Data Security Using Armstrong Numbers 1
Data Security Using Armstrong Numbers 1
Data Security Using Armstrong Numbers 1
80
Data Security Using Armstrong Numbers
S.Belose, M.Malekar, S.Dhamal
, G.Dharmawat & N.J.Kulkarni
Department of Computer, Dnyanganga College of Engineering and Research; Pune, Maharashtra, India
E-mail : [email protected], [email protected], [email protected],
[email protected], [email protected]
Abstract - In the real world, it is difficult to transmit data from one place to another with security. To ensure secured data
transmission, universal technique called cryptography is used, which provides confidentiality of the transmitted data. In this paper
Encryption and decryption process uses Armstrong number which is referred as a secret key. To make the Authentication between
two intended users along with the security, server is used. With the help of server, both sender and receiver will get validated. Then
actual data could be transmitted by any of the means.
KeywordsArmstrong numbers, data security, authentication, cryptography
I. INTRODUCTION
Now days, to make secure data transmission
different methods are used. One of the techniques is
Cryptography, in this encryption and decryption process
is used to hide simple data from unauthorized users by
converting it into unreadable form and again retrieve it
in original form.
In existing system Security Using Colors and
Armstrong Numbers[1] the first step is to assign a
unique color for each receiver. Each color is represented
with a set of Three values. For example violet red color
is represented in RGB format as (238, 58,140). The next
step is to assign a set of three key values to each
receiver.
Fig 1: Data at Sender and Receiver ends.
The sender is aware of the required receiver to
whom the data has to be sent. So the receivers unique
color is used as the password. The set of three key
values are added to the original color values and
encrypted at the senders side. This encrypted color
actually acts as a password. The actual data is encrypted
using Armstrong numbers.
At the receivers side, the receiver is aware of his
own color and other key values. The encrypted color
from the sender is decrypted by subtracting the key
values from the received set of color values. It is then
tested for a match with the color stored at the senders
database. Only when the colors are matched the actual
data can be decrypted using Armstrong numbers. Usage
of colors as a password in this way ensures more
security to the data providing authentication. This is
because only when the colors at the sender and
receivers side match with each other the actual data
could be accessed.
In this paper, Encryption and Decryption process
applies to both data as well as its key. So that two way
security is provided to the application. After successful
authentication, data is encrypted by random Armstrong
number and at the same time that Armstrong number is
get encrypted. Now for both these encrypted data and
key current system timestamp is attached. So whenever
receiver gets both the data he can easily recognize which
key is for which data. Then encrypted key is decrypted
by senders public key and that resulted Armstrong
number is used to decrypt actual data.
Data Security Using Armstrong Numbers
Undergraduate Academic Research J ournal (UARJ ), ISSN : 2278 1129, Volume-1, Issue-1, 2012
81
UARJ ), ISSN : 2
82
Step 6: A
get
The encr
54262,
28534, 2
The
the given
Afte
into byte
2] Decry
Decrypt
original
Step 1:(D
The inve
Step 2: M
data
Step 3:
below:
789, 97,
27581, 2
Step 4: S
numbers
789 97
+720 19
69 78
Numbers
2278 1129, V
After multiplyi
C=5426
4886
2725
2444
2707
2448
rypted data is..
56951, 48860
24482
e above values
n message.
er storing this d
e array format
-10, 119, -
94.
yption:
tion involves th
data using dec
Decryption of t
erse of the enco
D = -1
4336
-216
Multiply the de
(C*D
Now transform
103, -53830, -
28400, 26872.
Subtract with th
s as follows:
103 -53830 -56
36 360
67 -54190 -5
Volume-1, Issu
ing the two ma
62 5
60
56 2
45
75 2
82
..
, 27256, 284
represent the e
data into file it
as below:
-36, 120, 79,
he process of g
cryption key.
the original da
oding matrix is
1 1
63 -43508 -
682 21755 2
ecoding matrix
D)
m the above res
-56733, -53405
he digits of the
6733 -53405 275
10 19 36
56743 -53424 27
ue-1, 2012
atrices (B * A)
56951
28495
28534
495, 24445, 2
encrypted form
t will be conver
125, -61, 118
getting back the
ata begins here)
s:
1
43216
21608
x with the encry
sult as given
5,
e Armstrong
581 28400 2687
61 9 1
7220 28391 268
we
27075,
m of
rted
8, -
e
)
ypted
72
17
855
Data Security Using Armstrong Numbers
Undergraduate Academic Research J ournal (UARJ ), ISSN : 2278 1129, Volume-1, Issue-1, 2012
83