Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

Similar documents
ANALYSIS OF AES ENCRYPTION WITH ECC

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Combination of RGB Substitution for Text to Image Encryption Technique using AES

International Journal of Advance Engineering and Research Development

Science & Technology (DCRUST), Sonepat

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

A Modified Playfair Encryption Using Fibonacci Numbers

Diversified Caesar Cipher for Impeccable Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Enhanced 3-D PLAYFAIR Cipher

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS

I. INTRODUCTION. Manisha N. Kella * 1 and Sohil Gadhiya2.

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Analysis of Cryptography and Pseudorandom Numbers

Network Security Issues and Cryptography

Webpage: Volume 5, Issue VII, July 2017 ISSN

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

Vol. 1, Issue VIII, Sep ISSN

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

A Proposed Method for Cryptography using Random Key and Rotation of Text

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. Design of a Cryptosystem Using Two-Level Hill Cipher

Steganography using MATLAB

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Keywords: Playfair, Matrix, XOR operation

A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS

International Journal of Computer Engineering and Applications,

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

A PROPOSED AUTHENTICATION SCHEME USING THE CONCEPT OF MINDMETRICS

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

Proposal for Scrambled Method based on NTRU

DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3

ISSN: Page 320

A Secure Network Communication Protocol Based on Text to Barcode Encryption Algorithm

Text Steganography Using Compression and Random Number Generators

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms

Assignment 9 / Cryptography

Encryption Details COMP620

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A New variant of Hill Cipher Algorithm for Data Security

Computers and Security

Multi-Level Encryption Framework

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS

Cryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding

Encryption I. An Introduction

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Worksheet - Reading Guide for Keys and Passwords

18-642: Cryptography 11/15/ Philip Koopman

Cryptography MIS

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data

Combining TCP and UDP for Secure Data Transfer

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 3, Issue 6, Dec -Jan, 2016

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

Keywords Block cipher, Blowfish, AES, IDEA, RC5.

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security

Robust DWT Based Technique for Digital Watermarking

Securing password for website using Blowfish Encryption and Decr yption Technique with Struts2 Framework

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies

Implementation of IRIS recognition for Securing Online Payment

Security Handshake Pitfalls

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box

Implementation and Evaluation of New Cryptography Algorithm for Applications

Secured Way of Ciphering Text Using Audio Steganography

LSB Based Audio Steganography Using Pattern Matching

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

18-642: Cryptography

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

II. LITERATURE SURVEY

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

A Modified Polybius Square Based Approach for Enhancing Data Security

A Hybrid Method of Hiding The Text Information Using Stegnography

International Journal of Advance Engineering and Research Development

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

An Analysis of Most Effective Virtual Machine Image Encryption Technique for Cloud Security

A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

Image Processing and Watermark

Multiple Encryption using ECC and Its Time Complexity Analysis

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Security. Communication security. System Security

The Design of an Anonymous and a Fair Novel E-cash System

Journal of Information Engineering and Applications ISSN (print) ISSN (online) Vol 2, No.10, 2012

Transcription:

Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number Shaifali Jain 1 & Kalpana Jain 2 Department of Computer Science and Engineering, MPUAT University/College of Technology and Engineering, Udaipur, India. Abstract- Here we present a novel robust text encryption technique by using Armstrong number, colour code, prime number and ASCII codes by using substitution and permutation technique. In this encryption technique 512-bit size key is used for encryption. In substitution method message is transforms into ASCII codes.in the proposed methodology random Armstrong number, prime number, colour code are generated and key is encrypted by base-64 encoding for more security. In the permutation process multiplication, addition is performed on the data for encryption. The proposed methodology works on the symmetric encryption. The proposed technique is then compared with the standard IDEA algorithm. Result shows that the proposed technique is robust, fast and secure. Keywords: Data security, IDEA, Text encryption, substitution, permutation. 1.INTRODUCTION The new era of social media has led to the inflow of large amount of data. This data which may seem to be unsecured have a special place in data security. With this massive data, which is increasing moment by moment, come several threats, which are of great concern to protect the integrity and privacy of the source generating this data. This is where encryption plays role. Now a days many encryption algorithms allow us to encrypt data. According. Data security is something very crucial and need of the hour. When plain text is converted into unreadable form that is called cipher text, is called the encryption process and the reverse of this cipher text to plain text is called the decryption process. In cryptography when same key is used for encryption and decryption, it is called symmetric cryptography and when two different keys used for encryption and decryption,then it is called asymmetric cryptography. In the proposed methodology RGB colour code plays very important

1258 Shaifali Jain & Kalpana Jain role. RGB stands for the RED GREEN and BLUE. Each pixel is represented by the RED GREEN and BLUE. 24 bits are used by the RGB model, 8 bits for RED, 8 bit for GREEN and 8 bit for GREEN. RGB makes it more secure because if any attacker wants to attack then attacker has to attempt 256 3 to find actual colour code. 1.1Asymmetric cryptography: In Asymmetric cryptography two keys are used for encryption and decryption one is public key and other is private key. Public key is known by everyone but the private key is known only by the receiver to decrypt the message. Strength of the PKC is depends on that how the public and private keys are generated. Example RSA algorithm 1.2Secret key cryptography or Symmetric cryptography: In Secret key cryptography only a single is used for both encryption and decryption process. In this type the key is shared by both sender and receiver.this type of system are very fast and simple. Both sender and receiver should use a secure line to transmit the key. When a person P wants to communicate to person Q they needs a key for securely communication. It is very necessary to exchange key or key distribution. So firstly P and Q exchange the key and then transmits message. Example- AES algorithm, DSA algorithm.the speed of encryption and decryption is very fast. 2.PROPOSED SYSTEM In present work a text encryption technique is proposed. System architecture of the substitution and permutation method in the proposed text encryption technique has been described. In present work sender and receiver maintain a database to store all information about key and data. Encryption is done by the RBG colour codes, ASCII codes, Armstrong numbers and prime numbers. In this scheme, 512-bit size key is used. The key also encrypted by base-64 encoding. After encryption of key the substitution process starts. In the substitution process the message is transformed into its ASCII codes. In the permutation process three random Armstrong number, one prime number and three ASCII numbers are generates and the encryption is completed by multiplying and adding of these numbers. The proposed scheme is performed to achieve a secure and robust communication while its transmission over the network.

Secure Encryption Using Armstrong Number,Color Code ASCII 1259 Figure 1: Design flow of propose methodology A)Substitution process In substitution process the characters of the message are converted into its ASCII codes. B) Base-64 encoding of key In this process the base-64 encoding is performed on the 512-bit key. Base-64 maps all the binary characters into several standard ASCII letters and numbers and punctuation so itis used for more secure and robust transmission of message. Firstly the characters are converted into its ASCII codes, after that the ASCII codes are converted into base 2. c) Permutation process In the permutation process random Armstrong number,prime number and ASCII numbers are generated and encryption of the message done.

1260 Shaifali Jain & Kalpana Jain D)The proposed Methodology: Algorithm In the proposed algorithm firstly 512-bit size key is generates. The encryption is completely depends on the key. In the proposed algorithm 3 random Armstrong number, 3 ASCII number and 1 prime number are generated. The proposed algorithm consists of two process substitution and permutation. Input: plain text X with secret key Key size: 512-bit Output: encrypted text Begin Procedure: substitution 1. Get plain text (X) 2. Transforms the plain text message into ASCII code 3. Colour is selects and than the RGB value for this selected colour is fetch. 4. Key is converted into base-64 encoding. Procedure: permutation 1. Three random Armstrong numbers are multiplied by 3 ASCII numbers and addition into matrix A 2. RGB colour code is add into the result of matrix A and store into matrix B. 3. Now prime number is multiplied by the matrix B and result store into matrix C. 4. The matrix C is multiply by the message ASCII and store into matrix D 5. For encryption key is multiply by the matrix D and it is the encrypted text. End 3. EXPERIMENTAL RESULTS The implementation of the proposed algorithm has been performed in PHP. The implementation is performed in c# language and the data base is creates on my SQL server to store all information The combination of substitution and permutation makes it robust. The security of the proposed text encryption algorithm is tested.

Secure Encryption Using Armstrong Number,Color Code ASCII 1261 (1) Scalability = Scalability defines on the basis of performance and memory required by the encryption algorithm. Memory required depends on number of variable and functions executed by the algorithm. IDEA Algorithm = good performance and required less memory Proposed Algorithm = less memory, performance good but not better than IDEA. (2) Security level = In proposed algorithm we used 512-bit size key and due to 512-key proposed system is more secure.proposed algorithm is secured by brute-force and biclique attack. (3) Avalanche effect= Avalanche effect is defined as the change in either 1 bit of plain text or key produce significant change in cipher text. IDEA algorithms and proposed algorithm are affected when changes in plain text or key. (4) Computation time = Computation time is the time taken by the algorithm to perform the encryption of the text or image. Figure 2 shows the computation time of the IDEA and proposed algorithm for over 650kb file size. Figure shows that average computation time in the range of 0.2sec to 2.2sec for proposed algorithm and for IDEA algorithm the computation time in the range of 0.7sec to 2.5sec. So we conclude that the time taken by proposed algorithm is slightly minimum in comparison to IDEA algorithm. 3 2.5 2 time(sec) 1.5 1 IDEA proposed 0.5 0 153 196 312 650 file size(kb) Figure 2: performance comparison of proposed algorithm with IDEA with respect to computation time

1262 Shaifali Jain & Kalpana Jain (5) Encryption Throughput = Encryption throughput describes that how many unit of information are processed in given amount of time. Encryption throughput = sum of input files/sum of encryption time (kb/sec) Algorithm Throughput(kb/sec) IDEA 243.59 Proposed 327.5 Figure 3 shows the throughput of IDEA and proposed algorithm. Figure shows that the throughput of IDEA is in the range of 0kb/sec to 250kb/sec and the throughput of proposed algorithm is in the range of 0kb/sec to 350kb/sec, which is more than IDEA throughput. 350 300 throughput(kb/sec) 250 200 150 100 327.5 243.5 proposed IDEA 50 0 Figure 3: performance comparison of proposed algorithm with IDEA with respect to Throughput (6) Encryption Rate = Encryption rate defined as the number of bytes encrypted per unit time. Algorithm that is high encryption rate is more secure compared to other algorithm.

Secure Encryption Using Armstrong Number,Color Code ASCII 1263 Encryption rate = file size/encryption time File (kb) size Table 3: Encryption rate of IDEA and proposed algorithm Time(IDEA) sec Time(proposed) Sec Enc rate(idea) Kb/sec 153 0.7 0.2 218.57 765 196 0.9 0.6 217.77 326.66 312 1.3 1.1 240 283.63 650 2.5 2.1 260 309.52 Enc rate(proposed)kb/sec In table 4 we take some parameters to compare IDEA and proposed algorithm Table 4: Comparison between IDEA and proposed algorithm Parameters IDEA Proposed Key size 128 512 Power consumption Low Low Attack Crack by brute force attack More robust due to 512- bit key size Key used No encryption Encrypted key Encryption Fast Faster than IDAE Block size 64 Depends on key and plain text 4.CONCLUSION In this paper we constructed an encryption algorithm which used to secure the data from unauthorized person.this paper present an algorithm which is secure, efficient and robust. Results show that encryption of large file by the proposed system was more secure because numbers are randomly generated and colour code used for authentication as well as encryption also. Hence we successfully constructed and analyzed file transmission model using encryption algorithm.

1264 Shaifali Jain & Kalpana Jain 5.REFERENCES [1] S. Pavithra Deepa, S. Kannimuthu, V. Keerthika, February, 2011 Security Using Colors and Armstrong Numbers Kongu Engineering College, Perundurai, Erode, Tamilnadu, India.17 & 18.pp.157-160. [2] Belose, S., Malekar, M., & Dharmawat, G. 2012. Data Security Using Armstrong Numbers Undergraduate Academic Research Journal (UARJ),volume 1,pp. 80-83. [3] Saoji, S. A., Agarwal, N. B., Bokil, M. B., & Gosavi, A. V. 2013. Securing e- mails in XML format using colors and Armstrong numbers. International Journal of Scientific & Engineering Research (ISSN), 2229-5518 [4] Vanathi, R., Dhanam, L., Senthilnathan, K. R., & Vinu, M. S. 2013. Secured and Reliable Data Transmission Using Lychrel Numbers RGB Colors and One Time Password. [5].Vaidya, M., Bansod, V., & Manwar, M. 2014. A Review on Cryptography Using Armstrong Numbers and Colors. [6].Gurav, N., & Singh, P. A Survey on Security Mechanism using Colors and Armstrong Numbers. [7]. Kumar, A., Sinha, P., & Gupta, T. Steganography For Secure Message Passing. Using Armstrong Number And Color Code. [8] Bellovin, S. M., & Merritt, M. 1992, May. Encrypted key exchange: Password- based protocols secure against dictionary attacks. In Research in Security and Privacy, 1992. Proceedings., 1992 IEEE Computer Society Symposon, pp. 72-84. [9] 9.Blum,M., & Goldwasser, S. 1984, August. An efficient probabilistic publickey encryption scheme which hides all partial information. In Workshop on the Theory and Application of Cryptographic Techniques pp. 289-299. [10] Needham, R. M., & Schroeder, M. D. Using encryption for authentication in large networks of computers Communications of the ACM, [11] Renaud, Evaluating authentication mechanisms, in Security and Usability: Designing Secure Systems That People Can Use, L. Cranor and S. Garfinkel, Eds.O Reilly Media, 2005, ch. 6, pp. 103 128. [12] Jain, L. Hong, and S. Pankanti,2000. "Biometric identification," Communications of the ACM, vol. 33, pp. 168-176. [13] Burke, J., McDonald, J., & Austin, T., Architectural support for fast symmetric-key cryptography, Independent Component Analysis: A Tutorial Introduction. MIT Press, Cambridge, MA (2004).

Secure Encryption Using Armstrong Number,Color Code ASCII 1265 [14] Lavanya Reddy L,K.Alluraiah, August 2013: Enhanced Cued Click Point( ECCP) Method for Graphical Password Authentication International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 8. [15] Chavan Satish, Lokhande Yogesh, Shinde Pravin, Secure Email using Colors and Armstrong Numbers over web services, International Journal of Research in Computer Engineering and Information Technology VOLUME 1 No. 2.

1266 Shaifali Jain & Kalpana Jain