Enhancing the Security Through the Usage of Merkle Tree and Timestamp in Peerto Peer Messaging
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Pure and Applied Mathematics Volume 119 No. 7 2018, 13-20 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu Enhancing the security through the usage of merkle tree and timestamp in peerto peer messaging Katyayani Sharma Dr. VairamuthuS* School of Computer Science and Engineering Associate Professor VIT University, Vellore Campus School of Computer Science and Engineering VIT Tamil Nadu, India University, Vellore Campus [email protected] Tamil Nadu, India [email protected] Abstract— One of the critical aspects of resource sharing The first distributed type of Merkle‟s authentication tree among p2p clients is security. Common security issues like trust, was Distributed Merkle Tree.This has provided authentication privacy and message integrity still extends to peers and affecting framework for decentralized systems with little trust the reliability of services over P2P. In this paper, we propose a presumptions.In order to detect the infected content peer to time stamped algorithm of merkle tree based on block chain peer streaming peer protocol (PPSPP) came into effect with concepts which provides an authentication tree that is secure against pre-image attack. The proposed algorithm is tested using the use of merkle hash tree with protection of integrity [10]. python and verified with different hash values that are generated Here we have proposed a more secure distributed merkle tree for secure messaging. hashing algorithm with the usage of timestamps to provide integrity to the data shared among the peers in messaging.The Keywords— timestamped algorithm, merkle tree , p2p clients. merkle tree concept with usage of timestamp is used in blockchain technology. The popular example of blockchain I. INTRODUCTION technology is bitcoin.Small part of hash calendar has been implemented in this paper [1]. In this not only the time but Security in peer to peer[4] messaging has been a major also integrity and identity of every piece of data can be concern even if it is decentralized system, where data and verified independently using the concept of blockchain in peer other resources are shared. Availability,confidentiality and to peer messaging. integrity comes under the properties of security in peer to peer Merkle tree is a technique of hashing a substantial messaging. Taking the security into consideration several amountof chunks of data together which depends more on algorithms are proposed such as public key certificates which bifurcating the chunks into buckets and buckets can contain involve the trusted third party and have to rely on Certified hardly any chunks and then hashing each of the bucket. This Authority that the peers can start before they exchange the process would repeat until we get the single root hash out of data among themselves. This comes under the symmetric and all hashes [3]. asymmetric encryption techniques but the keys can be Each leaf node containing the data will be appended with the compromised [6].Rivest-Shamir-Aldeman(RSA)algorithm current timestamp to provide uniqueness to the hash value which is used widely as the encryption algorithm and provides generated. The merkle tree which allows the neat procedure authenticity and confidentiality over the unsecure environment called as merkle proof. This merkle proof includes a root hash which claims to provide secure environment in peer to peer of the created tree and the arm contains all the hashes offering messaging but came across certain attacks such as the path from chunks to the root of the tree. The user scanning mathematicalattacks ,bruteforce key search attack,chosen the proof can substantiate that the hashing is at least carried cipher attack and Timing attack. To overcome this for that chunk and would be unwavering going all the way up disadvantage more secure hybrid RSA algorithm was that created tree. Hence position for that chunk can be proposed. [5] determined [3]. The distributed hash tables focused on providing security The timestamp added to each chunk present in leaf node for more complex systems. If algorithms are executed will be unique even in microseconds and would uniquely correctly but handling misbehaving nodes is general issue identify the hash value for that chunk. Subsequently, hashes [15]. generated would provide the unique value even if hashes are The application can receive inappropriate data from the generated same for the same text. A user who needs to look up system in distributed hash tables. But, the techniques for a key value on the database can ask for the merkle proof and cryptography such as path names which performs self- when received can verify that it is correct and determine the certification can be used to ignore the non-authentic actual position. It permits the procedure for authenticating the data.Aldeon is a protocol that is used for group conversations little portion of the data of hash. in peer to peer communication and this is based on novel tree Here we have used binary merkle tree which provides synchronization algorithm [16]. better structures for authenticating data when combined with *Corresponding Author 13 International Journal of Pure and Applied Mathematics Special Issue timestamp that the hash values alone in the creation of merkle Although, various other types of search trees were built tree. These trees once created are forever frozen so over distributed hash trees or other distributed trees, these confidentiality is maintained. Root of the data depends not on cannot be used to execute a distributed merkle trees or fulfill the order but on the data in which it is updated. So we make the prerequisites for data authentication over peer to peer sure that the entire tree should not be recomputed if any environment as these constructed trees are static and not updating is initiated. concentrating on authentication part- which is susceptible to structural alterations due to hash function in cryptography. II. RELATED WORK 6. Security in p2p systems The authentication problem is handled directly using per- 1. Public key certificates object signatures. Various DHTs are constructed to allow In order to send the message to a second user, the first user notable failure of network-node. Existing p2p systems support encrypts the message with public key of the recipient and rudimentary authentication service for data fetched of sign all routes the message using recipient‟s IP address. It does not type, where source sign the materials individually. need to go through any central server or to be relied on CA or Authentication includes the data with self- certification where any DNS. Once the two users know each other‟s public key huge chunks of data are divided into blocks and kept as certificate then they can start to exchange the messages. The IP autonomous objects in system and are put together by using addresses and the public keys in user‟s public key certificate collision resistant in few tree hierarchy where root block is are important in enabling communication besides keeping it signed. private and secure. This claimed to be secure as the there is no 7. Rivest- Shamir- Adleman (RSA) algorithm store and forward mechanism involved in transmission of It is a widely used encryption method that claims message. authenticity and confidentiality over unsecure channel. This 2. Merkle tree algorithm has certain drawbacks associated with it such as mathematical attacks, chosen cipher attacks, timing attacks and The Merkle tree is an easy cryptographic creation for brute force attacks. In order to avoid this, a hybrid version of certifying set membership. The balanced tree and a collision- RSA was given to be implemented in peer to peer messaging. It resistant hash function for cryptography such as SHA-1 are main peer to peer messaging would be strong enough to resist used to generate a small illustration for cryptography of a attacks and would allow only authenticated user to substantial data. Taken set‟s elements are kept at the leaf nodes communicate to the sender. Multiple chats can be initiated but and hash signature of concatenating the leaf node values is put have to wait for authentication procedure. Similarly, in at internal nodes. The root node value which plays a vital role decryption process Chinese remainder theorem is used which is is signed and validated and the collision resistant attribute further extended to Gaussian integer for better efficiency. [5] claims that is authenticated from leaf nodes to root of the tree. Certification procedure that an element is part of the set is done 8. Elliptic curve cryptography by verification path to re-compute the authentic value of the A public key cryptography which is used by bit coin, root node. Updates which are performed are managed with transport layer security (TLS), secure shell (SSL), Austrian e- complexity which is proportional to height of the formed tree. card. Elliptic curve public keys can directly derive bit coin It is not a distributed merkle tree. addresses. And transactions are authenticated by this algorithm. 3. Authenticated data structures The datasets in SSH involves elliptic curve Diffie Hellman server key exchange messages, public host keys and signatures A third party model in which a trusted data source creates [13]. data and replicates it at various un-trusted responders that replies for the user. Signature amortization is similar to merkle tree which was drafted to the supported query type. This was III. PROPOSED SCHEME carried out on advancing authenticated data structures for many Peer to peer environment is created on which the security types of queries. They do not capture the p2p networks because needs to be applied. The messages are exchanged between the of the associated model of outsourced database systems which peers and current time is recorded for every message sent and studied where SQL queries are supplied over databases that received.