Data Security Using Armstrong Numbers 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Undergraduate Academic Research J ournal (UARJ ), ISSN : 2278 1129, Volume-1, Issue-1, 2012

80


Data Security Using Armstrong Numbers



S.Belose, M.Malekar, S.Dhamal

, G.Dharmawat & N.J.Kulkarni
Department of Computer, Dnyanganga College of Engineering and Research; Pune, Maharashtra, India
E-mail : [email protected], [email protected], [email protected],
[email protected], [email protected]

Abstract - In the real world, it is difficult to transmit data from one place to another with security. To ensure secured data
transmission, universal technique called cryptography is used, which provides confidentiality of the transmitted data. In this paper
Encryption and decryption process uses Armstrong number which is referred as a secret key. To make the Authentication between
two intended users along with the security, server is used. With the help of server, both sender and receiver will get validated. Then
actual data could be transmitted by any of the means.
KeywordsArmstrong numbers, data security, authentication, cryptography

I. INTRODUCTION
Now days, to make secure data transmission
different methods are used. One of the techniques is
Cryptography, in this encryption and decryption process
is used to hide simple data from unauthorized users by
converting it into unreadable form and again retrieve it
in original form.
In existing system Security Using Colors and
Armstrong Numbers[1] the first step is to assign a
unique color for each receiver. Each color is represented
with a set of Three values. For example violet red color
is represented in RGB format as (238, 58,140). The next
step is to assign a set of three key values to each
receiver.

Fig 1: Data at Sender and Receiver ends.
The sender is aware of the required receiver to
whom the data has to be sent. So the receivers unique
color is used as the password. The set of three key
values are added to the original color values and
encrypted at the senders side. This encrypted color
actually acts as a password. The actual data is encrypted
using Armstrong numbers.
At the receivers side, the receiver is aware of his
own color and other key values. The encrypted color
from the sender is decrypted by subtracting the key
values from the received set of color values. It is then
tested for a match with the color stored at the senders
database. Only when the colors are matched the actual
data can be decrypted using Armstrong numbers. Usage
of colors as a password in this way ensures more
security to the data providing authentication. This is
because only when the colors at the sender and
receivers side match with each other the actual data
could be accessed.
In this paper, Encryption and Decryption process
applies to both data as well as its key. So that two way
security is provided to the application. After successful
authentication, data is encrypted by random Armstrong
number and at the same time that Armstrong number is
get encrypted. Now for both these encrypted data and
key current system timestamp is attached. So whenever
receiver gets both the data he can easily recognize which
key is for which data. Then encrypted key is decrypted
by senders public key and that resulted Armstrong
number is used to decrypt actual data.
Data Security Using Armstrong Numbers

Undergraduate Academic Research J ournal (UARJ ), ISSN : 2278 1129, Volume-1, Issue-1, 2012
81

Here encrypted key is send to receiver through


server and data is sent by any ways like Bluetooth, mail
system etc.
So it is difficult to hack the data and steal it. Once
hacker steals the data, then he must have key by which
that data is encrypted with its same timestamp. If
hackers get both data and key then he must know the
decryption algorithm to retrieve both key and data
which is very difficult.
II. CRYPTOGRAPHY
Cryptography, to most people, is concerned with
keeping communications private. Encryption is the
transformation of data into some unreadable form. Its
purpose is to ensure privacy by keeping the information
hidden from anyone for whom it is not intended.
Decryption is the reverse of encryption; it is the
transformation of encrypted data back into some
intelligible form. Encryption and decryption require the
use of some secret information, usually referred to as a
key. The data to be encrypted is called as plain text. The
encrypted data obtained as a result of encryption process
is called as cipher text. Depending on the encryption
mechanism used, the same key might be used for both
encryption and decryption, while for other mechanisms,
the keys used for encryption and decryption might be
different.
A. Types of Cryptographic Algorithms
There are several ways of classifying cryptographic
algorithms. In general they are categorized based on the
number of keys that are employed for encryption and
decryption, and further defined by their application and
use as in [1]. The three types of algorithms are depicted
as follows
1) Secret Key Cryptography (SKC): Uses a single key
for both encryption and decryption. The most common
algorithms in use include Data Encryption Standard
(DES), Advanced Encryption Standard (AES).
2) Public Key Cryptography (PKC): Uses one key for
encryption and another for decryption. RSA (Rivest,
Shamir, Adleman) algorithm is an example.
3) Hash Functions: Uses a mathematical transformation
to Irreversibly "encrypt" information. MD (Message
Digest)
Algorithm is an example.
III. SERVER ARCHITECTURE
A Server is a computer or device on a network that
manages network resources. For example, a file server is
a computer and storage device dedicated to storing files
Any user on the network can store files on the server.
Servers are often dedicated, meaning that they
perform no other tasks besides their server tasks. On
multiprocessing operating systems however, a single
computer can execute several programs at once. A
server in this case could refer to the program that is
managing resources rather than the entire computer.
A. What is Server Platform?
A term often used synonymously with operating
system. A platform is the underlying hardware or
software for a system and is thus the engine that
drives the server.
B. Types of server
1] FTP-Servers
One of the oldest of the Internet services, File
Transfer Protocol makes it possible to move one or
more files securely between computers while
providing file security and organization as well as
transfer control.
2] Mail-Servers
Almost as ubiquitous and crucial as Web servers,
mail servers move and store mail over corporate
networks via LANs and WANs and across the
Internet.
3] Print-server
It is a computer that manages one or more printers
and a network server is a computer that manages
network traffic.
There are so many servers according to requirement
like Audio/video, Chat, Fax, News, Proxy, Web servers
etc.
IV. PROPOSED SYSTEM
A. Introduction
In proposed system instead of keeping sender and
receiver database as color and key value we keep unique
number and name on single common server. Before
sending data authentication is done between sender and
receiver. Then after successful authentication we carry
our encryption process of data and send that data to
receiver. And encryption key as Armstrong number is
send via server to receiver

Fig 2. Server architecture
Und
After getting e
that key using
this key receiv
B. Illustration
1] Encryption:
Step 1 : Take
total digits like
form encoding
After calculati


Step 2: (Encry
Let the messag
find the ASCII

E N C
69 78 67

Step 3: Now a
Armstrong num
E N C
69 78 67
+720 19 36
----------------------
789 97 103
Step 4: Conver

Step 5: Consid

dergraduate Ac
encrypted key f
g senders key,
ver decrypt actu
:
e random Arm
e. (n=1+5+3=9
g matrix as belo
ion Encoding m
720 19
360 10
361 9
yption of the ac
ge to be transm
I equivalent of
R Y P
82 89 80
add these numb
mber Encrypte
R Y P
82 89 8
360 10 1
----------------------
3 442 99 9
rt the above da
A=789 97
442 99
445 -1

der an encoding
B=720 19
360 10
361 9
D
cademic Resear
from server rec
, and get origi
ual encrypted d
mstrong Numbe
9). With the he
ow.

matrix is
9 36
0 19
17
ctual data begi
mitted be ENC
f the above cha
P T Extra
0 84 -25
bers with the di
ed matrix as fol
T Extra
80 84 -25
9 361 9
-----------------------
9 445 -16
ata into a matri
7 103
9 99
16 -8
g matrix...
9 36
0 19
17
Data Security Us
rch J ournal (U
ceiver decrypt
inal key using
data.
er and add its
elp of formula,
ins here)
CRYPT. First
aracters.
a Extra
-25
igits of the
llows:
Extra
-25
17
--------
-8
ix as follows:


sing Armstrong N

UARJ ), ISSN : 2
82
Step 6: A
get


The encr

54262,
28534, 2
The
the given
Afte
into byte

2] Decry
Decrypt
original

Step 1:(D
The inve



Step 2: M
data

Step 3:
below:

789, 97,
27581, 2
Step 4: S
numbers

789 97
+720 19
69 78

Numbers
2278 1129, V
After multiplyi
C=5426
4886
2725
2444
2707
2448
rypted data is..
56951, 48860
24482

e above values
n message.
er storing this d
e array format

-10, 119, -
94.
yption:
tion involves th
data using dec
Decryption of t
erse of the enco
D = -1
4336
-216
Multiply the de
(C*D

Now transform
103, -53830, -
28400, 26872.
Subtract with th
s as follows:
103 -53830 -56
36 360
67 -54190 -5
Volume-1, Issu
ing the two ma
62 5
60
56 2
45
75 2
82
..
, 27256, 284
represent the e
data into file it
as below:
-36, 120, 79,
he process of g
cryption key.
the original da
oding matrix is
1 1
63 -43508 -
682 21755 2
ecoding matrix
D)
m the above res
-56733, -53405
he digits of the
6733 -53405 275
10 19 36
56743 -53424 27
ue-1, 2012
atrices (B * A)
56951
28495
28534
495, 24445, 2
encrypted form
t will be conver
125, -61, 118
getting back the
ata begins here)
s:
1
43216
21608
x with the encry
sult as given
5,
e Armstrong
581 28400 2687
61 9 1
7220 28391 268
we
27075,
m of
rted
8, -
e
)
ypted
72
17
855
Data Security Using Armstrong Numbers

Undergraduate Academic Research J ournal (UARJ ), ISSN : 2278 1129, Volume-1, Issue-1, 2012
83

Step 5: After converting the above data into byte array


format and removing the extra parity bits we will get the
original data.
69 78 67 82 89 80 84
Step 6: Obtain the characters from the above ASCII
equivalent:

E N C R Y P T
69 78 67 82 89 80 84
V. ADVANTAGES
The above technique involves keys with a minimum
key length which reduces the efforts taken to encrypt the
data. The key length can be increased if needed, with
increase in character length. This increases the
complexity thereby providing increased security.
This technique ensures that the data transfer can be
performed with protection since it involves two main
steps. First step is to convert the characters into another
form that means in ASCII values, Second step by adding
with the digits of the Encoding matrix to form the
required encrypted data.

Tracing process becomes difficult with this technique.
This is because data is encrypted by key using
Armstrong number and again this Armstrong number is
encrypted by using As key. So it is more secure.
In this proposed technique encryption algorithm is
to difficult to trace or hack externally.

REFERENCES
[1] Security Using Colors and Armstrong Numbers
by S. Pavithra Deepa, S. Kannimuthu, V.
Keerthika 1,3UG Student, Department of IT, Sri
Krishna College of Engineering and Technology.
[2] Introduction to algorithms" by Cormen,
Leiserson, Rivest and Stein, Ch 28
[3] ALGORITHM ANALYSIS AND
COMPLEXITY CLASSES Rayward-Smith,
chapter 6), (Lewis & Papadimitriou, chapter 6)
[4] Public Key Cryptography Applications
Algorithms and Mathematical Explanations
Anoop MS, Tata Elxsi Ltd, India
[5] http://mathworld.wolfram.com/
UnimodularMatrix.html

You might also like