryptography for Secured Message Transaction

SECURE METHOD FOR EMBEDDING PLAINTEXT ON AN ELLIPTIC CURVE USING TDMRC CODE AND KOBLITZ METHOD

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Sirindhorn International Institute of Technology Thammasat University

Cryptography Functions

Lecture IV : Cryptography, Fundamentals

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

A Combined Encryption Compression Scheme Using Chaotic Maps

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Secret Key Algorithms (DES)

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Introduction to Cryptography

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Senior Math Circles Cryptography and Number Theory Week 1

RANDOM KEY & THE NTH PRIME NUMBER BASED SYMMETRIC KEY ENCRYPTION ALGORITHM

CPSC 467b: Cryptography and Computer Security

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

CSC 474/574 Information Systems Security

ENCRYPT AND DECRYPT IMAGE USING VIGENERE CIPHER

ANALYSIS OF AES ENCRYPTION WITH ECC

Elliptic Curves as Tool for Public Key Cryptography

A nice outline of the RSA algorithm and implementation can be found at:

Cryptanalysis. Ed Crowley

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Classical Encryption Techniques

Classical Encryption Techniques. CSS 322 Security and Cryptography

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM

Encryption. INST 346, Section 0201 April 3, 2018

APNIC elearning: Cryptography Basics

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 158

Cryptography ThreeB. Ed Crowley. Fall 08

Key Exchange. Secure Software Systems

Transcription:

International Journal of Mathematical Archive(), 6, Available online through www.ijma.info ISSN 9 6 MULTIPLE ENCRYPTIONS OF INDEPENDENT CIPHERS A. CHANDRASEKHAR, D. CHAYA KUMARI*, CH.PRAGATHI AND ASHOK KUMAR Professor in Engineering Mathematics, GITAM University, Visakhapatnam, India. Assistant Professor in Mathematics, BVRIT Hyderabad College of engineering for women, Hyderabad, India. Associate Professor in Engineering Mathematics, GITAM University, Visakhapatnam, India. Research Scholar, Department of Mathematics, GITAM University, Visakhapatnam, India. (Received On: 6; Revised & Accepted On: 96) ABSTRACT The main aim of Cryptography is to protect user privacy. The modern ciphers which were employed in wireless networks, digital content and financial systems are rarely get cracked. In order to enhance the security levels, recent research work suggests multiple encryptions. For these issues designing of mathematical models from Algebraic Structures, Number Theoretic concepts play a vital role. In this paper we proposed multiple encryptions using Lucas, Pell numbers, Affine and Vigenere transformations as layers of encryption. Keywords: Pell number, Lucas numbers, Affine, Vignere transformations,encryption algorithms, decryption algorithms. INTRODUCTION Superencryption is a process of encrypting the information that is already encrypted [][]. Multiple encryptions is the process of employing multiple ciphers. The generation of key for each cipher plays the pivotal role. Designing an algorithm for each layer of encryption requires independency. If one depends on the other then security levels are very low. Designing of mathematical models for multiple encryptions mostly based on time and space complexity. Lucas Numbers The Lucas number is defined to be the sum of its two immediate previous terms, thereby forming a Fibonacci integer sequence. The first two Lucas numbers are L = and L = as opposed to the first two Fibonacci numbers F = and F =. Though closely related in definition, Lucas and Fibonacci numbers exhibit distinct properties. The Lucas numbers may thus be defined as follows: if n = Ln = if n = Ln Ln if n > The sequence of Lucas numbers is:,,,,,, 8, 9,, 6,, 89.. Pell Numbers The Pell numbers are defined by the recurrence relation if n = Pn = if n = Pn Pn other wise Corresponding Author: D. Chaya Kumari*, Assistant Professor in Mathematics, BVRIT Hyderabad College of engineering for women, Hyderabad, India. International Journal of Mathematical Archive (), Feb. 6

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6. In words, the sequence of Pell numbers starts with and, and then each Pell number is the sum of twice the previous Pell number and the Pell number before that. The first few terms of the sequence are,,,,,9,,69, 8,98, 8,, 89,... Affine Transformation An affine enciphering transformation is C ap b( mod N ) where the pair (a, b) is the encrypting key and gcd(a,n)=. If y = E(x) = (axb) mod6,[]then we can solve for x in terms of y and so y ( ax b) mod 6 then y b ax( mod 6) or equivalently ax ( y b) mod 6. Vigenere Transformation E ( y) that is, if The Vigenere cipher was generated by Giovan Batista Belaso in [9]. This cipher uses a secret keyword to encrypt the plaintext. First, each letter in the plaintext is converted into a number. Then this numerical value for each letter of the plaintext is added to the numerical value of each letter of a secret keyword to get the ciphertext. The Vigenere ciphers are more powerful than substitution ciphers. Super encryption Superencryption is a process of encryption information that is already encrypted. Super encryption is simply the use of multiple ciphers, usually in multiple steps, as a singular encryption scheme and is a very important technique and many modern strong encryption algorithms can be regarded as resulting from superencryption using a number of comparatively weak algorithm. Present Work An Algorithm for multi encryption using offset rule with Fibonacci numbers as the first layer of encryption and the affine transformation for super encryption Multiple Encryption with Lucas numbers Step: Alice creates plaintexts P = p p, p p m Step: Alice use off set rule with Lucas numbers F=f, f, f f n to each value in sequential order and get sr ciphertext Step:Alice computes C i =P i F i for i=,,, m where C i is the first construct cipher text. Step: Now Alice perform super encryption with the Affine transformation E(x) = (axb) mod 6, Gcd(a, N)= and take a and b are secret, from the first level encryption message. Step: Alice sends super encrypted message to Bob. Step: Bob receives the super encrypted message. Step: Bob decrypts the super encrypted message by using E ( y) = a ( y b) mod 6 Step: Using reverse offset rule with Lucas number Bob decrypts first decrypted message to get original plaintext. SUPER ENCRYPTION OF VIGENERE CIPHER Step: Alice creates plaintexts P = p p, p p m Step: Alice use off set rule with Lucas numbers F=f f f f n to each value in sequential order and get sr ciphertext 6, IJMA. All Rights Reserved

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6. Step: Alice computes C i =P i F i for i=,,, m where C i is the first constructed cipher text. Step: Alice super encrypts the first encrypted message with vigenere transformation using a secret key. Step: Alice sends super encrypted message to Bob. Step: Bob receives the super encrypted message. Step: Bob decrypts with reverse offset rule vigenere transformation to super encryption message. It is the first decryption message Step: Using reverse offset rule with Lucas number Bob decrypts first decrypted message to get original plaintext. Multiple Encryption with Pell numbers Step: Alice creates plaintexts P = p, p, p p m Step: Alice use off set rule with Pell numbers F=f, f, f f n to each value in sequential order and get sr cipher text Step:Alice computes C i =P i F i for i=,,, m where C i is the first construct cipher text. Step: Now Alice apply super encryption of Affine transformation E(x) = (axb) mod 6, gcd(a, N) = and take a and b are secret, from the first level encryption message. Step: Alice sends super encrypted message to Bob. Step: Bob receives the super encrypted message. Step: Bob decrypts with the inverse affine transformation by using E ( y) a ( y b) message. It is the first decryption message = mod 6 as super encrypted Step: Using reverse offset rule with Pell number Bob decrypts first decrypted message to get original plaintext. SUPER ENCRYPTION OF VIGENERE CIPHER Step: Alice creates plaintexts P = p p, p p m Step: Alice use off set rule with Pell numbers F=f, f, f f n to each value in sequential order and get sr ciphertext Step: Alice computes C i =P i F i for i=,,, m where C i is the first construct cipher text. Step: Alice super encrypts the first encrypted message with vigenere transformation using a secret key Step: Alice sends super encrypted message to Bob. Step: Bob receives the super encrypted message. Step: Bob decrypts with the reverse off set rule of vigenere transformation to super encryption message. It is the first decryption message Step: Using reverse offset rule with Pell number Bob decrypts first decrypted message to get original plaintext. 6, IJMA. All Rights Reserved

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6. Encryption process Decryption process A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 6 8 9 6 8 9 EXAMPLE Step: Let the Plain text be NUMBERTHEORY Step: Using Offset rule with Lucas numbers N U M B E R T H E O R Y 9 8 9 6 99 8 6 9 Step: Now applying affine transformation E(x) = (axb) mod 6 for a = & b= x 8 6 9 x 9 9 6 (x) mod 6 9 8 8 Second Encrypted message is R V R T E X S P C S R Step: Encrypted message is RVRTXEXSPCSR Step: First Decrypted Message is RVRTXEXSPCSR Step: Find Inverse of Affine transformation E ( y) = a ( y b) mod 6 Message R V R T X E X S P C S R y 9 8 8 y 6 8 (y) 6 6 6 6 6 8 6 (y)mod6 First Decrypted text P V P F L C L K Z M K P 6, IJMA. All Rights Reserved 6

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6. Step: Reverse Offset rule with the first decrypted message Message P V P F L C L K Z M K P Reverse offset rule with Lucas number 8 9 6 99 9 9 6 8 Mod 6 9 Second Decrypted message is N U M B E R T H E O R Y VIGENERE CIPHER Step: Let the Plain text be LUCASSERIES Step: Offset rule with Lucas number L U C A S S E R I E S 8 8 8 9 8 6 8 9 6 8 Using vigenere cipher as second key C A R D Step: Offset rule with the first encrypted message Offset rule with key 9 6 8 9 9 9 8 8 Mod 6 Second Encrypted message is P V W H B D N X F C C Step: Encrypted message is PVWHBDNXFCC Step: First Decrypted Message is PVWHBDNXFCC Step: Decrypts with the inverse of vigenere transformation Message P V W H B D N X F C C Reverse Offset rule with key Mod 6 First Decrypted message is N V F E Z D W U D C L 9 6 8 6, IJMA. All Rights Reserved

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6. Step: Reverse Offset rule with the first decrypted message Message N V F E Z D W U D C L Reverse Offset rule with Lucas number 8 6 8 8 9 Mod 6 8 8 8 8 Second Decrypted message is L U C A S S E R I E S PELL NUMBERS Step: Plain text is SECRETMATHS Step: Offset rule with Pell number S E C R E T M A T H S 8 9 9 69 9 8 98 8 8 8 6 8 8 69 99 96 Step: Now applying affine transformation E(x) = (axb) mod 6 for a = & b= X 8 6 8 8 69 99 96 x 9 8 9 99 (x) mod 6 6 8 8 6 6 6 Second Encrypted message is Y L G S O S G Z P G G Step: Encrypted message is YLGSOSGZPGG Step: First Decrypted Message is YLGSOSGZPGG Step: Find Inverse of Affine transformation E ( y) = a ( y b) mod 6 Message Y L G S O S G Z P G G y 6 8 8 6 6 6 y 6 6 6 6 6 6 (y) 6 6 6 6 6 6 6 (y)mod6 8 6 First Decrypted text S F E W Q W E N L E E Step: Reverse Offset rule with the first decrypted message Message S F E W Q W E N L E E 8 6 Reverse offset rule with Pell number 8 6, IJMA. All Rights Reserved 8 6 9 69 8 98 8 8 66 6 9 98 Mod 6 8 9 9 8 Second Decrypted message is S E C R E T M A T H S

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6. VIGENERE CIPHERE Step: Let the Plain text be PELLNUMBERS Step: Offset rule with Pell number Using vigenere cipher as second key P E L L N U M B E R S 9 69 8 98 8 6 9 8 96 M A T H 9 Step: Offset rule with the first decrypted message Offset rule with Key 6 9 8 96 9 6 9 8 9 96 9 9 Mod 6 6 8 Second Encrypted message is B F G X L X X V I O X Step: Encrypted message is BFGXLXXVIOX Step: First Decrypted Message is BFGXLXXVIOX Step: Decrypts with the inverse of vigenere transformation Message B F G X L X X V I O X 6 8 Reverse offset rule with Key 6 9 6 Mod 6 6 First Decrypted message is P F N Q Z X E O W O E Step: Reverse Offset rule with the first decrypted message Message P F N Q Z X E O W O E 6 Reverse offset rule with Pell number 6 9 9 69 8 8 9 98 8 6 66 86 9 Mod 6 8 Second Decrypted message is P E L L N U M B E R S 6, IJMA. All Rights Reserved 9

A. ChandraSekhar, D. Chaya Kumari*, Ch.Pragathi and Ashok Kumar / Multiple Encryptions of Independent Ciphers / IJMA (), Feb.6.. Result analysis S.No First encryption Time for first encryption Super encryption Time for super encryption PELL NUMBER. MILLI SEC Affine or vigenere. MILLI SEC LUCAS NUMBER. MILLI SEC Affine or vigenere. MILLI SEC CONCLUSIONS For multiple encryptions, two different algorithms were performed. Initial encryption is performed with Lucas or Pell numbers using offset rule whereas for super encryption two different ciphers either Affine or Vigenere are performed. In view of the time both are more or less the same. REFERENCES. "Application of Fibonacci numbers" edited by A.N.Philippou, A.F.Jordan and G.E.Bergun, Springer science media LLC.. A. ChandraSekhar, D. Chaya Kumari, S. Ashok Kumar "Symmetric Key Cryptosystem for Multiple Encryptions", International Journal of Mathematics Trends and Technology (IJMTT). V9 (): January 6. ISSN:.. A. Chandra Sekhar, Prasad Reddy. P.V.G.D, A.S.N.Murty, B.Krishna Gandhi "SelfEncrypting Data Streams Using Graph Structures" IETECH International Journal Of Advanced Computations PP 9, 8, vol No. A. Chandra Sekhar, K.R. Sudha and Prasad Reddy. P.V.G.D "Data Encryption Technique Using Random Generator" IEEE International Conference on Granular Computing GrC, Nov,, Silicon Valley, USA, PP 69.. B.Krishna Gandhi, A. Chandra Sekhar and Prasad Reddy P.V.G.D: Cryptographic Scheme for Digital signals" IETECH International Journal Of Advanced Computations", Vol: No:, PP9, 8. 6. Cryptography: A very short introduction by Fred Piper and Sean Murthy.. E.H.Lock Wood, A singlelight on pascal's triangle, Math, Gazette (96), PP. 8. Fibonacci, Lucas and Pell numbers andpascal's triangle, Thomas Khoshy, Applied Probability Trust, PP. 9. Fibonacci and Lucas Numbers with applications Thomas Khouhy ISBN: 9899698.. J.Buchman"Introduction to cryptography" SpringerVerlag.. K.R.Sudha, A. Chandra Sekhar, P.V.G.D, Prasad Reddy, "Cryptographic Protection Of Digital Signal Using some Recurrence Relations" IJCNS, May, PP.. Linear independent spanning sets and linear transformations for multilevel encryption, A.ChandraSekhar, V.Anusha, B.Ravi Kumar, S.Ashok Kumar Vol6(), No., PP;89. Source of support: Nil, Conflict of interest: None Declared [Copy right 6. This is an Open Access article distributed under the terms of the International Journal of Mathematical Archive (IJMA), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.] 6, IJMA. All Rights Reserved