Efficient Data Security Algorithm Using Combined Aes and Railfence Technique Abstract 1. Introduction

Efficient Data Security Algorithm Using Combined Aes and Railfence Technique Abstract 1. Introduction

International Journal of Pure and Applied Mathematics Volume 118 No. 20 2018, 3219-3227 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu EFFICIENT DATA SECURITY ALGORITHM USING COMBINED AES AND RAILFENCE TECHNIQUE M.Lavanya, E.Nixson jesuraj, R.Vidhya prakash, R.Vijay Sai, K.Chakrapani School of Computing, SASTRA Deemed University, India ABSTRACT Cryptography is a method by which information or messages can be sent beginning with one customer then onto the following customer which gives a couple of security organizations. Each datum that we send should be shield from others of seeing some mystery data. AES is a building hinder for encryption and unscrambling modes or notwithstanding hashing. AES is the overwhelming square figure from superior to low power. In existing paper, the quantity of rounds expanded for encoding content which in result in greater security for the framework. The underlying key has been created from the Polybius square. With the expansion in number of rounds it will require more computational investment and will wind up hard breaking the framework. We propose a thought of consolidating AES key and other calculations to create an encoded key. This key alongside encoded content is send to others. We additionally expand the quantity of rounds for encoding the content. We reason that it can build the many- sided quality of finding the first content. It gives high information security and high secrecy. KEYWORDS: Polybius, Encryption, Decryption, Security, AES, Rail Fence. 1. INTRODUCTION Cryptography ends up basic piece of the safe correspondence. There are two kinds of Cryptographic calculation to achieve these objectives: Symmetric Cryptography and Asymmetric Cryptography. The essential message is known as plain content, while mixed message is known as figure content. The transformation of plain content to figure content is known as enciphering or encryption. Recouping the plain content from the mixed message is known as disentangling or decoding. In the event that both encryption what's more, decoding are performed utilizing the indistinguishable key, at that point the framework is alluded to as symmetric or single key. 3219 International Journal of Pure and Applied Mathematics Special Issue On the off chance that both encryption and unscrambling utilizes particular keys, at that point the framework is alluded to as lopsided or two key. Cryptography provides many techniques to provide security to the information transferred over the network. This protection ensures the objectives of preserving the integrity, availability and confidentiality of the plain text. 2. DATA SECURITY Data security is a form of data protection against unauthorized users and actions.The use of internet in the present era is increasing at higher rate and demand of security is also increasing rapidly. This gives rise to the need of security as the data, and the information is very sensitive as its transmission is needed all the time. Cryptographic algorithms are designed by mathematical theory and computational knowledge there by making the data more secure. 2.1 AES ENCRYPTION The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use.AES has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. 2.2 KEY GENERATION Key generation is the way toward creating keys for cryptography. The key is utilized to scramble and unscramble information whatever the information is being encoded or decoded. Modern cryptographic systems include symmetric-key algorithms (such as DES and AES) and public-key algorithms (such as RSA). Symmetric-key algorithms use a single shared key; keeping data secret requires keeping this key secret. Public-key algorithms use a public key and a private key. The public key is made available to anyone (often by means of a digital certificate). A sender encrypts data with the public key; only the holder of the private key can decrypt this data. 3220 International Journal of Pure and Applied Mathematics Special Issue 3. RELATED WORKS This paper [1] the security for web keeping money, account passwords, messages accounts secret word and so forth requires content insurance in computerized media. It displays the security furthermore, pressure for the information with the propel encryption standard.The generation of key has been done with the help of the Polybius square. the expansion in number of rounds it will require more computational investment and will wind up troublesome for the programmer to break the framework. This paper [2] a crossover Polybius and Playfair figure which encodes the message into arrangement of melodic notes. The Playfair key network is created utilizing the Blum-Blum Shub generator. The bigrams of plain instant message is first encoded utilizing Playfair figure then individual character of the scrambled message is re-encoded utilizing Polybius figure. This paper [3] an augmentation of an open key cryptosystem to help a private key cryptosystem which is a blend of Advanced Encryption Standard and ECC. The past outcomes have been registered based on AES key length as 128 piece and no. of cycles as 10. The key length for this work has been expanded to 192 piece and the no. of emphasess taken will be 12. This paper [4] we thought about the most well-known square figure methods of activity on AES The correlation is done regarding encryption time, decoding time, and throughput with variable information parcel sizes.ECB takes less time to encrypt and decrypt than the other modes. This paper [5] two most generally utilized symmetric encryption strategies i.e. information encryption standard (DES) and propelled encryption standard (AES) have been executed utilizing MATLAB programming. After the usage, these strategies are thought about on some points.These indicates are torrential slide impact due one piece variety in plaintext keeping the key steady.These algorithms takes significant amount of computing resources such as simulation time, memory usage and level of encryption are of major concern. In AES, avalanche effect is high as compared with the DES which is used in the financial applications. This paper [6] another stage named as DeterminantRotation (DR) in adjusting and creates diverse S-box for each round by actualizing determinant grid count in turning the situation of AES S-box to be utilized as a part of the SubBytes change. This paper [7] gives more grounded security to correspondence organize over the Internet by upgrading the general quality of the AES calculation So, to enhance the quality of the AES the quantity of rounds is expanded. The figure is indicated regarding redundancies of handling steps that are connected to make up rounds of keyed changes between the info plaintext. This paper [8] an approach that requires a direct change to the execution of the AES computation, without altering its basic characteristics, which gives an in a general sense improved quality against side channel strikes with an irrelevant additional gear overhead.This paper [9] we propose a FPGA-based AES execution with fractional and dynamic reconfiguration, and a pipelined and parallel 3221 International Journal of Pure and Applied Mathematics Special Issue usage. A similar plan approach could be reached out to other cryptographic calculations. The speed makes a high throughput in order to avoid bottlenecks. The following figure (Fig 1) shows the key generation Fig.1.Key Generation 3.1 WORK FLOW 1. The plain text is accessed for polybius square. 2. Key generation process 3. Shift the row and mix column value is proposed. 4. Add round key process 5. Now the plain text is encrypted by AES encryption. 6. The encrypted result is generated to RAIL FENCE algorithm process. 7. Now the values are produced in the form of odd and even format. 3.2 PROPOPSED MODEL Key generation is carried out by using hybrid ciphers. Hybrid encryption is a combination of public key and symmetric key cryptosystem. Since there are more number of rounds in this encryption process, it is harder to decode the cipher text. 3222 International Journal of Pure and Applied Mathematics Special Issue The encryption phase of rail fence cipher is shown in figure (Fig 2) Fig.2. Encryption 3.2.1 RAIL FENCE ENCRYPTION The rail fence cipher (also called a zigzag cipher) is a form of transposition cipher. It derives its name from the way in which it is encoded. Encryption Input : "GeeksforGeeks " Key = 3 Output : GsGsekfrek eoe Decryption Input : GsGsekfrek eoe Key = 3 Output : "GeeksforGeeks " Encryption Input : "attack at once" Key = 2 Output : atc toctaka ne 3223 International Journal of Pure and Applied Mathematics Special Issue Decryption Input : "atc toctaka ne" Key = 2 Output : attack at once The following figure (Fig 3 ) shows the flow diagram Fig 3. Flow Diagram 3224 International Journal of Pure and Applied Mathematics Special Issue The succeeding figure (Fig 4) shows the flow of work Fig 4. Flow of work 4. CONCLUSION In this paper, we proposed a new step in single round encryption in AES. The key of the AES is generated from Polybius square. The encrypted output will be carried out from Rail Fence. Thus, the security of the system has been improved. Compared with normal AES algorithm, the updated AES with the new key generation technique and the Rail fence model provides more security in terms of complexity in finding the data using confusion and diffusion technique.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us