Академический Документы
Профессиональный Документы
Культура Документы
BY:
Name
1. Akash Gupta
2. Abhishek Kulkarni
3. Ashish Titus
Roll No.
111A1033
111A1045
111A1089
Name
Akash Gupta
Abhishek Kulkarni
Ashish Titus
Roll No.
111A1033
111A1045
111A1089
Exam No.
This Seminar is carried out for the partial fulfillment of requirement for the Degree of Bachelor
of Engineering (B.E) in Computer Engineering from University of Mumbai, during the academic
year 2013 14.
Guide
(Name of Guide)
Head of Department
(Computer Department)
Principal
(S.I.E.S. Graduate school of Technology)
We have examined this report as per University requirements at SIES Graduate School of
Technology, Nerul, Navi Mumbai on _________________
Name: _______________
Name: _______________
Sign: _________________
(Examiner 1)
Sign: _________________
(Examiner 2)
2
S.I.E.S. GST, Dept. of Computer Engineering
Acknowledgement
We have taken efforts in this seminar. However, it would not have been possible without the kind
support and help of many individuals and organizations. I would like to extend my sincere thanks to all of them.
We are highly indebted to Prof. Monika Sharma for her guidance and constant supervision as well
as for providing necessary information regarding the seminar & also for her support in completing the seminar.
Her constant support and inspiration gave us the initial thrust required to excel further. We would also like to
extend thanks to our respected HOD Prof. Aparna Banore for her valuable inputs and support.
We would also like to extend thanks to our respected principal Dr. Alka Mahajan for her support
and encouragement.
Abstract
3
S.I.E.S. GST, Dept. of Computer Engineering
This Seminar proposes a new cryptography system based on a concept known as the Symmetric Function
Encryption. The Symmetric Function Encryption itself is based on the fact that, instead of having a number of
keys and systems to authorize those keys, encryption/decryption functions and methods to manage these keys, we
may instead develop a single function that can perform both encryption and decryption within the same function
definition, thus reducing the complexity of the operations both in time and space domain, and also , embed the
keys within this code, by passing them as parameters to this function.
For implementing this function, we will be using an obscure concept in recreational mathematics known
as the Magic Squares. These matrices of nxn degree, have certain properties, which provide us with an
opportunity to develop a symmetric function for encrypting the data as per the proposed policy. For this
implementation we will be making use of a particular kind of magic squares of odd degree known as the
Siamese Magic Squares.
Along with this function developed in association with rules of a Siamese Magic Square, we will also be
having a random number generator, based on IP address technique, which will not be fixed by the protocol to
improve and maintain security of this system. But, it will be simple enough to avoid excess time complexity. The
special headers for this encryption method will be encapsulated within the data field of IPv4 Datagram.
Essentially, with this proposed system, we hope to provide a new cryptographic system, which will enable
fast and secure transmission of data using novel methods to encourage further research in the fields of
Mathematics and Cryptography.
Index of Contents
4
S.I.E.S. GST, Dept. of Computer Engineering
Sr. No.
Topic
Cover
Certificate
Acknowledgement
Abstract
Index of Contents
Introduction
Literature Survey
Project Details
Applications
Future Scope
Conclusion
References
1
2
3
4
5
6
7
8
9
10
11
12
Page
No.
1
2
3
4
5
6
8
14
18
19
20
21
Introduction
Cryptography is the practice and study of techniques for secure communication in the presence of third
parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the
influence of adversaries and which are related to various aspects in information security such as data
confidentiality, data integrity, authentication, and non-repudiation. Modern cryptography intersects the disciplines
of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards,
computer passwords, and electronic commerce.
There are different kinds of cryptography:-
Transposition Cipher
5
S.I.E.S. GST, Dept. of Computer Engineering
ii.
Substitution Cipher
In cryptography, a substitution cipher is a method of encoding by which units of
plaintext are replaced with ciphertext, according to a regular system; the "units" may
be single letters (the most common), pairs of letters, triplets of letters, mixtures of
the above, and so forth. The receiver deciphers the text by performing an inverse
substitution.
iii.
Steganography
It is the art or practice of concealing a message, image, or file within another
message, image, or file. The word steganography means "covered writing" or
"concealed writing". Generally, the hidden messages will appear to be (or be part of)
something else: images, articles, shopping lists, or some other cover text. For
example, the hidden message may be in invisible ink between the visible lines.
ii.
6
S.I.E.S. GST, Dept. of Computer Engineering
On the basis of the weakness identified from the above encryption techniques, we will try to develop a
system that will harvest all the advantages of the above systems, while still keeping the resource hogging to a
minimum.
Literature Survey
Background Information
We need to clear out a number of a concepts before introducing the matter of the proposed algorithm. The first
among these, is the concept of Symmetric Function Encryption.
Symmetric Function Encryption Technique
Now, we will discuss about a new technique to implement an encryption algorithm. This is the SYMMETRIC
FUNCTION ALGORITHM. The symmetric function algorithm is a technique that exploits the facility of certain
functions being able to represent different states of the data, or an application, when different parameters are used.
It makes use of the symmetric key encryption technique, so to say, meaning the symmetric function does use
separate parameters for both sides. However, the contexts as private key and public keys are not applicable, as we
do not have fixed defined pair of states as encrypted or decrypted. Therefore, it is possible to choose a number of
pair of parameters to be the keys.
As mentioned earlier, it replaces the multiplicity of having a separate function at both server side (encrypting side
or Sender site) and the client side (decrypting side or Receiver site).
7
S.I.E.S. GST, Dept. of Computer Engineering
Multi-stage Security
A critical point in the Symmetric Function Algorithm is the multi-stage Security aspect it may provide. This gives
it a significant edge over the traditional protocols.
It also improves upon the asymmetric key algorithm by avoiding unnecessary complexity of maintaining multiple
functions. Additionally due to presence of multiple states, there is a possibility of having multi-level encryption at
each hop.
Example, in Onion routing protocol, there are multiple non-exit relay nodes, encryption may be applied. The
onion routing implementation with Tor, allows the connection to be bounced from multiple PCs, a malicious user
at one of these PCs, may try to hijack critical data in transit.
Here, in the context of the subject of this seminar, we will be employing the magic squares (Siamese magic
squares, to be precise) to implement the symmetric function encryption.
RRL x 2
8
S.I.E.S. GST, Dept. of Computer Engineering
01100010
Sample Data
Encrypted data
01100010
010
01100010
110
Another important concept needed to be covered here is the concept of Magic Squares themselves, especially
Siamese Magic Squares.
Magic Squares
A magic square is an N x N grid, holding numbers from 1 to N*N. The numbers may be used once
only. The peculiarity of a magic square lies in the fact that the sum of all numbers in any single
row, or single column or either of the main diagonals is a constant given by
A magic square has the same number of rows as it has columns, and in conventional math notation, "n" stands for
the number of rows (and columns) it has. Thus, a magic square always contains n2 numbers, and its size (the
number of rows [and columns] it has) is described as being "of order n".[1] A magic square that contains the
integers from 1 to n2 is called a normal magic square. (The term "magic square" is also sometimes used to refer to
any of various types of word squares.)
It is possible to construct a normal magic square of any size except 2 2 (that is, where n = 2), although the
solution to a magic square where n = 1 is trivial, since it consists simply of a single cell containing the number 1.
The smallest nontrivial case, shown below, is a 3 3 grid (that is, a magic square of order 3).
9
S.I.E.S. GST, Dept. of Computer Engineering
We will be considering a very specific case of the magic squares- Odd degree magic squares formed by Siamese
method.
Siamese Method
The Siamese method, or De la Loubre method, is a simple method to construct any size of n-odd magic
squares (i.e. number squares in which the sums of all rows, columns and diagonals are identical). The method was
brought to France in 1688 by the French mathematician and diplomat Simon de la Loubre, as he was returning
from his 1687 embassy to the kingdom of Siam. The Siamese method makes the creation of magic squares
straightforward.
10
S.I.E.S. GST, Dept. of Computer Engineering
2. If a filled box is encountered, one moves vertically down one box () instead, then continuing as before.
Technology Required
The IPv4 technology is used to transfer the data over the Internet. The IPv4 protocol is explained below.
IPv4
IPv4 is a connectionless protocol for use on packet-switched networks. It operates on a best effort delivery model,
in that it does not guarantee delivery, nor does it assure proper sequencing or avoidance of duplicate delivery.
These aspects, including data integrity, are addressed by an upper layer transport protocol, such as the
Transmission Control Protocol (TCP).
IPv4 uses 32-bit (four-byte) addresses, which limits the address space to 4294967296 (232) addresses. As
addresses were assigned to users, the number of unassigned addresses decreased. IPv4 address exhaustion
occurred on February 3, 2011, although it had been significantly delayed by address changes such as classful
network design, Classless Inter-Domain Routing, and network address translation (NAT).
An IP packet consists of a header section and a data section.
An IP packet has no data checksum or any other footer after the data section. Typically the link layer encapsulates
IP packets in frames with a CRC footer that detects most errors, and typically the end-to-end TCP layer checksum
detects most other errors.
11
S.I.E.S. GST, Dept. of Computer Engineering
Of these, the important fields for our proposed mechanism are: Total Length
This 16-bit field defines the entire packet (fragment) size, including header and data, in bytes. The
minimum-length packet is 20 bytes (20-byte header + 0 bytes data) and the maximum is 65,535 bytes
the maximum value of a 16-bit word.
Source address
This field is the IPv4 address of the sender of the packet. Note that this address may be changed in transit
by a network address translation device.
Destination address
This field is the IPv4 address of the receiver of the packet. As with the source address, this may be
changed in transit by a network address translation device.
The total length (L) field is used for fragmentation of data and encryption header chunks, while the Source
Address and the Destination Address fields are used instead for increasing the randomness in the data elements.
12
S.I.E.S. GST, Dept. of Computer Engineering
Explanation of Work
The Encryption Technique is based on the generation of parameters to be passed to the Symmetric
Encryption function. The IPv4 Datagram allows us to pass a maximum of 65,536 bytes of data in a single packet.
The data itself is split into 12 chunks of a minimum size of 1 byte (though, this is cryptographically speaking a
trivial case, where no encryption can take place on this chunk of data, which is essentially a single byte) and a
maximum size of 9801 bytes is enforced. The cause for having this upper bound will be explained later.
Another Concept introduced in this method of Encryption is that of Encryption Header. In addition to the
IPv4 header explained earlier. We also have an additional 48-byte field inside the datagram. The data packet itself
in a modified manner as required by the proposed method is given below
13
S.I.E.S. GST, Dept. of Computer Engineering
14
S.I.E.S. GST, Dept. of Computer Engineering
We have observed here, that once we apply the Siamese-method multiple times, we are able to re-obtain
the ordering of the number we have initially entered into the matrix. The Siamese method, if used, in the use of
data characters instead of the arithmetic progression of the numbers, can be used as an efficient Symmetric
function. We can add the order of the magic square and the number of rotations as a parameter for the function
using either of the formats mentioned earlier under the heading Symmetric Function Encryption.
16
S.I.E.S. GST, Dept. of Computer Engineering
Applications
1. An application of the proposed technique would be as an application layer security in the systems, where
the client-side is a terminal which is connected to a local hub, a server or even an intelligent router, this
hub connects to the Internet. The sender on the other side of the Internet tries to send a message, to the
client-side terminal, will try to connect to this hub. This connection may be completely encrypted by the
use of SSL technology. The SSL technology will not however serve the connections between the hub and
the clients terminals. A malicious user on either the hub (a corrupt network admin) or on the terminal (a
hacker), will be able to read all the messages passed between the hub and the terminal. However, by using
17
S.I.E.S. GST, Dept. of Computer Engineering
2. Also, secondly another application could be to have the data within the application code to
be encrypted. This can also be managed by embedding the encrypted data within the
application, while the function itself is maintained wherever integrity check must be made,
such as, customer's site, developer's site. This will stop the malicious users from reverse
engineering the application code to obtain sensitive data.
Future Scope
18
S.I.E.S. GST, Dept. of Computer Engineering
While, this method provides a way to reduce complexity immensely, there is further scope to improve
insertion of data elements by using trees, heaps or even linked lists. These data structures have been
proven to reduce the complexity down to O(n log n).
If security is a concern, instead of using simple 2-d magic square, a complex 3-d structure like
magic cube may be used.
As per the requirement of the network, the encryption technique may also be used for other Protocols
such as IPv6 , RSVP or any other protocol, since, all info is in data field.
Conclusion
19
S.I.E.S. GST, Dept. of Computer Engineering
The symmetric function cryptography will open up a number of avenues for further research with respect to
functions that will provide security at a much lower time complexity. This is proved by the ability of the
proposed algorithm to reduce complexity down to around O(n^2).
It will provide the sender assurance of secure transfer of data even where other solutions may require
complex applications. This is done in applications, where a central hub receiving data from the Internet may
need to pass it to other computers connected to it. The traditional applications would require us to have a
separate system to manage hierarchy of users.
It will further provide scope for integrating various obscure concepts of Recreational Mathematics and
Encryption techniques.
20
S.I.E.S. GST, Dept. of Computer Engineering
References
1. Encryption
http://en.wikipedia.org/wiki/Cryptography
http://en.wikipedia.org/wiki/Siamese_method
http://en.wikipedia.org/wiki/Symmetric_key
http://en.wikipedia.org/wiki/Asymmetric_key
5. IPv4 Description
http://www.openwall.com/presentations/IPv6
6. Time Complexity
21
S.I.E.S. GST, Dept. of Computer Engineering