Journal Paper Format
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Advanced Science and Technology Vol. 28, No. 8, (2019), pp. 282-288 Cryptographic protocols for Mobile Cloud Computing Suresh.P1, Venkatagiri J2,Lochan B3, Dr. Pritam Gajkumar Shah4 Abstract Cloud computing will be the buzzword of an Information Technology to access the different resources placed all across the globe with the help of the Internet. With the advancement in mobile technology the number of users accessing the resources placed across the data centres will also get increased, through their mobile devices. With many technologies are evolved to provide security to the user while on transit, still not much security is given while the user is on the transit, which will be the main concern for people who are going to use the cloud resources through mobile devices across the world. Providing the security from the data which is a main concern for the data centers. Keywords: Cloud computing, protocols, Security 1. Introduction Since in todays world every human being is making use of mobile devices for their daily day to day activities. People want to access the resources while on a go. With the invention of the cloud computing the data can be accessed through the computer as well as the mobile device. Mobile cloud computing has been introduced to make use of the cloud resources through mobile servers. Mobile cloud computing is a combination of cloud computing and mobile services working together. With the accessing of the cloud resources on move, severe drawbacks has to be faced related to the performance, security(Reliability and privacy) and environment( Low bandwidth, Service and heterogeneity) along with scalability and availability. Mobile cloud computing has been enormously used to access the resource which were placed in the distant place with the help of the cloud. With the gaining of accessing the resources using mobile devices , the drawbacks related to accessing the cloud resources through cloud also increases. But according to the recent survey, Amazon and Microsoft's cloud are growing in a blistering pace. In the next 5 years every industry will be having a paradigm shift towards using the cloud for their enterprise operations. As the user grows, implementing the efficient data centers, which can be having the flexible resource management can complicate the security measures to be taken across the user side as well as the organization side. While providing the security, for the cloud users who are going to access the resources in transit. Major problem arises in the encrypting the, since to provide the proper security measures, the key length provided should be long. But the longer key length takes more key calculation time in turn consumes more power which will drain the battery faster. So the technique of data offloading the data came, where the security is provided across the service provider side. But if the security is provided across the service provider side, the data will be not secured while the data is in transit. In this paper we are comparing the different cryptographic technique used for providing the proper security in the mobile devices. ISSN: 2005-4238 IJAST 282 Copyright ⓒ 2019 SERSC International Journal of Advanced Science and Technology Vol. 28, No. 8, (2019), pp. 282-288 2. LITERATURE SURVEY Cryptographic Algorithms level of constructs Many cryptographic algorithms are proposed in the past with the use of different combination of keys at the different levels of constructs. A detailed study of the some of the cryptographic algorithm is as follows. 3.1.1 Substitution Box: S-Box (Substitution-box) is a basic tool required in the construction of the symmetric key algorithms to perform substitution of the different parameters. An S-Box takes some number of bits as an input referred as ‘p’. Transforms the input fed into them as some number of output ‘q’: a p×q S-Box can be implemented as a lookup table with 2p words of p bits each. The table value to be used will be filled with the randomly generated as well as the Fixed value. 3.1.2 Permutation Box: A permutation box (or P-box) is a method of shuffling the bit to perform permutation or transposing the bits across S-boxes inputs, retaining the Shannon disposing the boxing. A P-box is a bit which is acquired after doing permutation. The bit which came out of doing the permutation as an outputs of all the S-boxes as one round which do the permutation on the bit and feeds them into the S-boxes of the next round. An efficient P- box has the features that the output bits of any of the S-box are to as given to y S-box inputs as possible. 3.1.3 Feistel Cipher: A Feistel cipher (also called Feistel network) is a symmetric key algorithm mainly used in building of the block ciphers, which is named as after the cryptographic pioneer Horst Feistel. The Feistel ciper manneris having the advantage of performing both that encryption and decryption operations in a similar manner. Reversal of the key schedule id required in the some of the cases. A Feistel network is an integrated cipher which is having the internal function called as round function. Figure shows both encryption and decryption using Feistel. The construction details are as follows [1]: Let F be the round function and let K0, K1, K2,…..,Kn be the sub-keys for the rounds 0,1,2,....,n respectively. Then the basic operation is as follows: • The given plaintext block into divided into two equal pieces, (L0, R0) • For each round of iteration i = 0, 1, 2…n; compute Li+1 = Ri Ri+1 = Li F(Ri, Ki) (where is a XOR operation) Then the ciphertext is (Rn+1, Ln+1) • Decryption of a ciphertext (Rn+1, Ln+1) is done by doing the reverse operation of computing for i=n, n-1,…, 0 Ri = Li+1 Li = Ri+1 F(Li+1, Ki) (where is a XOR operation) Then plaintext is (L0, R0). ISSN: 2005-4238 IJAST 283 Copyright ⓒ 2019 SERSC International Journal of Advanced Science and Technology Vol. 28, No. 8, (2019), pp. 282-288 The advantage of the Feistel model compared to a substitution-permutation network is that the round function F does not have to be invertible. 3.1.4 Substitution-permutation Network: Substitution-permutation network (also referred to as SPN or SP-network), is a series of linked mathematical operations used in block cipher algorithms. According to [2], SPN network takes the key and the block of the plaintext as inputs, and applies several "rounds" or "layers" of substitution boxes (S-boxes) in alternating fashion and permutation boxes (P-boxes) to produce the cipher text block (see Sections 3.1.1, 3.1.2) . The P-boxes and S-boxes transform (sub) blocks of input bits into output bits. It is common for these transformations to be operational which are efficient to perform in hardware, such as exclusive or (XOR) and bitwise rotation. In this the key is introduced in each round which is in the form of round key. Decryption is achieved by simply reversing the process. 3.1.5 Simple XOR: XOR performs a simple exclusive-or operation: ‘^’ in C or in mathematics. 0 0 0 0 1 1 1 0 1 1 1 0 Table 3.1: XOR operation 2 most important properties of XOR operation are: a a = 0 a b b = a 3. METHODOLOGY Approach: The comparative analysis started with thorough investigations of 5 symmetric block cipher algorithms (Blowfish, Camellia, CAST-128, DES and IDEA) which can provide the proper security for mobile devices. During the course of this infvestigation were made. This section presents the observations made for fore mentioned algorithms. Investigation of Symmetric Block Cipher Algorithms: 4.2.1 Blowfish: • Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier [14]. Blowfish has a block size of 64-bit and a key length which can be varied from 8 up to 448 bits. Number of rounds the Feistel cipher takes is around 16 and makes uses of key dependent S-boxes. The structure of the Fiestal cipher is similar to CAST-128, which make uses of fixed S-boxes. ISSN: 2005-4238 IJAST 284 Copyright ⓒ 2019 SERSC International Journal of Advanced Science and Technology Vol. 28, No. 8, (2019), pp. 282-288 4.2.2 Camellia: • Camellia [17] was developed jointly by Nippon Telegraph, Telephone Corporation and Mitsubishi Electric Corporation in the year 2000. Camellia specifies the 128-bit block size and 128 , 192, and 256 bit key sizes. It is a Feistel network cipher with 18 or 24 rounds. • Main structure of the camellia is similar to DES-like cipher which is having a 18 round Feistel structure for 128 bit key and 24 round Feistel structure for 192 and 256 bit keys. The FL/FL-1 functionality layers are inserted in every 6 rounds. • Main Components: Every six rounds, a logical transformation layer is applied: the so-called "FL-function" or its inverse. Camellia uses four 8 x 8-bit S-boxes with input and output affine transformations and logical operations. The cipher also uses input and output key whitening. The diffusion layer uses a linear transformation based on an MDS matrix with a branch number of 5. • Briefly stating: Round function (F-function): Byte-oriented SPN structure. FL/FL-1 function layers: Combination of AND, OR, Rotation, and XOR Whitening: XOR Subkey generation: Intermediate keys are generated from secret key using 2-rounds. Feistel structure: Subkeys are created from secret key and intermediate keys using Rotation & Choice technique 4.2.3 CAST-128: • CAST-128 (alternatively CAST5) is a symmetric block cipher.