Академический Документы
Профессиональный Документы
Культура Документы
net/publication/275517138
CITATIONS READS
4 433
4 authors:
Some of the authors of this publication are also working on these related projects:
Quantum Inspired Metaheuristics for Data Optimization and Analytics View project
[Elsevier] Intelligent Environmental Data Analysis and Pollution Management View project
All content following this page was uploaded by Sourabh Chandra on 05 August 2015.
Abstract In the present day to day life, due to the inconvenience of travelling from
place to place, information/messages are sent through the internet. As a result it
faces a lot of obstacles. The internet security techniques consist of various provi-
sions and policies, which are adopted by the network administrator so as to prevent
and monitor the unauthorized access, modification, misuse or denial of any network
and its assets. In this paper, a new symmetric key cryptography algorithm has been
developed, based on the principles of data structure and binary-gray conversion
techniques. It has also implemented n-bit circular shift operation along with the
folding logic. The technique is highly efficient to meet the necessary shortcomings
for time and space. As a result, it provides more security against various attacks like
the Man in the Middle attacks and Brute Force attack, etc.
Keywords Cryptography
Symmetric key cryptography
Asymmetric key
cryptography Bitwise left and right circular shift Linked list Man in the middle
attacks Brute force attack Cipher text Plain text Encryption Decryption
1 Introduction
Cryptography is the art of camouflaging the plain text into the ciphered text through
some medium specially known as the ‘key’. Using the key and a series of logical
techniques, the data, over the channel, is ciphered. The resulting crypto text is
transferred through the channel and is received by the receiver. The receiver uses
the same key or a separate key to decrypt the encrypted text file. A large key, if
ciphered plays a vital role in securing the entire cryptographic system [1]. Based on
Fig. 1
the key distribution, cryptography has two base types, namely, Symmetric key
cryptography and Asymmetric key cryptography, as shown in Fig. 1.
Symmetric key Cryptography uses identical keys for both encryption and
decryption algorithms. As a result, it is also termed as secret key, single key, private
key and shared key [2]. It follows a series of substitution algorithms and is based on
permutation of symbols [3]. Asymmetric key cryptography uses two keys namely a
private key and a public key for encryption and decryption processes respectively.
The keys can be interchangeable i.e. if a key A encrypts the message, the key B will
decrypt it, and if the key B encrypts the message then the key A will decrypt it [4].
However, it is not essential. The symmetric key encryption technique is more
efficient than the Asymmetric counterpart in the sense that it can process large data
very swiftly [5]. It is also less intensive than the Asymmetric key algorithms.
However, the transfer of the secret key is prone to various attacks and needs higher
level of trust during the choosing, processing, distributing and storing of the key
[6]. As the Asymmetric key cryptography uses two separate keys, it is not vul-
nerable to such attacks [7]. The diagrammatic illustration is shown in Fig. 2.
The Asymmetric key cryptography has a major drawback. It is slower than the
Symmetric key cryptography algorithm [8, 9]. The Symmetric key cryptosystem, on
the other hand, is simpler [10] and requires less processing power than the
Asymmetric key cryptography algorithm. The secret key can only be used by the
authorized persons [11]. Such type of cryptography uses password authentication
logic to prove the identity of the receiver. Although the distribution and
Fig. 2
Symmetric Key Encryption Through Data Structure … 3
management of keys is difficult [12] yet it is the most commonly used, highly
reliable algorithm and requires less space compared to the Asymmetric key cryp-
tography [13, 14]. The Symmetric key cryptography is easier to understand and has
a wide range of applications like e-commerce transactions, etc.
2 Problem Statement
Here in this section, the newly proposed algorithm has been applied on a text file.
Four different logics have been implemented in this algorithm. These include the
basic binary-gray conversion technique, alternatively for each word, principle of
data structure, n-bit circular shift operation and the folding logic. A linked list has
been created which contains two information parts. One will contain the ASCII
value of the preceding character and the other will contain the position of the
succeeding character of space respectively. The list has been further ciphered by
performing pair wise swapping of the position information part. This list is then
used as the shared link. This in turn increases the integrity and authenticity of the
ciphered message. Accordingly, a small illustration based on C has been developed
and executed in the next section.
3 Underlying Algorithm
Let us consider, Bob, the sender wants to send some message to Alice, through a
text file. He writes the message “Hi Alice! Meet me at 1D/73 Shopper’s Lane.” In a
text file, named as “test1.txt” and sends it to Alice.
3.1 Input
Convert the ASCII value of the preceding character of space into its corresponding
7-bit binary form. Apply 1-bit left shift operation on the binary pattern and convert
the result into its corresponding decimal form. Fold the decimal value into a single
4 S. Paira et al.
Table 1 Encryption of the characters (other than space) using binary–gray conversion
alternatively
Character ASCII 7-bit After After gray to ASCII Respective
fetched value binary/gray binary binary value ciphered
form to gray conversion character
conversion
H 72 1001000 1101100 108 l
i 105 1101001 1011101 93 ]
A 65 1000001 1111110 126 *
l 108 1101100 1001000 72 H
i 105 1101001 1001110 78 N
c 99 1100011 1000010 66 B
e 101 1100101 1000110 70 F
! 33 0100001 0111110 62 >
M 77 1001101 1101011 107 k
e 101 1100101 1010111 87 W
e 101 1100101 1010111 87 W
t 116 1110100 1001110 78 N
m 109 1101101 1001001 73 I
e 101 1100101 1000110 70 F
a 97 1100001 1010001 81 Q
t 116 1110100 1001110 78 N
1 49 0110001 0100001 33 !
D 68 1000100 1111000 120 x
/ 47 0101111 0110101 53 5
7 55 0110111 0100101 37 %
3 51 0110011 0100010 34 “
S 83 1010011 1111010 122 z
h 104 1101000 1011100 92 \
o 111 1101111 1011000 88 X
p 112 1110000 1001000 72 H
p 112 1110000 1001000 72 H
e 101 1100101 1010111 87 W
r 114 1110010 1001011 75 K
‘ 39 0100111 0110100 52 4
s 115 1110011 1001010 74 J
L 76 1001100 1110111 119 w
a 97 1100001 1000001 65 A
n 110 1101110 1001011 75 K
e 101 1100101 1000110 70 F
. 46 0101110 0110100 52 4
Symmetric Key Encryption Through Data Structure … 5
digit and add it to 32. Encode the space with the resultant single digit as shown in
Table 2.
l]”*HNBF>#kWWN&IF#QN&!x5%”#z\XHHWK4J$wAKF4
The above encrypted file “test2.txt” is sent to Bob along with the ciphered key.
The key here is a linked list, which contains the ASCII value of the preceding
characters of the spaces in the original text file. The list also contains the positions
of the succeeding characters of the spaces. The list has been further ciphered by
performing pair wise swapping of the positions. This ciphered key is passed as the
shared link to the receiver over the insecure communication channel.
Fig. 3
6 S. Paira et al.
Fig. 4
The original file and executed message before encryption (message at sender’s end)
is shown in Figs. 5 and 6 respectively.
The executed message and file after encryption (message being transmitted
through the channel) is shown in Figs. 7 and 8 respectively.
The executed message and file after decryption (message at receiver’s end) is
shown in Figs. 9 and 10 respectively.
Symmetric Key Encryption Through Data Structure … 7
Table 3 Decryption of characters, which are not in space positions of the original text file
Character ASCII 7-bit After After gray ASCII Respective
fetched value binary/gray binary to to binary value decrypted
form gray conversion character
conversion
l 108 1101100 1001000 72 H
] 93 1011101 1101001 105 i
* 126 1111110 1000001 65 A
H 72 1001000 1101100 108 l
N 78 1001110 1101001 105 i
B 66 1000010 1100011 99 c
F 70 1000110 1100101 101 e
> 62 0111110 0100001 33 !
k 107 1101011 1001101 77 M
W 87 1010111 1100101 101 e
W 87 1010111 1100101 101 e
N 78 1001110 1110100 116 t
I 73 1001001 1101101 109 m
F 70 1000110 1100101 101 e
Q 81 1010001 1100001 97 a
N 78 1001110 1110100 116 t
! 33 0100001 0110001 49 1
x 120 1111000 1000100 68 D
5 53 0110101 0101111 47 /
% 37 0100101 0110111 55 7
“ 34 0100010 0110011 51 3
z 122 1111010 1010011 83 S
\ 92 1011100 1101000 104 h
X 88 1011000 1101111 111 o
H 72 1001000 1110000 112 p
H 72 1001000 1110000 112 p
W 87 1010111 1100101 101 e
K 75 1001011 1110010 114 r
4 52 0110100 0100111 39 ‘
J 74 1001010 1110011 115 s
w 119 1110111 1001100 76 L
A 65 1000001 1100001 97 a
K 75 1001011 1101110 110 n
F 70 1000110 1100101 101 e
4 52 0110100 0101110 46 .
8 S. Paira et al.
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Symmetric Key Encryption Through Data Structure … 9
Fig. 10
5 Conclusion
Data transfer through a highly interactive networked channel, suffers from various
attacks. Security needs and its application has percolated into different areas of
computer network and communication. Cryptography is one such approach,
metamorphosed to suit the challenges and needs of today. In this paper, a new
symmetric key cryptography algorithm has been developed. It implements three
different techniques namely the conventional binary-gray/gray-binary conversion
algorithms, the n-bit circular shift operation and the folding logic. Another special
property of this algorithm is the ciphered key in terms of a linked data structure.
This ciphered shared link not only provides confidentiality but also authenticity to
the secret data. The combined effect of three logics provides efficiency to the
algorithm by ensuring protection against various unauthorised accesses.
References
1. Alam, S.S., Bhattacharyya, S., Chandra, S.: A novel image encryption algorithm using
hyper-chaos key sequences, multi step group based binary gray conversion and circular bit
shifting logic. In: IEEE International Conference of Science Engineering and Management
Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0
2. Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw-Hill (2009)
3. www.uobabylon.edu.iq/eprints/paper_1_2264_649.pdf
4. Shyamala, C.K., Harini, N., Dr. Padmanabhan, T.R.: Cryptography and Security, 2nd edn.
Wiley India Pvt. Ltd. (2012)
5. Chandra, S., Bhattacharyya, S., Paira, S., Alam, S.S.: A study and analysis on symmetric
cryptography. In: IEEE International Conference of Science Engineering and Management
Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0
6. Mandal, B., Chandra, S., Alam, Sk.S., Sekhar Patra, S.: A comparative and analytical study on
symmetric key cryptography. In: IEEE International Conference on Electronics,
Communication and Computational Engineering (ICECCE 2014), pp. 131–136
7. Forouzan, B.A.: Cryptography & Network Security, Special Indian Edition. Tata
McGraw-Hill (2007)
8. Surya, E., Diviya, C.: A survey on symmetric key encryption algorithm. Int. J. Comput. Sci.
Commun. Netw. 2(4), 475–477
9. www.ijcaonline.org/journal/number15/pxc387502.pdf
10. Soltani, M.: A New Secure Cryptography Algorithm Based on Symmetric Key Encryption.
J. Basic Appl. Scient. Res. 3(7), 465–472 (2013). ISSN: 2090-4304
11. www.tuxradar.com/practicalphp/17/3/3
12. mrajacse.files.wordpress.com/2012/01/applied-cryptography-2nd-ed-b-schneier.pdf
10 S. Paira et al.
13. Chandra, S., Paira, S., Alam, Sk.S., Sanyal, G.: A comparative survey of symmetric and
asymmetric key cryptography. In: IEEE International Conference on Electronics,
Communication and Computational Engineering (ICECCE 2014), pp. 83–93
14. bookstreet.in/questions/what-is-the-difference-between-symmetric-and-asymmetric-key-
cryptography-5-marks-819