Conference Proceeding

Mathematics in Space and Applied Sciences (ICMSAS-2023)
ICMSAS-2023

Subject Area: Mathematics
Pages: 331
Published On: 03-Mar-2023
Online Since: 04-Mar-2023

 Read More >>

Author(s): Satish Garg

Email(s): sat.phy@gmail.com

Address: Dr Satish Garg
Govt. College for Girls Palwal (Kurukshetra) - 136131
*Corresponding Author

Published In:   Conference Proceeding, Mathematics in Space and Applied Sciences (ICMSAS-2023)

Year of Publication:  March, 2023

Online since:  March 04, 2023

DOI:




Data Security using Multi-Level Encryption

 

Dr Satish Garg

Govt. College for Girls Palwal (Kurukshetra) - 136131

*Corresponding Author E-mail: sat.phy@gmail.com

 

ABSTRACT:

In the present paper the authors have suggested a unique symmetric key cryptographic technique where three modern cipher, namely transposition cipher, rotation cipher and XOR ciphers have been used. The cipher text thus obtained is hard to crack because a teraflop super computer may need upto 3400 Years to find all possible permutations even for a plain text consisting of 10 characters.

 

KEYWORDS: Encryption, Decryption, Transposition Cipher, Rotation Cipher, XOR Cipher

 

1. INTRODUCTION

With the swift development in communication technology and success of internet, it has become a reality to send any data around the globe in a fraction of second. But the security of data is very important and challenging issue in communications because there is always some risk that an intruder may intercept our data. So it is not safe to send confidential data from one node to another (a node may be a computer or a person). The confidential data may be bank statements, bank deals, military information, confidential data of companies, our passwords etc. Hence the data should be protected from the intruder otherwise any massive disaster may happen all-on-a-sudden, which may be called as e- disaster[1,2]. In order to make safe and sound the system one should consider the security primary attributes such as confidentiality, integrity and availability, and secondary attributes such as authenticity, non-repudiation and accountability etc. There are a large number of techniques to achieve security goals, one of these is Cryptography. “Cryptography is the study of secret (crypto-) writing (-graphy) that is hiding the content of the message from the intruder so that the intruder may not be able to recover the original message” [3- 4]. “The cryptographic algorithm can be divided into two categories: (i) Symmetric Key Cryptography where a single key is used for both encryption and decryption purpose. (ii) Public Key Cryptography where two different keys are used - one for encryption and the other for decryption purpose”[3,4]. In the present paper the authors have introduced a unique symmetric key cryptographic technique where three modern cipher, namely transposition, rotation and XOR ciphers have been used.

 

In the proposed algorithm SKG 3.31 following steps are involved :

(i)                  Firstly, all the characters are converted in binary form using 8 bit ASCII Code

(ii)               Secondly, Transposition Cipher is used, where position of the bits obtained at step (i) are interchanged

(iii)            Rotation Cipher is applied, where position of the bits obtained at step (ii) are shifted towards Left or vice versa

(iv)            Thirdly, the bits obtained at step (iii) are superimposed on a continuous binary pulse in digital form using XOR Operation, which is reversible operation.

(v)               Finally, 8-bit ASCII Code is used to convert the bits obtained at step (iv) into corresponding characters and thus we get encrypted cipher text

 

II. ENCRYPTION ALGORITHM SKG 3.31:

1.         Read the input string of characters and Check the number of characters, N

2.         If N<10, then write Program is Not Applicable

3.         Convert characters into Binary Form using ASCII (8 bit) Code, we get 8N Bits

4.         If (8N+1)/N1 = 0, Transpose Integral Multiples of LMB with corresponding RMB upto 4N Bits otherwise proceed upto 8N Bits

5.         Rotate the string of bits in circular queue towards Left/Right by N2 places

6.         Generate a binary string of consecutive 0’s & 1’s such that number of consecutive 0 & 1 are from 1 to 7 and length of this binary string is 8 N

7.         Modulate string obtained at Step 5 on that obtained at Step 6 using XOR operation

8.         Convert binary string obtained at Step 7 into characters using ASCII (8 bit) Code, we get N Characters

9.         Output is Encrypted String i.e., Cipher Text

 

III. EXPLANATION OF ALGORITHM SKG 3.31 :

I.     All the steps mentioned in algorithm SKG 3.31 are explained below :

Step 1 : Step 1 requires to take input from any media in the form of characters and then it checks numbers of characters in that input which is denoted by N

Step 2 : This step checks the value of N which may be less than, equal to or more than 10, if value of N is less than 10 then this particular algorithm shall not be applicable

Step 3 : At this step, if value of N is not less than 10 then the string of input characters will be converted into binary form using ASCII (8-bit) Code. This conversion shall give 8N bits as output

Step 4 : In step 4, the desired mathematics is performed. If the achieved value is 0, then transposition operation shall stop at middle of binary string i.e., at 4Nth bit otherwise it shall be continue upto 8N bits

Step 5 : At this step, the binary string of 8 N Bits is rotated in circular queue by N1 places towards Left/Right or vice versa

Step 6 : In step 6, a binary string of 8 N Bits of consecutive 0’s & 1’s is generated such that number of consecutive 0’s & 1’s are from 1 to 7

Step 7 : In step 7, binary string obtained at step 5 is superimposed on binary string generated at step 6 using XOR operation Step 8 : The binary string obtained from the last mechanism is converted back into N characters using the same ASCII (8-bit) Code

Step 9 : The last step denotes the encrypted characters as desired output




REFERENCES:

1.     S. K. Garg, “Review of Secured Routing for Wireless Ad hoc Network”, International Journal of Computing and Business Research, 2 (1), 2011

2.     S. K. Garg, “Wireless Network Security Threats”, International Journal of Information Dissemination and Technology, 1(2), 2011

3.     W. Stallings, Cryptography and Network Security : Principles and Practices, 5th Edition 2005

4.     T. Karygiannis and L. Owens, Wireless Communication, National Institute of Standard and Technology, U.S. Department of Computer (2001)

5.     S. K. Garg, “Cryptography Using Controlled NOT Gate : Algorithm SKG 3.00”, International Journal of Electronics Engineering, 6 (1), 20-24, 2014

6.     S. K. Garg, “Modified Encryption and Decryption Using Symmetric Keys at Two Stages : Algorithm SKG 1.2” , International Journal of Advance Research in Computer Science and Software Engineering , 4 (6), 778-780, 2014

7.     S. K. Garg, “Encryption Scheme For Secure Routing Through Internet : Algorithm SKG 2.5”, International Journal of Informative and Futuristic  Research, 2 (2), 285-289, 2014

8.     S. K. Garg, A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”, International Journal Electronics and  Communication Engineering and Technology, 7 (1), 107-114, 2016

9.     S. K. Garg, A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”, IPASJ International Journal of Electronics & Communication, 4(3), 1-5, 2016



Related Images:



Author/Editor Information

Dr. Sanjay Kango

Department of Mathematics, Neta Ji Subhash Chander Bose Memorial, Government Post Graduate College, Hamirpur Himachal Pradesh-177 005, INDIA