Академический Документы
Профессиональный Документы
Культура Документы
Abstract—Web services and cloud computing have gained between clients to get a particular job done. XML can be used
wide range of popularity. Cloud and web services are used to share such data. But, XML inherently does not provide
anywhere, by anyone, on any platform. In these fields, Extensible security, hence sending the data as plain text over internet or
Markup Language (XML) has been identified as conventional intranet is having risk like someone may take benefit of picking
standard for data sharing among the communicating parties. up the information and this can harm the business
XML Security has become an important concern in the field of confidentiality. Communicating parties some time prefer to use
information and data sharing. In this paper, a variant of RSA low power and computationally constraint devices for sharing
algorithm called Lite-RSA for XML Encryption (LRXE) is information. Under these circumstances, a secure
proposed. LRXE uses small public key exponent for encryption.
communication and at the same time computationally efficient
Computational burden of LRXE decryption process is reduced
cryptographic systems are desirable.
by redevising the private key of basic RSA. The
encryption/decryption is validated over several granularities of XML documents can be secured by encrypting the
XML file. The time to encrypt/decrypt an entire XML file using information at different levels of granularity [6]. The
LRXE is very less compared to normal RSA. Due to the encryption can be carried out at element level or through the
encryption/decryption efficiency, LRXE can be preferred over entire XML file. XML file can be partially secured such that,
RSA and is more suitable for devices having low battery life and part of the XML data can be read by anyone and other
computational limitations. information should only be read by few authorized persons.
The difference between raw encryption and xml encryption is
Keywords— XML Encryption; RSA; LRXE; Web Services;
that, raw encryption usually is a binary operation and encrypts
I. INTRODUCTION the whole document. On the other hand, with xml encryption,
selected information in the document can be encrypted
In the year 1996, a group formed by World Wide Web separately. Because XML’s syntax is structured using markup,
Consortium (W3C) developed a structured light weighted one or more elements can be handled differently. This is very
language called Extensible Markup Language (XML) to useful for large and growing documents holding lots of
transfer the data. The XML documents have both logical and information for multiple parties. The accessibility to read the
physical components. The argument of an element in an XML encrypted information depends on the known secret key.
document is referred as logical component. Physical
components are like entities, which begins with root or The rest of the paper is organized as follows. In section II,
document entity [1-6]. related research work is described. Section III describes the
XML Security standards. Section IV presents a detailed XML
Cryptology is process converting plain text to cipher text encryption granularity. Sections V provides the proposed
and vice versa. Specifically cryptology deals with usage of methodology. Then discussed result analysis in detail. Finally a
different varieties of cryptosystems to encrypt and decrypt the brief conclusion is given.
data with use of a key. The party who is having a key is only
able to encrypt or decrypt so that data is securely shared among II. RELATED WORK
the trusted parties. The field of cryptography can be classified
as private and public key cryptosystems. In public key Over the years, many flavors of RSA algorithm and public-
cryptosystem there are mainly two keys. One key is public and key cryptosystems have been proposed. Some of the recent and
is shared by all the parties. Other key is private and is secret. prominent ones are discussed below.
One key encrypts and other key is meant for decrypting the Dhakar et al. in [12] describes the two possible attacks on
cipher text. Private key cryptographic method is one in which RSA algorithm like mathematical attack and brute force attack.
the same key is used to encrypt and decrypt the message [7- Mathematical attack is possible because of factoring two large
11]. prime numbers and brute force attack can be done by trying
Organizations and businesses handle confidential possible private keys. The authors proposed new method to
information such as, confidential business report, personal improve the security level of traditional RSA algorithm using
information of their employees, clients, customers, etc. These additive homomorphic properties called Modified RSA
data needs to be transferred between offices, servers and Encryption Algorithm (MRES). In MRES, only the public-key
204
2) Case2: Encryption of Child Elements: Sometimes only V. METHODOLOGY
child elements need to be encrypted. As shown in Fig. 3, A. Basic RSA Cryptosystem
, , elements
and their content is encrypted. RSA is well known asymmetric cryptography algorithm
presented in [11]. In an asymmetric cryptography system, pair
of keys is used for encryption and decryption process. RSA
cryptosystem involves three algorithms like key generation,
encryption and decryption.
1) Key generation algorithm:
Let and be two distinct large prime numbers. The
modulus is calculated as product of and as shown in
equation 1 . The size of the prime numbers are usually set
to /2.
1
The Euler’s totient function is calculated as per the
equation 2 .
Fig. 3. Encryption of
Elements (reference from [6]) 1 1 2
Let be a random integer which is relatively prime to
3) Case3: Encryption of Element Content: XML Euler’s totient function (i.e. 1< e <
encryption also suggests encryption of character contents of gcd , 1). Let be multiplicative inverse modulo
elements. As shown in Fig. 4, contents of of as specified in equation 3 . The public key is
element is alone encrypted. presented by pair of , and private key is represented
by pair of , .
ed 1 3
2) Encryption algorithm:
The encryption algorithm initiates to encrypt the message
into unreadable cipher form. For encryption, public key
pair , is used. The cipher message is computed by
as per the equation (4).
C M mod N 4
3) Decyprion algorithm:
The plain text can be obtained using the pair of , ,
the private key. is computed as per the formula 5 .
M C mod N 5
Fig. 4. Encryption of content of Element (reference from [6]) B. Lite-RSA for XML Encryption (LRXE)
LRXE is light version of RSA algorithm. The proposed
B. Type Paramater: system is inspired by the several variants of RSA algorithm
The Type parameter specified in encrypted XML file provided in [17]. Similar to RSA, LRXE contains three
usually assigned and one of the values. For element encryption algorithms - key generation, encryption and decryption.
Type is set to 'http://www.w3.org/2001/04/xmlenc#Element'
1) Key generation algorithm:
and for content encryption Type parameter is set to
'http://www.w3.org/2001/04/xmlenc#Content'. Thus, there is Let and be two distinct large prime numbers. The
wide level of flexibility for encryption of XML file. modulus is calculated as product of and as shown in
For further in depth details, readers are requested to refer equation 6 . The size of the prime numbers is usually set
XML Encryption document presented in [6]. With this basic to /2.
understanding of XML encryption, next section presents the 6
proposed XML encryption scheme.
The Euler’s totient function is calculated as per the
equation 7 .
205
1 1 7 granularities i.e. encryption at element level, content level and
for an entire XML file.
Let be a random integer which is relatively prime to
Euler’s totient function (i.e. 1< e < The encryption time for several XML files are recorded to
gcd , 1). The public key is presented by pair of compare the performance of XML encryption using RSA and
, . LRXE algorithms. Fig. 5 represents the comparison of RSA
and LRXE cryptosystems with respect to XML file size vs.
The decryption key is calculated in two parts , as encryption time. The observation made is that, LRXE
shown in equation 8 and 9 . consumes less encryption time. The encryption time for LRXE
varies from 53ms to 186ms, while for, RSA it is 104ms to
1 8 337ms. The huge improvement of LRXE is due to the usage of
1 9 small public key exponent.
2) Encryption algorithm: Fig. 6 represents XML file size vs. decryption time. The
decryption time of LRXE is between 35ms to 84ms. While the
The encryption algorithm is similar to basic RSA decryption time for normal RSA is 104ms to 337ms. It can be
cryptosystem but with use of smaller public exponent e. noticed that, LRXE decryption process is almost 4 times faster
The size of exponent is fixed to 2 1 as suggested compared to normal RSA cryptosystem. The enormous
in [17]. Choosing a smaller public key exponent will boost improvement in the performance of LRXE is achieved by
the encryption process by reducing the time. Plain message individual computation of p and q as explained the in the
M is encrypted as per the equation (3) section V.
3) Decyprion algorithm:
XML File Size Vs. Encryption Time
The process decryption is dependent on both the prime
numbers p and q. Modified decryption process is specified 400
below from equation 10 to 13 . The decryption process RSA
350
is process called CRT-Decryption process, and decryption LRXE
300
Encryption Time
key is triplet , , instead of pair of , . (milli seconds)
250
mod p 10
200
mod q 11 150
12 100
50
p 13
0
As encryption exponent is smaller, cryptosystem should
1.1 2.2 3.03 4.11
result in faster encryption. And similarly, decryption uses
independent and instead of using their products. This also XML File Size (Kilo Bytes)
results in lower computational requirements. Thus, proposed
system may be suitable for computational constraint devices.
The suggested cryptosystem is inspired by the work presented Fig. 5. XML File Size vs. Encryption Time
in [17]. The contribution of this paper is to use this
cryptosystem in XML encryption.
XML File Size Vs. Decryption Time
VI. SYSTEM SETUP AND EXPERIMENTAL EVALUATION
400
A. System Setup: RSA
350
Decryption Time
The RSA and LRXE algorithms are developed as a simple 300 LRXE
(milli seconds)
206
The encryption and decryption time of RSA
R and LRXE is XML file. This leads to fasterr encryption compared to basic
compared by considering XML files of diffferent sizes. Since RSA algorithm. On the otherr hand decryption of LRXE is
LRXE can provide faster encryption and decryption, it is nearly four times faster comparred to basic RSA algorithm. The
suitable for devices with low compuutational abilities. results are analyzed in dettail over the three different
Normally, these devices are battery operated. Faster granularities of XML file and found that LRXE is suitable for
encryption and decryption leads to lesss battery power computational constraint devicees.
compared to regular RSA. Thus LRXE allso ensures better
battery utilization. Under certain conditions thee proposed algorithm may fail to
provide stronger security beecause of smaller public key
Fig. 7 shows graph of XML encryptioon granularity vs. exponent. In the near futuree a much stronger encryption
encryption time. The graph shows that, enccryption time for algorithm will be devised annd compared with some other
both RSA and LRXE is almost same with respect to popular encryption techniques to further assess the quality of
encryption of element and its content. But while considering the existing system.
encryption of an antire XML file, RSA coonsumes 5ms and
LRXE consumes 4ms. Similarly, from Fig. F 8 it can be REFER
RENCES
observed that RSA consumes 5ms and LRX XE consumes only [1] Extensible Markup Language (XML) ( 1.0 [Online]. Available:http://
2ms for decryption. This observation leads to
t the information www.w3.org/TR/REC-xml/
that, LRXE is more effective in encryptiing/decrypting the [2] Extensible Markup Language (XML) Secuirty Standard [Online].
entire XML file. http://www.w3.org/standards/xm ml/security.
[3] XML Signature Current Status [Online]. http://www.w3.org/standards
/techs/xmlsig#w3c_all
Granularity Vs. Encryption Time [4] XML Encryption Current Status S [Online]. http://www.w3.org/
standards/techs/xmlenc
[5] Extensible Markup Language (XML) Key Managament Standard
5 RSA [Online]. http://www.w3.org/stanndards/techs/xkms#w3c_all
LRXE [6] Extensible Markup Language (XML) Revised Encryption Standard
Encryption Time
4
(milli seconds)
[Online]. http://www.w3.org/TR//2013/REC-xmlenc-core1-20130411/
3 [7] D. Luciano and Gordon Prichettt, “Cryptology: From Caesar Ciphers to
Public-Key Cryptosystems,” Thee College Mathematics Journal, vol. 18,
2 No. 1, pp. 2-17, January 1987.
[8] S. T. F. Al-Janabi and M. A.. Rasheed, “Public-Key Cryptography
1 Enabled Kerberos Authenticcation,” In IEEE conference on
Developments in E-systems Engiineering, pp. 209-214, Dec. 6-8, 2011.
0
[9] G.P. Biswas, “Diffie–Hellman tecchnique: extended to multiple two-party
Content Element F
File keys and one multi-party key,” Published
P in IET Information Security,
vol. 2, No. 1, pp. 12– 18, 2008.
XML Encryption Granularrity
[10] R. Sharma, “A Novel Approach to combine Public-key encryption with
Symmetric-key encryption,” The T International Journal of Computer
Fig. 7. Granularity vs. Encryption Time
T Science & Applications, Vol. 1, No.
N 4, pp. 8-15, June 2012.
[11] R. L. Rivest, A. Shamir, L. Adleeman, “A method for obtaining digital
signatures and public-key cryptoosystems,” Communications of ACM,
Granularity Vs. Decryption Time NY, USA, vol. 21, Isssue 2, pp. 120-126,
1 Feb. 1978.
[12] R.S. Dhakar, A.K. Gupta and P. P Sharma, “Modified RSA encryption
algorithm,” IEEE Second Innternational conference on Advanced
6 RSA Computing and Communicationn Technologies, pp. 426-429, Jan. 7-8,
2012.
Decryption Time
LRXE
(milli seconds)
207