An Efficient Symmetric Cipher Algorithm for Data Encryption

Total Page:16

File Type:pdf, Size:1020Kb

An Efficient Symmetric Cipher Algorithm for Data Encryption International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 05 | May-2016 www.irjet.net p-ISSN: 2395-0072 An Efficient Symmetric Cipher Algorithm for Data Encryption Prosper Kandabongee Yeng1, Joseph KobinaPanford2, James Ben Hayfron-Acquah3, Frimpong Twum4 1 Head of IT, IT, C and J Medicare Hospital, Accra, Ghana 2Lecturer, Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana 3Senior Lecturer, Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana 4Lecturer, Computer Science,Kwame Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract-This paper presents an efficient algorithm for a 1.0 INTRODUCTION symmetric cipher named, “YC1” that employs key spaces of varying lengths to encrypt and decrypt a plain text. Information Technology plays a very pivotal role in our The means to ensuring that parties maintain confidentiality businesses such as accomplishing complex tasks, speedy and privacy is by means of cryptography, even in the processing and many others but one very challenging presence of an adversary with access to the communication concern today has to do with security in data channel. One of the central goals of cryptography is to communications. Data security in databases can be maintain privacy. There are other goals of communication maintained by conventional methods even though security, such as guaranteeing integrity and authenticity of malicious attackers can intercept the message or communications and many other sophisticated and information and use them for ill-intentioned purposes. fascinating goals. Cryptography is now in widespread use Therefore there is the need to effectively apply encryption and if a person undertakes or indulges in online and decryption techniques to enhance security in either transactions using credit cards, cryptography might have stored data or data in transition. Cryptographic indirectly been used. This is to ensure the privacy of credit components are considered to be highly resistant to card numbers. In electronic banking, cryptography is used cryptanalysis if the right techniques or algorithms are to ensure that checks cannot be forged. Cryptography employed. remained an art, a game of ad hoc designs and attacks for “YC1” elegantly employs the principles of bit rotation in the larger part of its history. The field of cryptography has its construction process. The bitwise operators (bit shift retained some of its flavor over the years and has brought in left, bit shift right and bitwise OR operators), modular something new. The art of cryptography has now been and basic arithmetic which are crucial concepts were supplemented with a legitimate science. In this research the also employed. The traditional system development life focus shall be on that science, which is modern cycle (SDLC) methodology was adopted in developing cryptography [1]. YC1. Depending on observations of the results of implementation of the proposed symmetric cipher on a Modern cryptography is a cornerstone of computer and set of real data of several types, all results were communications security with end products that are registered and analyzed. In this research, suggested data imminently practical. It is a remarkable discipline that encryption algorithm is presented by using the above touches on branches of mathematics that may have been mentioned principles. This algorithm was tested on some considered esoteric, and it brings together fields like data, visual and numerical measurements were used to number theory, computational-complexity theory, and check the strength and performance of this technique. probability theory [1]. There is also cryptology, a vital area The experiments showed that the suggested technique in the field of computer science which deals with can be used easily to encrypt textual data. cryptography and cryptanalysis. Cryptography refers to the art or science encompassing the principles and methods of converting an intelligible message (plaintext) into one that Key Words:Symmetric cipher, Data security, Bit rotation, is unintelligible (cipher text), and then converting that bitwise operators, XOR cipher message back to its original form [2]. In its cipher form, a message cannot be read by anyone but the intended © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1713 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 05 | May-2016 www.irjet.net p-ISSN: 2395-0072 receiver. The act of converting a plain text message to its The cipher being proposed uses the concept of private cipher text form is called enciphering. Reversing that act secret key cryptography making it efficient and difficult to (i.e., cipher text form to plain text message) is deciphering break. However, one major drawback is that the key must be [2]. exchanged between the sender and recipient beforehand, raising the issue of how to protect the secrecy of the key [5]. Cryptology refers to the art and sciences involved in Considerable gaps exist between the target objective with protecting one’s information from unintended recipients respect to securing data within networks and local and also in exploiting information. In the present age of computers. In addition to these some of the approaches or technology it has both offensive and defensive connotations techniques even though very effective and efficient has their and there is high needs of components associated with own weaknesses with some of them being key length, cryptography or cryptology in organizations especially with improper implementations, design errors, size of values, regards to the security of information. This is to realize the reusing random parameters that should never be reused, goals of information security namely confidentiality, inadequate protection mechanisms to serve as backup, integrity and non-repudiation [3]. Cryptography provides hardware [6], number of rounds, sub key generation integrity, authentication, non-repudiation and algorithm, round function, fast software confidentiality and are employed in several technologies encryption/decryption and ease of analysis [2]. YC1 comes and protocols. These are the goals of cryptography but not to play in this situation and has the tendency to help all algorithms are able to do effectively. Most of the safeguard the key due to some complexities incorporated in algorithms are focused mainly on one of the goals. Some its design and construction process. cryptographic algorithms (like the Substitution ciphers) have been proven to be insecure over the years leading to This research proposes an algorithm that can be considered their deprecation [4]. secure at present, can scale better and has key sizes that provide adequate security levels. Now, the cost of data storage and information processing reduces with every year advancing, in order to retain effective security. Symmetric cryptographic keys must 2. LITERATURE REVIEW increase in size every 18 months by 1 bit because of Moore’s law and a similar empirical law for storage costs. For an Many ciphers have been developed and used over the years encryption system to have a useful shelf life and securely with some of them having become standards all over the interoperate with other devices throughout its life span, the world. In this paper, emphasis will be placed on the system should provide security for 10 or more years into following ciphers. They include: XOR, NC1, DES, AES, the future. In general, cryptographic algorithms, are divided Vigenere and Gronsfeld. YC1 (proposed cipher) uses the into the following: symmetric or secret key algorithms, following concepts in its design. These concepts include: bit asymmetric or public key algorithms, elliptic curve rotation, bitwise operators, substitution techniques, algorithms and hash.[4]. modular and basic arithmetic. One very challenging concern today has to do with security in data communications. In data communications, security is of primary concern especially in the areas of secure 2.1 XOR communication channels, data encryption and maintenance of databases. Great attention is accorded to secure According to Churchhouse (2002), the simple XOR cipher is transmission of confidential information. Data security in a type of additive cipher an encryption algorithm or databases can be maintained by conventional methods even technique that operated according to the following though malicious attackers can intercept the message or principles below. information and use them for ill-intentioned purposes. A 0 = A, Therefore there is the need to effectively apply encryption and decryption techniques to enhance security. A A = 0, Cryptographic components are considered to be highly resistant to cryptanalysis if the right techniques or (A B) C = A (B C), algorithms are employed. (B A) A = B 0 = B, where denotes the exclusive disjunction (XOR) operation. This operation is sometimes called modulus 2 addition (or © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 1714 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 05 | May-2016 www.irjet.net p-ISSN: 2395-0072 subtraction, which is identical).With this logic, a string of approach the two way operations of compression
Recommended publications
  • A Cipher Based on the Random Sequence of Digits in Irrational Numbers
    https://doi.org/10.48009/1_iis_2016_14-25 Issues in Information Systems Volume 17, Issue I, pp. 14-25, 2016 A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS J. L. González-Santander, [email protected], Universidad Católica de Valencia “san Vicente mártir” G. Martín González. [email protected], Universidad Católica de Valencia “san Vicente mártir” ABSTRACT An encryption method combining a transposition cipher with one-time pad cipher is proposed. The transposition cipher prevents the malleability of the messages and the randomness of one-time pad cipher is based on the normality of "almost" all irrational numbers. Further, authentication and perfect forward secrecy are implemented. This method is quite suitable for communication within groups of people who know one each other in advance, such as mobile chat groups. Keywords: One-time Pad Cipher, Transposition Ciphers, Chat Mobile Groups Privacy, Forward Secrecy INTRODUCTION In cryptography, a cipher is a procedure for encoding and decoding a message in such a way that only authorized parties can write and read information about the message. Generally speaking, there are two main different cipher methods, transposition, and substitution ciphers, both methods being known from Antiquity. For instance, Caesar cipher consists in substitute each letter of the plaintext some fixed number of positions further down the alphabet. The name of this cipher came from Julius Caesar because he used this method taking a shift of three to communicate to his generals (Suetonius, c. 69-122 AD). In ancient Sparta, the transposition cipher entailed the use of a simple device, the scytale (skytálē) to encrypt and decrypt messages (Plutarch, c.
    [Show full text]
  • Stream Ciphers) Ppfdrof
    CS-630: Cyyyber and Network Security Lecture # 2: Introduction to Cryptography and Symmetric Ciphers (Stream Ciphers) PPfDrof. Dr. SSfiufian HHdameed Department of Computer Science FAST-NUCES FAST-NUCES Cryptog rap hy FAST-NUCES Examples FAST-NUCES Cryptosystem FAST-NUCES Attacks against Cryptosystems 1.))p Cipher text-only: Attacker ppgypossesses a string y of the cipher text 2. ) Known plaintext: Attacker possesses a string x of the plaintext and the corresponding cipher text y. The problem now is to find out the key which produces y from x 3.) Chosen plaintext: Attacker has access to the encryption machinery. Hence he can chose a plaintext string x and construct the corre spondi ng ci phe r te xt st ri ng y. 4.))p Chosen cipher text: Attacker has access to the decryption machinery. Hence, he can chose a cipher text string y and construct the corresponding plaintext string x. FAST-NUCES Security of Keys FAST-NUCES Cryptography is everywhere Secure communication: y web traffic: HTTPS y wireless traffic: 802.11i WPA2 (and WEP), GSM, Bluetooth EtiEncrypting files on dis k: y EFS (Encrypting File System) y TrueCrypt (open-source disk encryption software) Content protection y DVD --- Content Scramble System (CSS) is a Digital Rights Managg()ement (DRM) and encryp ypytion system em pyployed on almost all commercially produced DVD-Video y Easy to break y Blu-Ray --- Advance Access Content System (AACS) User authentication … and much much more FAST-NUCES Things to remember Cryptography is: y A tremendous tool y The basis for many security mechanisms
    [Show full text]
  • Cryptography in Embedded Systems CRYPTOGRAPHY in EMBEDDED SYSTEMS
    Cryptography in Embedded Systems CRYPTOGRAPHY IN EMBEDDED SYSTEMS 1INDERJIT SINGH, 2KHUSHBOO JHINGRAN, 3JEENAL SHAH Department of Electronics Engineering , Fr. Conceicao Rodrigues College of Engineering , Mumbai University Fr. Agnel Ashram, Bandstand, Bandra (W), Mumbai Abstract— It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems, which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share of those embedded applications will be wireless, which makes the communication channel especially vulnerable. All modern security protocols use symmetric-key and public key algorithms. This contribution surveys several important cryptographic concepts and their relevance to embedded system applications. The security requirements, such as authentication, confidentiality and integrity, always make computationally intensive processes and can easily become the bottleneck of the related applications. This paper presents implementation of KKJEIN algorithm on the ATMEL Microprocessor AT89C51. It shows how cryptography can be implemented for data transfer between two microprocessors using serial ports. Keywords— Cryptography, symmetric key cryptography, public key cryptography. The important criterion to check on a symmetric I. INRODUCTION encryption algorithm was the efficiency of the cipher Now a days embedded systems are increasingly in different platforms, including microcontrollers. used in many distributive applications due to which Since 2001, various implementations have the need for them to communicate among themselves consequently been proposed, exploring the different and other peripherals has risen in the same possible design tradeoffs ranging from the highest magnitude.
    [Show full text]
  • Modern Cryptanalysis.Pdf
    Contents Acknowledgments Introduction Chapter 1: Simple Ciphers 1.1 Monoalphabetic Ciphers 1.2 Keying 1.3 Polyalphabetic Ciphers 1.4 Transposition Ciphers 1.5 Cryptanalysis 1.6 Summary Exercises References Chapter 2: Number Theoretical Ciphers 2.1 Probability 2.2 Number Theory Refresher Course 2.3 Algebra Refresher Course 2.4 Factoring-Based Cryptography 2.5 Discrete Logarithm-Based Cryptography 2.6 Elliptic Curves 2.7 Summary Exercises References Chapter 3: Factoring and Discrete Logarithms 3.1 Factorization 3.2 Algorithm Theory 3.3 Exponential Factoring Methods 3.4 Subexponential Factoring Methods 3.5 Discrete Logarithms 3.6 Summary Exercises References Chapter 4: Block Ciphers 4.1 Operations on Bits, Bytes, Words 4.2 Product Ciphers 4.3 Substitutions and Permutations 4.4 Substitution–Permutation Network 4.5 Feistel Structures 4.6 DES 4.7 FEAL 4.8 Blowfish 4.9 AES / Rijndael 4.10 Block Cipher Modes 4.11 Skipjack 4.12 Message Digests and Hashes 4.13 Random Number Generators 4.14 One-Time Pad 4.15 Summary Exercises References Chapter 5: General Cryptanalytic Methods 5.1 Brute-Force 5.2 Time–Space Trade-offs 5.3 Rainbow Tables 5.4 Slide Attacks 5.5 Cryptanalysis of Hash Functions 5.6 Cryptanalysis of Random Number Generators 5.7 Summary Exercises References Chapter 6: Linear Cryptanalysis 6.1 Overview 6.2 Matsui’s Algorithms 6.3 Linear Expressions for S-Boxes 6.4 Matsui’s Piling-up Lemma 6.5 Easy1 Cipher 6.6 Linear Expressions and Key Recovery 6.7 Linear Cryptanalysis of DES 6.8 Multiple Linear Approximations 6.9 Finding Linear Expressions
    [Show full text]
  • Xor Decoder with Key
    Xor Decoder With Key In the x64 XOR encoder, there are several different suggestions for making signature-based detection of the encoder more difficult: Swapping registers—Using a non-hardcoded register to store the XOR key may make it more challenging to write signatures for the encoder, since the MOV RBX instruction would no longer be a permanent component. There is a slight problem with this. , a disk sector). After JMP-CALL- POP, we are inside the loop which runs over the whole encrypted shellcode (25 bytes). So the least significant bit is the output bit. So now we have 3 values, x, y and z which we can then send to our friend. Then based on knowledge of most frequent char and using frequency analysis it will be able to guess the key used to encrypt the data. Here Mudassar Ahmed Khan has explained with an example, how to encrypt and store Username or Password in SQL Server Database Table and then fetch, decrypt and display it in ASP. 101010101010101 (Encryption Key) 101100101100001 (Encoded) Breaking this down we get 10110 01011 00001, which gives the encoded word, VKA. // ksize is the key size. Therefore, the encoder encodes 2n input lines with 'n' bits. The key's SHA256 hash is saved in the input file, so that it can be compared with the provided password for decryption. For that, the software uses a secret key can be a number, a word, or just a string of random letters aiming at changing the content in a particular. Cipher import DES. The Morse code decoder can listen to your computer's microphone, extract any Morse code sound and write down what it hears.
    [Show full text]
  • Classic Ciphers (Mathematical Version)
    Cryptology Part I: Classic Ciphers (Mathematical Version) Klaus Pommerening Fachbereich Physik, Mathematik, Informatik der Johannes-Gutenberg-Universit¨at Saarstraße 21 D-55099 Mainz October 25, 1999|English version October 5, 2013|last change January 19, 2021 K. Pommerening, Classic Ciphers 1 Preliminary Note This text is somewhat incomplete. It focusses on the mathematical back- ground of Cryptology. People without mathematical ambitions may browse the HTML pages|these are informal and hopefully self-contained. Also for historical or motivational stuff I often refer to the accompanying web pages http://www.staff.uni-mainz.de/pommeren/Cryptology/ Motivational Hints Classical cryptography considers ciphers in use up to the 1970's, that is, in the precomputer era. Today no one seriously uses these ciphers. Why does it make sense dealing with them? • We get a feeling for the security of the basic encryption steps that are in use as components of the more complex ciphers of today. • The complexity of modern techniques becomes perspicuous. • Most of the mathematical foundations are relevant also for modern cryptologic techniques. • We may learn a lot from the failures of the past|many of the com- monly accepted principles of cryptology arose a long time ago. In short: The algorithms are out-of-date, the methods and principles are up-to- date. • Classical cryptology makes a good part of general education, not only for mathematicians or computer scientists. In particular it provides many interesting project ideas for undergraduates or even school chil- dren. • Classical cryptology provides intellectual challenges|better than chess, poker, or war games [:-)]. The puzzle corners of journals often contain puzzles whose cryptological background shines through.
    [Show full text]