<<

International Journal of Pure and Applied Mathematics Volume 118 No. 20 2018, 3219-3227 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu

EFFICIENT DATA SECURITY ALGORITHM USING COMBINED AES AND RAILFENCE TECHNIQUE

M.Lavanya, .Nixson jesuraj, .Vidhya prakash, R.Vijay Sai, .Chakrapani School of Computing, SASTRA Deemed University, India

ABSTRACT

Cryptography is a method by which information or messages can be sent beginning with one customer then onto the following customer which gives a couple of security organizations. Each datum that we send should be shield from others of seeing some mystery data. AES is a building hinder for and unscrambling modes or notwithstanding hashing. AES is the overwhelming square figure from superior to low power. In existing paper, the quantity of rounds expanded for encoding content which in result in greater security for the framework. The underlying has been created from the square. With the expansion in number of rounds it will require more computational investment and will wind up hard breaking the framework. We propose a thought of consolidating AES key and other calculations to create an encoded key. This key alongside encoded content is send to others. We additionally expand the quantity of rounds for encoding the content. We reason that it can build the many- sided quality of finding the first content. It gives high information security and high secrecy.

KEYWORDS: Polybius, Encryption, Decryption, Security, AES, Rail Fence.

1. INTRODUCTION

Cryptography ends up basic piece of the safe correspondence. There are two kinds of Cryptographic calculation to achieve these objectives: Symmetric Cryptography and Asymmetric Cryptography. The essential message is known as plain content, while mixed message is known as figure content. The transformation of plain content to figure content is known as enciphering or encryption. Recouping the plain content from the mixed message is known as disentangling or decoding. In the event that both encryption what' more, decoding are performed utilizing the indistinguishable key, at that point the framework is alluded to as symmetric or single key.

3219 International Journal of Pure and Applied Mathematics Special Issue

On the off chance that both encryption and unscrambling utilizes particular keys, at that point the framework is alluded to as lopsided or two key. Cryptography provides many techniques to provide security to the information transferred over the network. This protection ensures the objectives of preserving the integrity, availability and confidentiality of the plain text.

2. DATA SECURITY

Data security is a form of data protection against unauthorized users and actions.The use of internet in the present era is increasing at higher rate and demand of security is also increasing rapidly. This gives rise to the need of security as the data, and the information is very sensitive as its transmission is needed all the time. Cryptographic algorithms are designed by mathematical theory and computational knowledge there by making the data more secure.

2.1 AES ENCRYPTION

The Advanced Encryption Standard, or AES, is a symmetric block chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use.AES has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys.

2.2 KEY GENERATION

Key generation is the way toward creating keys for cryptography. The key is utilized to scramble and unscramble information whatever the information is being encoded or decoded. Modern cryptographic systems include symmetric-key algorithms (such as DES and AES) and public-key algorithms (such as RSA). Symmetric-key algorithms use a single shared key; keeping data secret requires keeping this key secret. Public-key algorithms use a public key and a private key. The public key is made available to anyone (often by means of a digital certificate). A sender encrypts data with the public key; only the holder of the private key can decrypt this data.

3220 International Journal of Pure and Applied Mathematics Special Issue

3. RELATED WORKS

This paper [1] the security for web keeping money, account passwords, messages accounts secret word and so forth requires content insurance in computerized media. It displays the security furthermore, pressure for the information with the propel encryption standard.The generation of key has been done with the help of the Polybius square. the expansion in number of rounds it will require more computational investment and will wind up troublesome for the programmer to break the framework. This paper [2] a crossover Polybius and Playfair figure which encodes the message into arrangement of melodic notes. The Playfair key network is created utilizing the Blum-Blum Shub generator. The bigrams of plain instant message is first encoded utilizing Playfair figure then individual character of the scrambled message is re-encoded utilizing Polybius figure. This paper [3] an augmentation of an open key to help a private key cryptosystem which is a blend of Advanced Encryption Standard and ECC. The past outcomes have been registered based on AES key length as 128 piece and no. of cycles as 10. The key length for this work has been expanded to 192 piece and the no. of emphasess taken will be 12. This paper [4] we thought about the most well-known square figure methods of activity on AES The correlation is done regarding encryption time, decoding time, and throughput with variable information parcel sizes.ECB takes less time to encrypt and decrypt than the other modes. This paper [5] two most generally utilized symmetric encryption strategies i.e. information encryption standard (DES) and propelled encryption standard (AES) have been executed utilizing MATLAB programming. After the usage, these strategies are thought about on some points.These indicates are torrential slide impact due one piece variety in plaintext keeping the key steady.These algorithms takes significant amount of computing resources such as simulation time, memory usage and level of encryption are of major concern. In AES, avalanche effect is high as compared with the DES which is used in the financial applications. This paper [6] another stage named as DeterminantRotation (DR) in adjusting and creates diverse S-box for each round by actualizing determinant grid count in turning the situation of AES S-box to be utilized as a part of the SubBytes change. This paper [7] gives more grounded security to correspondence organize over the Internet by upgrading the general quality of the AES calculation So, to enhance the quality of the AES the quantity of rounds is expanded. The figure is indicated regarding redundancies of handling steps that are connected to make up rounds of keyed changes between the info plaintext. This paper [8] an approach that requires a direct change to the execution of the AES computation, without altering its basic characteristics, which gives an in a general sense improved quality against side channel strikes with an irrelevant additional gear overhead.This paper [9] we propose a FPGA-based AES execution with fractional and dynamic reconfiguration, and a pipelined and parallel

3221 International Journal of Pure and Applied Mathematics Special Issue

usage. A similar plan approach could be reached out to other cryptographic calculations. The speed makes a high throughput in order to avoid bottlenecks.

The following figure (Fig 1) shows the key generation

Fig.1.Key Generation

3.1 WORK FLOW

1. The plain text is accessed for polybius square. 2. Key generation process 3. Shift the row and mix column value is proposed. 4. Add round key process 5. Now the plain text is encrypted by AES encryption. 6. The encrypted result is generated to RAIL FENCE algorithm process. 7. Now the values are produced in the form of odd and even format.

3.2 PROPOPSED MODEL

 Key generation is carried out by using hybrid .  Hybrid encryption is a combination of public key and symmetric key cryptosystem.  Since there are more number of rounds in this encryption process, it is harder to decode the cipher text.

3222 International Journal of Pure and Applied Mathematics Special Issue

The encryption phase of is shown in figure (Fig 2)

Fig.2. Encryption

3.2.1 RAIL FENCE ENCRYPTION

The rail fence cipher (also called a zigzag cipher) is a form of . It derives its name from the way in which it is encoded.

Encryption

Input : "GeeksforGeeks "

Key = 3

Output : GsGsekfrek eoe

Decryption

Input : GsGsekfrek eoe

Key = 3

Output : "GeeksforGeeks "

Encryption

Input : "attack at once"

Key = 2

Output : atc toctaka ne

3223 International Journal of Pure and Applied Mathematics Special Issue

Decryption

Input : "atc toctaka ne"

Key = 2

Output : attack at once

The following figure (Fig 3 ) shows the flow diagram

Fig 3. Flow Diagram

3224 International Journal of Pure and Applied Mathematics Special Issue

The succeeding figure (Fig 4) shows the flow of work

Fig 4. Flow of work

4. CONCLUSION

In this paper, we proposed a new step in single round encryption in AES. The key of the AES is generated from Polybius square. The encrypted output will be carried out from Rail Fence. Thus, the security of the system has been improved. Compared with normal AES algorithm, the updated AES with the new key generation technique and the Rail fence model provides more security in terms of complexity in finding the data using confusion and diffusion technique.

3225 International Journal of Pure and Applied Mathematics Special Issue

5. REFERENCES

1. Puneet Kumar, Shashi . Rana, Development of modified AES algorithm for data security, Optik - International Journal for Light and Electron Optics, Volume 127, Issue 4, 2016, Pages 2341-2345, ISSN 0030-4026, http://dx.doi.org/10.1016/j.ijleo.2015.11.188. (http://www.sciencedirect.com/science/article/pii/S0030402615018215)

2. Chandan Kumar1, Sandip Dutta2, Soubhik Chakraborty3, A Hybrid Polybius-Playfair Music Cipher , International Journal of Multimedia and Ubiquitous Engineering Vol.10, No.8 (2015), pp.187-198.

3. Nishtha Mathur, Rajesh Bansode, AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection, In Procedia Computer Science, Volume 79, 2016, Pages 1036-1043, ISSN 1877-0509

4. S. Almuhammadi and I. Al-Hejri, "A comparative analysis of AES common modes of operation," 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering.

5.A.K. Mandal, . Parakash, A. Tiwari, Performance evaluation of cryptographic algorithms: DES and AES, in: IEEE Students’ Conference on Electrical, Electron-ics and Computer Science, 2012, pp. 1–5.

6. Julia Juremi*, Ramlan Mahmod, Zuriati Ahmad Zukarnain, Sharifah Md. Yasin, Modified AES S-Box Based on Determinant Matrix Algorithm, Volume 7, Issue 1, January 2017.

7. Ankit K.Dandekar1, Sagar Pradhan2, Sagar Ghormade3, Design of AES-512 Algorithm for Communication Network, International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 05 | May-2016.

8. . Goodwin, P.R. Wilson, Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead, in: IEEE Transaction Paper, 2008, pp. 3286–3289.

9. José . Granado-Criado, Miguel A. Vega-Rodríguez, Juan M. Sánchez-Pérez, Juan A. Gómez-Pulido, 10. A new methodology to implement the AES algorithm using partial and dynamic reconfiguration,Integration, the VLSI Journal,Volume 43, Issue 1,2010

11. P. Mahajan and A. Sachdeva, “A study of encryption algorithms aes, des and rsa for security,” Global Journal of Computer Science and Technology, vol. 13, no. 15, 2013.

3226 3227 3228