Lecture Notes in Computer Science
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 Safe Light Weight Cipher using Ethernet and Pentatop Number J. Harikrishna, Ch. Rupa, P. Raveendra Babu Abstract. Current essential factor in this world to send a sen- Cryptography is discipline or techniques employed on the sitive information over the unsecured network like the internet electronic messages by converting them into unreadable is security. Protection of sensitive data is becoming a major format by using secret keys. Depending on the key used, raising problem due to rising technologies. A recent attack on encryption techniques divided into different types. Electronic Mail of CBI shows that attacker’s efficiency rate. In the traditional symmetric Key Cryptography (SKC), use Standard cryptographic algorithms can be exploited by the only single key which is kept secret for both encryption and attackers frequently and unable to apply for standard devices decryption. This can uses in most common algorithms such because of their energy consumption due to high computation with slow processing. Lightweight cryptography based algo- as AES (Advanced Encryption Standard) and DES (Data rithms can reduce these problems. This paper deals with sym- Encryption Standard). It extends to Asymmetric Key Cryp- metric key cryptography technique to encrypt the data where tography (AKC) which uses two keys, one for encryption the sender and receiver share a common key which can also be and another for decryption. E.g.: RSA (Rivest, Shamir, called a secret key cryptography. To encrypt and decrypt the Adleman) algorithm [14]. Any one from these approaches data, randomly generated Pentatope Number has used as a key. chosen to protect the data (Confidentiality) as well as for Next level of security will be provided using EHA (Ethernet authentication hash Functions have to be used by the users. Hardware Address or MAC Address) which is globally unique, In this hash technique we use mathematical transformations to provide secure data transmission. The increasing of attacks irreversibly "encrypt" information. E.g.: MD (Message on related key attacks motivates this. In particular, we investi- Digest) algorithm is an example. The main objectives of gate the efficiency impact comparatively other standard algo- the proposed algorithm is rithms and observed that applications do not always use cryp- tographic algorithms without their intended use. To improve confusion and diffusion rate by using varia- Keywords: Light Weight Cryptography, Pentatope Number, ble length key. EHA, Secret key, Authentication To provide authentication with the simple and secure method instead of traditional Hash functions like MD5, I. INTRODUCTION SHA. To emphasize importance of light weight cryptography. With the help of internet we are communicating with mil- To provide Confidentiality and Authentication services lions of people and it is used as a tool for commerce and with a single algorithm. hackers are also becoming more powerful nowadays. Secu- In this paper, a stream cipher based light weight encryption rity becomes more tremendous. There are many applica- method has proposed, where integrity and privacy security tions and aspects, which range from private communica- services can be satisfied in a single pass without additional tions, secure commerce and payments and password protec- computational burden. Certainly, it is not similar to any tion. One essential aspect among them for security is cryp- traditional cryptographic approaches. The reminder of this tography for secured data transmission. Cryptography is the paper as in section 2, we presented some preliminary con- science of information security and it is the study of tech- cepts. Section 3 consists of methodology of proposed stream niques for communication between the authorized users in cipher. In section 4, we discussed about the results analysis the presence of adversaries (third parties). Communication with applicability of the proposed scheme. Finally, conclud- has done in a secure way. Cryptography, closely related to ing with future contribution. cryptology and cryptanalysis. It has used to protect the e- mail messages, corporate data, credit card information etc. II. PRELIMINARIES Cryptography mainly deals with encryption and decryption. Encryption is the conversion of information/data from a Block-cipher operates on blocks, which are as units of bits. readable form to unreadable format. At present, cryptog- The length of the block should vary such as 8, 16, 64,etc. raphy based on mathematical approaches and computer That is depending on the developers. Let us consider the science practice. This involves all legitimate users of in- length of the block as ‘n’ [11,12]. formation having the keys require accessing that infor- Definition 2.1 : [Block Cipher]. A n-bit block cipher de- mation. The sender who sends the encrypted message (ci- fines as E: k x M → R, such that k ∈ keys, m ∈ M. pher text) shares the decoding technique needed to convert Where permutations performs from M = {0,1}n which re- the plain text (original message) only with intended recipi- lates to the original text to R = {0,1}n which relates to the ents, thereby avoiding un-authorized persons to do the encrypted text (cipher text). The encryption function can same. performs by the chosen key randomly from the set of keys, Revised Manuscript Received on July 06, 2019. keys = {0,1}k , such that E (m) = C ∀C ∈ R . The decryp- J. Harikrishna, Ch. Rupa, Dept of Computer Science and Dept. of k Computer Science and Engineering V R Siddhartha Engineering College (A), tion function is shown as D: k Vijayawada x R → M. Dk(C) = m. P. Raveendra Babu, Dept of Computer Science and Dept. of Computer Science and Engineering V R Siddhartha Engineering College (A), Vijayawa- da Published By: Retrieval Number: B2105078219/19©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijrte.B2105.078219 1458 & Sciences Publication Safe Light Weight Cipher using Ethernet and Pentatop Number Table 1 shows that randomly generated number (Pascal Definition 2.2 : [Random Function]. A random function Triangle row number) that has considering as an external G(n, r) holds that the functions related to f: M → R where key while transmitting along the ciphertext to the receiver M = {0,1}n and R = {0,1}n and a key is the entire function and its corresponding Pentatopical value. f. III. PROPOSED EHA BASED AUTHENTICATED Table 1 Randomly Generated External Key ENCRYPTION (EPA) Random Key Pentatopic Value (Inside (Row Number- Key) In the existing techniques, keys involving prime numbers, External Key) Armstrong numbers [3] are used. As a step further, we consider a technique (EPA) which involves randomly gen- 20 3876 erated Pentatope value as a key. Here the key size is varia- 40 82251 ble and for more security we append Ethernet Hardware 15 1001 Address (EHA or MAC Address) and row number of the 25 10626 generated Pentatope value to the cipher text using delimiter 30 23751 semi-colon (;) and send it to the receiver. EHA based 35 46376 Pentatope Algorithm process has shown as shown in Fig 1. 45 135751 10 126 12 330 In the proposed system, plaintext (Pt) t bits are XORed with n bits of the Pentatope number (Pn) which has generat- ed by a random key. Thereafter, n bits of the result (Pt ⊻ Pn) 1 have complemented, that is, (Pt ⊻ Pn) and then apply 2’s complement on Ct ⟵ (Pt ⊻ Pn) and then fed in as input to the next round. This cycle has repeated up to completion of 8 –rounds in the encryption process as shown in fig 3. Later appends the randomly generated number as an exter- nal key and EAH value of the receiver. The resultant (Cb) sends to receiver in order to this every receiver extract the plain text and verifies EAH value Fig 1. Proposed System State Chart In the 5th column of a Pascal's triangle [15] as shown in (2) figure 2 can be founded a Pentatope number. These num- bers can represent as regular and discrete geometric pat- (3) terns. The nth Pentatopic number has derived from Eq (1) (1) In the fig 2 marked numbers are the pentatope value of the specified row. In this way, can generates any number of rows randomly. To provide more security, we consider the pentatope value from the row > 8 onwards in the proposed system. Fig 3. 8-Rounds Logic When the receiver receives the data that has been sent by the sender, observes it and splits the data such that the key should be generated at the receiver side based on the row no and MAC Address (Ethernet Hardware Address) has to be compared. If the receiver entered MAC Address and the MAC Address which has been sent by the sender does not match, message Fig 2. (a) Pascal Triangle (b) Pentatopical Numbers cannot be decrypted and (1,5,15,….n) hence the person is recog- Published By: Retrieval Number: B2105078219/19©BEIESP Blue Eyes Intelligence Engineering DOI: 10.35940/ijrte.B2105.078219 1459 & Sciences Publication International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 nized as an un-authorized one otherwise the person is rec- legitimate persons who have known about the sender’s and ognized as legitimate user and the cipher text is decrypted receivers EHA addresses can able to involve in the process. using the randomly generated key and decryption algorithm Authentication has provided by using Ethernet Hardware which produces the plain text (original message). Address (EHA) by comparing the EHA of sender at receiver Step1 - Sender will enter the data (plain text) which he side during decryption. wants to send it to the receiver. If (sender (EHA) = = Reciever (EHA)) Step2 - Generate the random number (row no), based on then extract (Ext_Key) that the pentatope value (Variable Key) is computed from generates (pent(Ext_Key)) Pascal's Triangle.