Cryptographic Algorithms For Secure Data Communica
Cryptographic Algorithms For Secure Data Communica
net/publication/228564937
CITATIONS READS
11 2,542
3 authors, including:
All content following this page was uploaded by Gregory Msksha Wajiga on 09 September 2014.
Abstract
Personal privacy is of utmost importance in the global networked world. One of the best tools to
help people safeguard their personal information is the use of cryptography. In this paper we
present new cryptographic algorithms that employ the use of asymmetric keys. The proposed
algorithms encipher message into nonlinear equations using public key and decipher by the
intended party using private key. If a third party intercepted the message, it will be difficult to
decipher it due to the multilevel ciphers of the proposed application.
1. INTRODUCTION
Some vital information that are disseminated within an office, across offices, between branches,
of an organization and other external bodies and establishments at times get into the hands of the
unauthorized persons who may tamper with the contents of the information. And if no security
measures are taken, there is no doubt that such data and other sensitive information will be
exposed to threats such as impersonation, insecrecy, corruption, repudiation, break-in or denial of
services [1,2] that may cause serious danger on the individual or organization.
A secure system should maintain the integrity, availability, and privacy of data [3]. Data integrity
usually means protection from unauthorized modification, resistance to penetration and protection
from undetected modification.
Therefore, algorithms which help prevent interception, modification, penetration, disclosure and
enhance data/information security are now of primary importance. This paper suggests new
methods for secured means of communication over unsecure channel. This is to ensuring that the
intruders do not have access to the plaintext without a secret key.
2. PRELIMINARIES
2.1 Cryptography
One way to strengthen security [4,5] in computer systems is to encrypt sensitive records and
messages in transit and in storage. The basic model of a cryptographic system is illustrated in
Figure 1. The original unenciphered text is called the plaintext. The act of converting a plain text
message to its ciphertext form is called enciphering [6]. In its cipher form, a message cannot be
read by anyone but the intended receiver. Reversing that act (i.e., ciphertext form to plain text
message) is deciphering. Enciphering and deciphering are more commonly referred to as
encryption and decryption, respectively.
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 227
Zirra Peter Buba & Gregory Maksha Wajiga
Cryptanalyst
Encryption Decryption
Plaintext Key Key Plaintext
fut hut
yola abc them
iyx cspe
cspe
Receiver
iyx
Ciphertext
cspe
Sender Encryption Insecure Decryption
fut
algorithm Communication Channel Ciphertext algorithm yola
In symmetric key cryptography, the same key is used for both encryption and decryption. In
asymmetric schemes, one key is used for encryption and another is used for decryption [8]. The
increased confidence in the integrity of systems that use encryption is based on the notion that
ciphertext should be very difficult to decipher without knowledge of the key [3].
i. The Caesar Cipher- one of the earliest cryptographic algorithms linked and attributed to Julius
Caesar in the Gallic war for its usage. Julius Caesar used cipher to protect the messages to
his troops by replacing each letter in a message by the third letter further along in the
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 228
Zirra Peter Buba & Gregory Maksha Wajiga
alphabet. ‘abc’ becomes ‘def’ Obviously, this is extremely weak cryptographic algorithm in
today’s.
ii. Data Encryption Standard (DES)- was the first encryption standard to be recommended by
National Institute of Standards and Technology (NIST). DES is (64 bits key size with 64 bits
block size). Since that time, many attacks and methods recorded the weaknesses of DES,
which made it an insecure block cipher.
iii. International Data Encryption Algorithm (IDEA) is a cryptosystem developed by X. Lai and J.
Massey in 1991 to replace the DES standard. It is a symmetric block cipher, operating on 8
bytes at a time, just like DES, but with a key of 128 bits.
iv. Rivest Cipher 4 (RC4) - a cipher invented by Ron Rivest, a proprietary system by RSADSI, is
used in a number of commercial systems like Lotus Notes and secure Netscape.
v. Blowfish is block cipher 64 bits.It takes a variable-length key, ranging from 32 to 448 bits;
default 128 bits. Blowfish is unpatented, license-free, and is available free for all uses.
Blowfish has variants of 14 rounds or less.
vi. Unix Crypt - Many Unix systems come supplied with an encryption system called crypt. This
routine should never be used for encrypting anything because there exist programs on the
net for producing the decrypted text and the key.
vii. Ron Rivest, Adi Shamir, and Leonard Adleman Algorithm (RSA) - a cipher algorithm based on
the concept of a trapdoor function, which is easily calculated, but whose inverse is extremely
difficult to calculate. The RSA algorithm is named after Ron Rivest, Adi Shamir and Len
Adleman, who invented it in 1977. The RSA algorithm can be used for both public key
encryption and digital signatures. Its security is based on the difficulty of factoring large
integers.
viii. Pretty Good Privacy (PGP) - a public key system for encrypting electronic mail using the RSA
public key cipher. It encrypts the message using the IDEA cipher with a randomly generated
key. It then encrypts the key using the recipient’s public key. When the recipient receives the
message, PGP uses his private RSA key to decrypt the IDEA key and then uses that IDEA
key to decrypt the message.
ix. Diffie-Hellman (DH)- is the first published public key cryptographic algorithm which allows two
users to exchange a secret key over an insecure medium without any prior secrets. The
original protocol had two system parameters, p and g. They are both public and may be used
by all the users in a system. The Diffie-Hellman key exchange was vulnerable to a man-in-
the-middle attack, as Diffie-Hellman key exchange does not authenticate the participants.
Parameter p is a prime number and parameter g is an integer less than p, with the following
property: for every number n between 1 and p-1 inclusive, there is a power k of g such that n
= gk mod p, where k is kept secret.
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 229
Zirra Peter Buba & Gregory Maksha Wajiga
2 3 4 5 6 7
0 space 0 @ P ` P
1 ! 1 A Q a q
2 ‘’ 2 B R b r
3 # 3 C S c s
4 $ 4 D T d t
5 % 5 E U e u
6 & 6 F V f v
7 ‘ 7 G W g w
8 ( 8 H X h x
9 ) 9 I Y i y
a * : J Z j z
b + ; K [ k {
c , < L \ l }
d - = M ] m |
e . > N ^ n
f / ? O _ o N
c) The key is typically shared by trusted entities and be kept secret from the unauthorized
users.
d) The variable indexes that represent the compressed characters in Equation (1b) are
further hid in a file using delta encoding principle before transmission to the intended
receiver to further create a state of confusion to the intruders.
e) A copy of the generated decryption key is saved in a file and sends to recipient email or
via any secure communication medium such as telephones Short Message Service (SMS)
on or before the message reaches the intended recipient.
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 230
Zirra Peter Buba & Gregory Maksha Wajiga
Start
Read text
A
Set K =K+1
Is N
K < wordlength?
Print compressedtext
Y
Word1=wordtoken [K]
Stop
Set J=0
A
B
Set J = J + 1
Print index of word
Is Y
J < wordlength?
Word2=wordtoken [J]
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 231
Zirra Peter Buba & Gregory Maksha Wajiga
Y Is N Is
B word2 empty? word1=word2?
Y Y
Append wordtoken[K] to
compressedtext as Is
compresstext += wordtoken[K] word1≠empty?
Y
Append content of word1 to
compressedtext as Compressedword + =
” ”+ word1
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 232
Zirra Peter Buba & Gregory Maksha Wajiga
Start
Read compressed_text
K=1
Is
characters = N
repeated
character?
K=K+1
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 233
Zirra Peter Buba & Gregory Maksha Wajiga
N Is
B K = N? A
Y
Formulate algebraic
expression using the character
index position
x1+x2+…+xN = word_exp
Alg_exp – C = 0
C Num_of_eqn = Num_of_eqn + 1
Get Next Is
Word N Num_of_eqn = N
Y
Print Equation_1, 2, …, N
Stop
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 234
Zirra Peter Buba & Gregory Maksha Wajiga
Illustrative example 1: To encrypt the message “who is promising who” we apply the procedure
in Figure 2 and 3. The result yields the ciphertext in Equation (1b).
(1a)
(1b)
Equation (1b) becomes systems of nonlinear equations to be transmitted to the recipient in place
of the plaintext “who is promising who”
a. Explicit computation of the inversion of Jacobi (i.e. J( )-1) is avoided as this will involve
additional iteration for determining J( )-1
b. Instead we employ the linear system at the next iterate, thus
.
(2)
(3)
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 235
Zirra Peter Buba & Gregory Maksha Wajiga
Solving equations (3) by Gussaian elimination or any other methods convenient yield the
approximate solutions .
(4)
Virtual position 76 66 6c 68 71 6d 71 6c 6b 68 71 68 6b 6b
of characters (
Solution of 1 2 3 1 2 3 1 3 2 1 2 1 3 1
Equations
76 -10 6 68 9 6d 04 -05 -01 -03 09 -09 03 -05
Illustrative example 3: To encrypt the message “Kill all Hippopotamus in the river Mississippi”
we apply the procedure in Figure 2 and 3. The result yields the ciphertext in Equation (5b).
(5a)
(5b)
Equation (5a) becomes the ciphertext to be transmitted to the recipient in place of the plaintext
“Kill all Hippopotamus in the river Mississippi”. The variable solutions of Equation (5b) are further
concealed in a delta encoding file and then send to the intended receiver as shown in Table 3 to
further create confusion to the intruder.
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 236
Zirra Peter Buba & Gregory Maksha Wajiga
4a 67 69 69 5d 69 69 43 67 6a 6a 68 6a 68 73 5d 6b 72 6f 67
69 73 62 5e 71 67 74 5e 71 4a 67 6f 6f 67 6f 6f 67 6a 6a 67
1 2 3 3 4 3 3 5 2 6 6 7 6 7 1 4 2 3 4 2
5 1 6 7 1 2 2 7 1 3 2 4 4 2 4 4 2 6 6 2
4a 1d 02 00 5d 0c 00 43 24 03 00 - 02 - 0b - 0e 07 - 67
02 02 16 03
02 73 - - 71 - 0d - 13 4a 1d 08 00 - 08 00 - 03 00 -
11 04 0a 16 08 08 03
TABLE 3: Delta Encoding File For “Kill all Hippopotamus in the river Mississippi”
As usual, to decipher the message, the receiver, apply procedure in section 3.3 on the ciphertext
in equation (5b) to obtain equation (6).
(6)
(7)
The solution below is obtained as a result of the application of the procedure in section 3.3 on
equation (7),
Finally, to decipher the message in equation (5b), the receiver would further need other secret
keys as stated in section 3.2. Using these keys, the intended receiver can now recover the
encrypted text as shown in the result Table 6.
Illustrative Example 4
If we input the text ”Credit A/c No: 6711645138110 with my VISA debit card No:
123456789101112”, into the Figure 2 we obtain n=10, (the number of expected equations to be
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 237
Zirra Peter Buba & Gregory Maksha Wajiga
formulated whose variables must not exceed the number of the words) and one indexed word that
previously occurred.
Using Figure 3 gives the systems of nonlinear equations of the text “Credit A/c No:
6711645138110 with my VISA debit card 123456789101112” as shown in equation (8)
(8)
Equation (8) becomes the enciphertext to be transmitted to the recipient without the words
appearing against the Equation (8) in place of the plaintext “Credit A/c No: 6711645138110 with
my VISA debit card No: 123456789101112”. As usual, the variable solutions of Equation (8) are
further conceal in a file called delta encoding file before transmitting it to the intended receiver as
shown in Table 4 to enforce protection of the message.
42 70 62 60 64 6e 3a 27 5a 44 6e 38 33 33 2c 2c 33 2e 2e 2c
2b 2f 2c 2c 26 76 64 6e 66 6a 75 51 43 4c 3a 60 62 5a 64 6e
5a 58 70 60 2c 28 2b 2e 2e 33 33 2f 38 2c 26 2c 2c 2c 28
1 2 3 4 5 6 7 8 9 a 1 2 3 4 5 5 3 6 7 5
8 9 5 5 a 1 5 6 2 3 4 5 6 7 7 4 3 8 5 6
9 9 2 4 5 a 8 6 7 3 4 9 1 5 a 5 5 5 a
42 2e - - 04 0a 3a - 33 44 2a - 33 00 - 00 07 - 00 -
0e 02 13 36 07 05 02
- 04 - 00 - 76 - 0a - 6a 0b 51 - 09 - 60 02 - 0a 0a
01 03 06 12 08 0e 12 08
5a - 18 - 2c - 03 03 00 05 00 - 09 - - 06 00 00 -
02 10 04 04 0c 06 04
TABLE 4: Delta Encoding: Credit A/c No: 6711645138110 with my VISA debitcard 123456789101112
(9)
Similarly, equations (9), can be solve by applying the procedure in section 3.3 to obtain the
following approximate solutions:
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 238
Zirra Peter Buba & Gregory Maksha Wajiga
To decrypt the message in Equation (8), the receiver would further need other secret keys as
stated in section 3.2. Using these keys, the intended receiver can now recover the encrypted text
as shown in the result Table 7.
4. RESULTS
Table 5 shows the result of the deciphered text from the enciphered text (Equation (1b)) obtained
from the proposed algorithms.
1 77 = w
68 = h
6f = o
2 69 = i
73 = s
3 70 = p
72 = r
6f = o
6d = m
69 = i
73 = s
69 = i
6e = n
67 = g
4 77 = w
68 = h
6f = o
Table 6 shows the result of the deciphered text from the enciphered text (Equation (5b))
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 239
Zirra Peter Buba & Gregory Maksha Wajiga
1 4b= K
69 = i
6c = l
6c =l
2 61= a
6c = l
6c = l
⋮ ⋮
7 4d = M
69 = i
73 = s
73 = s
69 = i
73 = s
73 = s
69 = i
70 = p
+00 70 = p
+00-03 69 = i
TABLE 6: Plaintext Recovery for “Kill all Hippopotamus in the river Mississippi”
Table 7 shows the result of the deciphered text from the enciphered text (Equation (8))
Position From
of Word , where = variable solution Table 1
(R.C)
1 43 = C
72 = r
65 = e
64 = d
69 = i
74 = t
2
41 = A
2f = /
63 = c
3 4e = N
6f = o
3a = :
10 31 = 1
32 = 2
33 = 3
34 = 4
35 = 5
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 240
Zirra Peter Buba & Gregory Maksha Wajiga
36 = 6
37 = 7
38 = 8
39 = 9
31 = 1
30 = 0
31 = 1
31 = 1
31 = 1
32 = 2
TABLE 7: Plaintext Recovery: Credit A/c No: 6711645138110 with my VISA debit card No:
123456789101112
In decompression, the characters are written as they appeared coupled with spaces between
them and where there is an index value in place of new character, the index is interpreted and
written in the place they appeared. Each time a word is written, a space is allowed between them.
4. DISCUSSION
Examination of Tables 5, 6 and 7, showed that simple attack identified by [9] to find the decryption
key by the cryptanalyst requires solving the systems of nonlinear equations in equations (1b), (5b)
and (8), obtaining the values associated with the variable index in Tables 2, 3 and 4, the
formula , and the lookup character position in table 1. This is notoriously difficult
to obtain due to their high mathematical formulation. A good encryption algorithm should be
designed so that, when used with sufficiently long keys, it becomes computationally infeasible to
break as reported [12,13]. This is in accordance with another related literature that revealed that
the strength of an encryption algorithm relied on the mathematical soundness of the algorithm [3].
It is also in agreement with an earlier study by [8] who revealed that resources required for
revealing a secret message should be strong and complex enough through a hiding key. This
study is designed on similar encryption techniques that use sufficiently long keys.
The study also indicated that one key is used to encipher plaintext into ciphertext and another
different key to decipher that ciphertext into plaintext as depicted in Tables 5, 6, and 7 [14,15,16].
The proposed scheme avoids the problem of sharing keys associated with the symmetric
cryptography [16,17] that there is less risk associated with a public key than the symmetric key
and the security based on that key is not compromised [18]. This study is designed on similar
encryption techniques that use asymmetric key.
The study showed that, the decipher keys were transmitted to the intended receiver secretly
through a different medium such as email, short message service or fax machine to the receiver
before the receiver can have access to the plaintext. On the basis of this results, it is evident that
unauthorized user will find it difficult to decrypt the message without the knowledge of the secret
keys [3], since they were not transmitted together with the ciphered message. The strength of an
encryption scheme is relies on the secrecy of the key [12]. This placed another level of security
on the data in store or transit.
From the results of the study it is clear that there is confidentiality, non- repudiation and integrity
of our sensitive and classified information over the Internet from the hands of Internet terrorist as
highlighted by [2] and [16]. This is due to the robustness design of the proposed algorithms.
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 241
Zirra Peter Buba & Gregory Maksha Wajiga
5. CONCLUSION
This paper has practically demonstrated how people can secure their vital and sensitive
information stored or transmitted via insecure communication channels from cryptanalysts by
using strong encryption and decryption keys. The proposed algorithm has proven to withstand
any type of the attack.
7. REFERENCES
[1] B. Figg. (2004). Cryptography and Network Security. Internet:
http:/www.homepages.dsu.edu/figgw/Cryptography%20&%20Network%2 0Security.ppt.
[March 16, 2010].
[2] A. Kahate, Cryptography and Network Security (2nd ed.). New Delhi: Tata McGraw Hill,
2008.
[3] M. Milenkovic. Operating System: Concepts and Design, New York: McGrew-Hill, Inc.,
1992.
[5] W. Stallings. Cryptography and Network Security (4th ed.). Englewood (NJ):Prentice Hall,
1995.
[6] V. Potdar and E. Chang. “Disguising Text Cryptography Using Image Cryptography,”
International Network Conference, United Kingdom: Plymouth, 2004.
[7] S.A.M. Diaa, M.A.K. Hatem, and M.H. Mohiy (2010). “Evaluating The Performance of
Symmetric Encryption Algorithms” International Journal of Network Security, 2010,
10(3), pp.213-219
[9] K.M. Alallayah, W.F.M. Abd El-Wahed, and A.H. Alhamani.“Attack Of Against Simplified
Data Encryption Standard Cipher System Using Neural Networks”.
Journal of Computer Science,2010, 6(1), pp. 29-35.
[10] D. Rudolf. “Development and Analysis of Block Cipher and DES System”. Internet:
http://www.cs.usask..ca/~dtr467/400/, 2000, [April 24, 2009]
[11] H. Wang. (2002). Security Architecture for The Teamdee System. An unpublished MSc
Thesis submitted to Polytechnic Institution and State University, Virginia, USA.
[13] T. Jakobsen and L.R. Knudsen. (2001). Attack on Block of Ciphers of Low Algebraic
Degree. Journal of Cryptography, New York, 14(3), pp.197-210.
[14] N. Su, R.N. Zobel, and F.O. Iwu. “Simulation in Cryptographic Protocol Design and
Analysis.” Proceedings 15th European Simulation Symposium, University of Manchester,
UK., 2003.
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 242
Zirra Peter Buba & Gregory Maksha Wajiga
[15] C.K. Laudan, and C.G. Traver. E-Commerce .Business .Technology .Society (2nd ed.).
New York: Pearson Education, Inc., 2004.
[17] M.A. Yusuf. Data Security: Layered Approach Algorithm. An unpublished MSc Thesis
submitted to Abubakar Tafawa Balewa University, Bauchi, Nigeria, 2007.
[18] J. Talbot and D. Welsh. Complexity and Cryptography: An Introduction. New York:
Cambridge University Press, 2006
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (2) : 2011 243