Absolute Data Security Scheme
Absolute Data Security Scheme
Data Security
Ritu Shukla∗ Dinesh Goyal
Rajasthan Technical University, Poornima Institute of Rajasthan Technical University, Poornima Institute of
Engineering & Technology Engineering & Technology
[email protected] [email protected]
[12]. The public key from the pair can be given and shared publicly • Bitwise XOR
without compromising and the private key from the same pair has • Addition Modulo (216 )
to be kept secret by its holder. Any process performed by using • Multiplication Modulo (216 +1)
public key can be undone only by using its corresponding private
key. 2.1 Generation of Sub-Keys
A key of 128-bits is partitioned into 52 sub keys, each of 16-bits.
2 LITERATURE REVIEW Six sub keys, K1 n to K6 n , are used in the nth iteration and four sub
IDEA is a secure symmetric-key cryptographic algorithm. It gener- keys, K47 to K52 , are used in the final transformation [4].
ates a block cipher. It is a block-oriented cryptographic algorithm. These sub-keys are used in the fourteen steps which are repeated
The algorithm is applied on the plain text block of particular size of 8 times in the form of 8-rounds. These steps are comprised of
64-bits and uses key of 128-bits. This extended combination makes operations – modulo addition, modulo multiplication and XOR.
it resistant to the brute force attacks. IDEA is based on a basic func- Below are the fourteen steps which make a complete round [1]:
tion which is comprised of number of steps and these are repeated -
8 times [3]. • P1 & 1st sub-key K1 are multiplied.
The block of 64 bits of plain text is divided into 4 numbers of • P2 & 2nd sub-key K2 are added.
sub-blocks; each sub-block of 16-bits is given as input to the first • P3 & 3rd sub-key K3 are added.
iteration. The result of the first round is given as input to the next • P4 & 4th sub-key K4 are multiplied.
round. After the last iteration i.e. 8th iteration, its result is passed • Results of steps 1 & 3 are Bitwise XOR.
on to the final transformation phase that generates a cipher text • Results of steps 2 & 4 are Bitwise XOR.
block of 64-bits [3]. • Results of step 5 & 5th sub-key K5 are multiplied.
The mathematical operations used in the algorithm are as fol- • Results of steps 6 & 7 are added.
lows: • Results of step 8 & 6th sub-key K6 are multiplied.
Absolute Data Security Scheme: An Advanced Approach towards Data Security ICIMMI 2022, December 23, 24, 2022, Jaipur, India
E1 1 E1 2 E1 3 E1 4 E1 5 E1 6
E2 1 E2 2 E2 3 E2 4 E2 5 E2 6
E3 1 E3 2 E3 3 E3 4 E3 5 E3 6
E4 1 E4 2 E4 3 E4 4 E4 5 E4 6
E5 1 E5 2 E5 3 E5 4 E5 5 E5 6
E6 1 E6 2 E6 3 E6 4 E6 5 E6 6
E7 1 E7 2 E7 3 E7 4 E7 5 E7 6
E8 1 E8 2 E8 3 E8 4 E8 5 E8 6
E9 1 E9 2 E9 3 E9 4
The cipher text obtained by CDEA [1]: ?>?81/2&???>- M2 will be compared, if both the strings match completely, then
?{ÙÆ$?SKaÞ?v?hWÑdm?V?Þ¦u¸1 V?Þ¦u¸1 lAF ×.¦?å only the text generated will be displayed at the receiver’s end.
MD5 applied on this file and generated a md5 string code (m1)
of 32 byte 4.2 Cipher Text
i.e. 831f85c91b87ea4ae86d545f2d72395f “?>?81⁄2&???>-?{ÙÆ$?SKaÞ?v?hWÑdm?V?Þ¦u¸1 V?Þ¦u¸1 lAF×.¦?å”
This encrypted file will be transferred to another end with the
help of network along with 32 byte MD5 code. The original message after decryption
On the other end, first cipher text is decrypted using the same “hello world this is new in computer Science”
algorithm and the text obtained must be the desired one which is
original. In the decryption process, the same algorithm will be used, 5 CONCLUSION
the key will be same but its matrix will be changed. After this, MD5
The algorithm discussed above is capable to work for 4 numbers of
will be applied on the text, let it be M2 is generated. Now, M1 and
rounds.
Absolute Data Security Scheme: An Advanced Approach towards Data Security ICIMMI 2022, December 23, 24, 2022, Jaipur, India
Message Digest for Encryption and authentication of data respec- [5] Anoop MS Public key cryptography – Applications Algorithms and Mathematical
tively. In future, the message digest algorithm used here is MD5, Explanations. India: Tata Elxsi. http://www.dkrypy.com/home/pkcs.
[6] Research Paper- A simplified IDEA Algorithm by Nick Hoffman.
in future researchers can also use SHA-1 or SHA-512 which will [7] Rajat Goel, Ripu R. Sinha, O.P. Rishi “Novel data Encryption Algorithm”, IJCSI,
give a Message digest of bigger length & thus CRC checksum will ISSN: 1694-0814, Pg.561 to 565.
[8] Harivans Pratap Singh, Shweta Verma, Shailendra Mishra, “Secure- International
be better. The work proposed above is for text files, researchers Data Encryption Algorithm”, IJAREEIE, ISSN: 2320-3765, Pg.780 to 791.
can attempt the same for other data formats like images, audio [9] Sandipan Basu- IDEA-a typical illustration, JGRCS, ISSN-2229-37IX, Volume 2, 7.
or video or any other binary files. Researcher can also work for [10] Pontjho M. Mokhonoana, Martin S. Olivier- “APPLICATION OF MESSAGE DI-
GESTS FOR THE VERIFICATION OF LOGICAL FORENSIC DATA”.
optimization of the proposed technique for better utilization in real [11] L. Agilandeeswari, K. Brindha, Stiffy Sunny, K. Muralibabu- “An novel architec-
time applications. ture for information hiding using HMAC-MD5, International Journal of Engi-
neering and Technology”, 2 (2) 134-139.
[12] Kamaldeep Sharma, Ashish Kumar – “Study and Performance Analysis of IDEA”,
REFERENCES Vol.2, Issue 5, May, ISSN: 2277 128X.
[1] Ritu Shukla “Customized Data Encryption Algorithm” International Journal [13] Chang H.S.,” International Data Encryption Algorithm” CS-627-1 fall.
of Scientific & Engineering Research, Volume 5, Issue 9, September 192ISSN [14] X.Lai and James L. Massey, “A proposal for A New Block Encryption Standard”
2229-5518 Advances in Cryptology EUROCRYPTO’90, Springer-Verlag Berli.
[2] William Stallings, “Cryptography and Network Security”, ISBN 81-317-0366-5, [15] Shannon, Claude, Communication Theory of Secrecy Systems, Bell Systems
Pearson Education, Second Edition, pgs. 29-31, 42-94, 121-144,253-297. Technical Journal 28(4):656-715.
[3] R.Rivest, A.Shamir and L.Adleman, “A Method for Obtaining Digital signatures [16] Mao-Ying Wang, Chih- Pin Su, Department of Electrical Engineering, National
and- Public-key Cryptosystems”, Communications of the ACM, 21 (2), pgs 120- Tsing Hua University, Taiwan-30013.
126. [17] L. Agilandeeswari, K. Brindha, Stiffy Sunny, K. Murali babu, “An Novel Architec-
[4] Atul Kahate, “Cryptography and Network security”, ISBN-10:0-07-064823-9, ture for Information Hiding using HMAC- MD5”
TATA McGraw-Hill Publishing Company Limited, India, Second Edition, pgs [18] Blum M. and Goldwasser S., “An efficient probabilistic public-key encryption
38-62, 152-165, 205-240. scheme which hides all partia information,” Advances in Cryptology-CRYPTO’84,
Lecture notes in computer science (Springer-Verlag), pp.289-299.