SlideShare a Scribd company logo
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 68 | P a g e
Implementation of Dynamic Hill Cipher with
Message Digest Concatenation
Encryption Technique in Cloud Computing
*Muskaan Gupta, **Zatin Gupta , ***Ashish Gupta
Abstract— The data security in cloud computing is the core problem. Single security method cannot solve the security problem in
cloud computing. To advance cloud computing measures to ensure security is important. The solution is the data encryption. Before
storing it at virtual location, encrypt the data with keys. User selects the public key to encrypt data and upload the encrypted data to
the cloud. This Paper introduces a strong cryptography algorithm that provides the security of the data in cloud computing. The
proposed algorithm is based on encryption algorithm the hill cipher which was analyzed to be easily breakable if the matrix is known
due to its short key length and does not provide any message integrity. So there is the need to make it more typical for the intruder to
break it. To make data secure we implement a new security system using the strong secured algorithm Dynamic Hill Cipher With
Message Digest Concatenation which ensure message authentication, confidentiality and integrity of the data. Confidentiality provides
protection of transmitted data from passive attacks. The authentication service assures that a communication is authentic. The data
integrity is the assurance that data contain no modification.
Keywords: Cryptography, MD5, Digital signature, Hill cipher technique, Plain texts, Cipher text, ID.
——————————  ——————————
1 INTRODUCTION
loud computing, a rapidly developing information
technology, has aroused the concern of the whole
world. Cloud computing is Internet-based computing,
whereby shared resources, software and information, are
provided to computers and devices on-demand [3]. Cloud
computing is the product of the fusion of traditional
computing technology and network technology like grid
computing, distributed computing, parallel computing and
so on. However, there still exist many problems in cloud
computing today, a recent survey shows that data security
and privacy risks have become the primary concern for
people to shift to cloud computing. To advance cloud
computing, measures to ensure security is important.
Traditionally information security was provided by physical
(for e.g. rugged filing cabinets with locks) and
administrative mechanisms (for e.g. Personnel screening
procedures during hiring process).Growing computer use
implies a need for automated tools for protecting files and
other information stored on it. This is especially the case for
a shared system, such as a time-sharing system, and even
more so for systems that can be accessed over a public
telephone network, data network, or the Internet.
Information security requirements have changed in recent
times. Computer use requires automated tools to protect
files and other stored information. Use of networks and
communications links requires measures to protect data
during transmission. In the new world of computers and
electronics the electronic communication plays a vital role.
There is the basic need for security of data. Security is the
term that comes into the picture when some important or
sensitive information must be protect from an unauthorized
access. Hence there must be some way to protect the data
from them and even if he hack the information, he should
not be able to understand what the actual information in the
file is. It is essential to protect the sensitive information.
There are many chances that an unauthorized person can
have an access over the information in some way and can
access this sensitive information. There are many attackers
who can still break the code to find the message. These data
are important which when in wrong hands can create a lot
of damage to the company. To protect these damages we
need some method to protect our data. Cryptography is
used to protect data from these damages. There is no doubt
that the cloud computing is the development trend in the
future. Cloud computing brings us the approximately
infinite computing capability, good scalability ,service on-
demand and so on, also challenges at security, privacy, legal
issues and so on. With the fast development and widespread
applications of cloud computing, the management and
security of the network virtual access become increasingly
important. To assure security of data from any change done
by the intruder, we implement a new security system using
the strong secured algorithm-DYNAMIC HILL CIPHER
WITH MESSAGE DIGEST CONCATENATION that enables
and guarantees the security of the information. The
proposed system provides the facility to the receiver that
message is same as sent by the sender otherwise if a change
is done then the message will not be received by receiver.
The system is based on encryption and decryption, so it also
facilitates data confidentiality. Only the authorized users of
the system can send and receive the messages. The system
provides message authentication, confidentiality and
integrity of the data which are the necessary requirements
for secure electronic communication between sender and
receiver.
C
____________________________________
*M.Tech Scholar, RPIIT, Karnal, Haryana, India,
Muskaan.gupta31@gmail.com
**Assistant Professor, RKGIT, Ghaziabad, UP, India,
zatin.gupta2000@gmail.com
*** Assistant Professor, RPIIT, Karnal, Haryana, India,
mtech.ashish@yahoo.in
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 69 | P a g e
2 THEORETICAL BACKGROUND
ENCRYPTION
Encryption is a procedure that involves a mathematical
transformation of information into scrambled information,
called “cipher text”. The computational process (an
algorithm) uses a key to compute or convert plain text into
cipher text with numbers or strings of characters. The
resulting encrypted text is decipherable only by the holder
of the corresponding key. This deciphering process is also
called decryption. There are many different and
incompatible encryption techniques available, and not all
the software we need to use implements a common
approach. One very important feature of a good encryption
scheme is the ability to specify a key or password of some
kind, and have the encryption method alter itself such that
each key or password produces a different encrypted
output, which requires a unique ‘key’ or ‘password’ to
decrypt. We are using symmetric block cipher which works
as follows:
`
Figure 1: Symmetric Encryption
The Hill Cipher was developed by Lester Hill in 1929. The
encryption algorithm takes m successive plaintext letters
and substitutes for them m cipher text letters. The
substitution is determined by m-linear equations in which
each character is assigned a numerical value (a = 0, b = 1 ... z
= 25). For m= 3, the system can be described as follows:
c1 = (k11P1 + k12P2 +k13P3) mod 26
c2 = (k21P1 +k22P2 + k23P3) mod 26
c3 = (k31P1 + k32P2 +k33P3) mod 26
This can be expressed as : C = KP mod 26where C and P are
column vectors of length 3, representing the plaintext and
cipher text, and K is a 3 x 3 matrix, representing the
encryption key. Operations are performed mod 26.
Decryption requires using the inverse of the matrix K. The
inverse K-1of a matrix K is defined by the equation KK-1=
K-1 K = I, where I is the matrix that is all zeros except for
ones along the main diagonal from upper left to lower right.
The inverse of a matrix does not always exist, but when it
does, it satisfies the preceding equation.
MD5 (Message Digest 5) Ron Rivest, who has been
designed this algorithm in 1991 to replace an earlier hash
function, MD4 (Message-digest protocol 4). It is a widely
used algorithm in cryptography and often used to check the
integrity of a file. An MD5 hash is typically expressed as a 32
digit hexadecimal number. MD5 processes a variable-length
message into a fixed-length output of 128 bits. The input
message is broken up into chunks of 512-bit blocks (sixteen
32- bit little endian integers); the message is padded so that
its length is divisible by 512. The padding works as follows:
first a single bit, 1, is appended to the end of the message.
This is followed by as many zeros as are required to bring
the length of the message up to 64 bits less than a multiple of
512. The remaining bits are filled up with a 64-bit integer
representing the length of the original message, in bits. The
main MD5 algorithm operates on a 128-bit state, divided
into four 32-bit words, denoted A, B, C and D. These are
initialized to certain fixed constants. The main algorithm
then operates on each 512-bit message block in turn, each
block modifying the state. The 128- bit (16-byte) MD5 hashes
(also termed message digests) are typically represented as a
sequence of 32 hexadecimal digits.
3 PROPOSED METHODOLOGY
Our proposed secured electronic transaction methodology is
dynamic hill cipher and message digest concatenation.
Now here we try to use the concept of dynamic key size that
will be selected by the user one who encrypts the message.
Any security system performs the fundamental security
services: confidentiality, authentication, integrity checking
and non repudiation. The proposed methodology performs
all the security operations and is given in table.
Systems Confidentiality Authentication Integrity
Message
authentica
tion with
encryption
Yes Yes No
Message
authentica
tion with
message
digest
no Yes Yes
Proposed
system
yes yes Yes
Table 1: Comparative analysis for different message
transaction
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 70 | P a g e
3.1 ALGORITHMIC APPROACHES
The algorithm has been divided into two phases. In the 1st
phase, Sender Generates the message to send through some
steps of encryption and in the 2nd phase the receiver
receives the message and decrypt with some methods. The
authentication process is done in the receiver end, if the
authentication is done properly then the message is
displayed or else it is damaged or dropped.
Figure 2: Flow Diagram
The complete algorithm is given below:
Phase - 1: (Sender Site)
1. The sender selects a key length that is used as the length
of the key matrix.
2. Generate a square matrix (M) of length K which has an
inverse matrix (M-1) with the property that the product of
the key matrix and the inverse matrix with modulo
operation produces identity matrix (I). That is, M x M-1 = I.
The matrix M is used as the K in the encryption process and
the inverse matrix M-1 is sent to the destination to use for
decryption.
3. Enter the transmitting message (P) and perform Hill
cipher encryption technique to produce cipher text (C).That
is, C = EK (P).
4. To generate message digest (D), performs the bit-wise
XOR operation in the equal two halves of the message P.
Then again perform the bit-wise XOR operation in the equal
halves of the produced previous output and again perform
the same operation in the last output and final output is the
digest D.
5. The generated message digest D is concatenated to the
cipher text (C) and is sent to the destination B
Phase - 2: (Receiver Site)
6. In the destination, receiver B first decrypts the cipher text
C using the received inverse matrix M-1 and the decryption
algorithm Hill Cipher method to produce the plaintext P.
7. Receiver B then performs the same operations bit-wise
XOR on the plaintext and calculates new message digest
MD’ and compare it with the received message digest MD
and determine the integrity of the message
4 IMPLEMENTATION
The proposed electronic message transaction system has
been implemented using java programming.
 The login interface is in form of textboxes and buttons
where the user has to fill up the user id and password. If
the user is authorized, then only he or she can access the
software.
 After the login window, a new window is designed that
tells how the software works by giving directions. This
window also has three options. These are encryption,
decryption and exit.
 There is an encryption button.
 On click of encryptions button, several other buttons and
two editors will be shown. One of the editors is for writing
or getting of plain text and other is for getting of
encrypted data.
 The various buttons are generate_key, reset_data, encrypt,
save_encrypted_text, back, exit, check_key_validity and
open_file.
 There is a decryption button. On click of this button,
several other buttons and two editors will be shown. One
of the editors is for getting of encrypted text and other is
for gettingof plain text.
 The various buttons are get_data, reset_data, decrypt,
save_encrypted_text, back and exit.
 On clicking of back button, three options again will
reappear. These options are encryption, decryption and
exit.
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 71 | P a g e
Figure 3: ENCRYPTION WINDOW
Figure 4: ENTERING THE KEY SIZE
Figure 5: PLAIN TEXT AND ENCRYPTED TEXT
Figure 6: PLAIN TEXT FROM ENCRYPTED TEXT
5 FUTURE SCOPE
The main achievement is the correctly functional tool itself.
Unfortunately time constraints have meant that not all the
originally mentioned objectives were accomplished. The
various compression techniques may be applied for efficient
utilization of bandwidth and storage. This system can be
extended to work on the files containing Unicode characters
as well. This application can be extended to work with other
file formats. By addition of transferring of data from one
system to another, system can be enhanced.
6 CONCLUSION
We can conclude that representation of dynamic hill cipher
and message digest concatenation is more secure than hill
cipher using dynamic key .This algorithm provides high
security in terms of authentication, confidentiality and
integrity of data. The chances of breaking the encrypted data
in cloud computing will decrease too many folds due to the
use of dynamic key length and concatenated message digest.
The reason being, the intruder does not have the dynamic
value of key size. The algorithm is efficient, requires low
maintenance, secure and highly reliable security provider
that protects the valuable data of the users and curbs the
intruder’s attempts to attack that data in cloud computing.
ACKNOWLEDGEMENT
I wish to thank to Mr. Zatin Gupta, Assistant Professor, Raj
Kumar Goel Institute of Engineering & Technology,
Ghaziabad, U.P., India for his valuable guidance and
motivation, throughout the thesis period. Without his
guidance it is not possible for me to complete this work on
time.
REFERENCES
[1] Andrew S. Tanenbaum, Computer Networks, 4th edition,
Prentice-Hall, Inc 2003, ISBN- 81-203-2175-8, pp. 731- 732,
749-755,433-437
[2] Cryptographic Algorithms: http://www.eskimo.com/
~weidai/algorithms.html
[3] Zatin Gupta, Ashish Gupta, Saurabh Agrawal “ Cloud
Computing: A Promising Expertise” International Journal
of Research Review in Engineering Science and Technology
(ISSN 2278- 6643) | Volume-1 Issue-3, December 2012
[4] RSA Key Generator for default keys used:
http://crypto.cs.mcgill.ca/~crepeau
/RSA/generator_frame.html
[5] The Hill Cipher, http://www.math.sunysb.edu/~scott/
papers/MSTP/crypto/8Hill_Cipher.html
[6] Shahrokh Saeednia, How to Make the Hill Cipher Secure,
Cryptologia, 24(4), October 2000, pp353–360.
[7] "Hill Cipher Deciphered" provides an excellent explanation
of computing matrix inverses with regard to the Hill
cipher.
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-2, ISSUE-2, JUNE-2013
IJRREST, ijrrest.org 72 | P a g e
[8] An Introduction to Cryptology Prentice-Hall, ISBN 0-13-
030369-0web services
[9] William Stallings, Cryptography and Network Security
Principles and Practices, Fourth Edition
[10] Java Cryptography Architecture: Available at
http://www.tucows.apollo.lv/javacorner/jdk1.1.6/docs/g
uide/security/C ryptoSpec.html
[11] M. Ismail Jabiullah1, Md. Zakaria Sarker 2, Anisur Rahman
3 and M. Lutfar Rahman 4 1Department of Software
Engineering, Daffodil International University,2Institute of
Science and Technology, National University, Dhanmondi,
Dhaka.3Department of Computer Science and Engineering,
Daffodil International University 4Department of
Computer Science and Engineering, Dhaka University,
Bangladesh. E-mail: mijjabi@daffodilvarsity.edu.bd “A
SECURED MESSAGE TRANSACTION APPROACH BY
DYNAMIC HILL CIPHER GENERATION AND
MESSAGE DIGEST CONCATENATION” DAFFODIL
INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE
AND TECHNOLOGY, VOLUME 5, ISSUE 1, JANUARY
2010
[12] James Martin, Telecommunication And The Computer,3
ed, Prentice- Hall, Englewood Cliffs, N.J., 2001, pp.29-
135,137-142
[13] RSA Laboratories, http://www.rsasecurity.com
[14] On the Key of the Hill Cipher, http://jeff.over.bz/papers/
undergrad/on- the-keyspace-of-the-hill-cipher.pdf
[15] Dobbertin, Hans (1996). "The Status of MD5 after a recent
attack". CryptoBytes 2.
[16] “Hill Cipher Deciphered" provides an excellent explanation
of computing matrix inverses with regard to the Hill
cipher.
[17] Farzad Sabahi ,Faculty of Computer Engineering Azad
University Iran fsabahi@ieee.org “cloud Computing
Security Threats and Responses”2011 IEEE
[18] Security Threats in Cloud Computing(Engr: Farhan Bashir
Shaikh Department of Computing & Technlogy SZABIST
Islamabad, Pakistan Shaikh.farhan@live.com ,Sajjad Haider
IT Department NUML Islamabad, Pakistan
Sajjadhyder@hotmail.com ”Security Threats in Cloud
Computing” presented at 6th international confrence on
internet technology,11-14 December 2011 IEEE
[19] Jianfeng Yang College of Computer Science and
Technology Sichuan University Chengdu, China E-mail:
jefferyang.yjf@gmail.com Zhibin Chen College of
Computer Science and Technology Sichuan University
Chengdu, China E-mail: 724086085@qq.com “Cloud
Computing Research and Security Issues”2010 IEEE
[20] Qunying Sun, Zhiyuan Hu Department of Strategy Alcatel-
Lucent Shanghai Bell, Co., Ltd, Shanghai, 201206, Chinae-
mail: Qunying.a.Sun@alcatel-sbell.com.cn ”Security for
Networks Virtual Access of Cloud Computing” presented
at “2012 Fourth International Conference on Multimedia
Information Networking and Security”
[21] Gurudatt Kulkarni & Jayant Gambhir Tejswini Patil
Amruta Dongare “A Security Aspects in Cloud
Computing”2012 IEEE

More Related Content

PDF
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
PDF
Ijcnc050208
IJCNCJournal
 
PDF
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
PDF
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
PPT
File transfer with multiple security mechanism
Shubham Patil
 
PDF
H43064650
IJERA Editor
 
PDF
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
Ijcnc050208
IJCNCJournal
 
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
File transfer with multiple security mechanism
Shubham Patil
 
H43064650
IJERA Editor
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 

What's hot (20)

PDF
Image Cryptography using RSA Algorithm
ijtsrd
 
PDF
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
PDF
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
PDF
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 
PDF
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
PDF
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
PDF
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
PDF
ijircee_Template
ijircee
 
PDF
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
 
PDF
Secure Encrypted Data in Cloud Based Environment
paperpublications3
 
PDF
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
csandit
 
PDF
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
PDF
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
INFOGAIN PUBLICATION
 
PDF
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
DOC
File transfer using cryptography techniques
miteshkumar82
 
PDF
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
PDF
C0281010016
inventionjournals
 
PDF
Ijariie1196
IJARIIE JOURNAL
 
PDF
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 
PDF
researchpaperfinal1
Sumit Bajaj
 
Image Cryptography using RSA Algorithm
ijtsrd
 
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
ijircee_Template
ijircee
 
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
 
Secure Encrypted Data in Cloud Based Environment
paperpublications3
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
csandit
 
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
INFOGAIN PUBLICATION
 
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
File transfer using cryptography techniques
miteshkumar82
 
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
C0281010016
inventionjournals
 
Ijariie1196
IJARIIE JOURNAL
 
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 
researchpaperfinal1
Sumit Bajaj
 
Ad

Viewers also liked (7)

PDF
CV Sofia Eskilsdotter en
Sofia Eskilsdotter
 
PDF
Physica b 08
aman2395
 
PPT
Tugas Akhir Semester TI (Teknologi Informasi)
Lee Gorgeouz
 
PPTX
Electro Textile
Shahidul Xibon
 
PPTX
Manajer dan Manajemen
Lee Gorgeouz
 
PDF
ijrrest_vol-2_issue-2_013
Ashish Gupta
 
PDF
Example an op amp circuit analysis lecture
aman2395
 
CV Sofia Eskilsdotter en
Sofia Eskilsdotter
 
Physica b 08
aman2395
 
Tugas Akhir Semester TI (Teknologi Informasi)
Lee Gorgeouz
 
Electro Textile
Shahidul Xibon
 
Manajer dan Manajemen
Lee Gorgeouz
 
ijrrest_vol-2_issue-2_013
Ashish Gupta
 
Example an op amp circuit analysis lecture
aman2395
 
Ad

Similar to ijrrest_vol-2_issue-2_015 (20)

PDF
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
 
PDF
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
PDF
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 
PDF
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
PDF
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
PDF
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
PDF
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
 
PDF
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
PDF
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
PDF
18. 23367.pdf
TELKOMNIKA JOURNAL
 
PDF
Modified RSA-based algorithm: a double secure approach
TELKOMNIKA JOURNAL
 
PDF
D018141922
IOSR Journals
 
PDF
Power analysis attack against encryption devices: a comprehensive analysis of...
TELKOMNIKA JOURNAL
 
PDF
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
PDF
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
 
PDF
J017667582
IOSR Journals
 
PDF
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
PDF
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
PDF
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
PDF
Data security framework for cloud computing networks
IAEME Publication
 
Fog and Internet of Things Network Security through Blowfish Cipher
BRNSSPublicationHubI
 
Cloud computing and a new approach in data encryption technique
Mahmuda Rahman
 
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET Journal
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
18. 23367.pdf
TELKOMNIKA JOURNAL
 
Modified RSA-based algorithm: a double secure approach
TELKOMNIKA JOURNAL
 
D018141922
IOSR Journals
 
Power analysis attack against encryption devices: a comprehensive analysis of...
TELKOMNIKA JOURNAL
 
Different date block size using to evaluate the performance between different...
IJCNCJournal
 
Emerging Trends In Cryptography And Digital Forensics
IRJET Journal
 
J017667582
IOSR Journals
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
Automated diagnosis of attacks in internet of things using machine learning a...
journalBEEI
 
Data security framework for cloud computing networks
IAEME Publication
 

ijrrest_vol-2_issue-2_015

  • 1. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 68 | P a g e Implementation of Dynamic Hill Cipher with Message Digest Concatenation Encryption Technique in Cloud Computing *Muskaan Gupta, **Zatin Gupta , ***Ashish Gupta Abstract— The data security in cloud computing is the core problem. Single security method cannot solve the security problem in cloud computing. To advance cloud computing measures to ensure security is important. The solution is the data encryption. Before storing it at virtual location, encrypt the data with keys. User selects the public key to encrypt data and upload the encrypted data to the cloud. This Paper introduces a strong cryptography algorithm that provides the security of the data in cloud computing. The proposed algorithm is based on encryption algorithm the hill cipher which was analyzed to be easily breakable if the matrix is known due to its short key length and does not provide any message integrity. So there is the need to make it more typical for the intruder to break it. To make data secure we implement a new security system using the strong secured algorithm Dynamic Hill Cipher With Message Digest Concatenation which ensure message authentication, confidentiality and integrity of the data. Confidentiality provides protection of transmitted data from passive attacks. The authentication service assures that a communication is authentic. The data integrity is the assurance that data contain no modification. Keywords: Cryptography, MD5, Digital signature, Hill cipher technique, Plain texts, Cipher text, ID. ——————————  —————————— 1 INTRODUCTION loud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand [3]. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing, parallel computing and so on. However, there still exist many problems in cloud computing today, a recent survey shows that data security and privacy risks have become the primary concern for people to shift to cloud computing. To advance cloud computing, measures to ensure security is important. Traditionally information security was provided by physical (for e.g. rugged filing cabinets with locks) and administrative mechanisms (for e.g. Personnel screening procedures during hiring process).Growing computer use implies a need for automated tools for protecting files and other information stored on it. This is especially the case for a shared system, such as a time-sharing system, and even more so for systems that can be accessed over a public telephone network, data network, or the Internet. Information security requirements have changed in recent times. Computer use requires automated tools to protect files and other stored information. Use of networks and communications links requires measures to protect data during transmission. In the new world of computers and electronics the electronic communication plays a vital role. There is the basic need for security of data. Security is the term that comes into the picture when some important or sensitive information must be protect from an unauthorized access. Hence there must be some way to protect the data from them and even if he hack the information, he should not be able to understand what the actual information in the file is. It is essential to protect the sensitive information. There are many chances that an unauthorized person can have an access over the information in some way and can access this sensitive information. There are many attackers who can still break the code to find the message. These data are important which when in wrong hands can create a lot of damage to the company. To protect these damages we need some method to protect our data. Cryptography is used to protect data from these damages. There is no doubt that the cloud computing is the development trend in the future. Cloud computing brings us the approximately infinite computing capability, good scalability ,service on- demand and so on, also challenges at security, privacy, legal issues and so on. With the fast development and widespread applications of cloud computing, the management and security of the network virtual access become increasingly important. To assure security of data from any change done by the intruder, we implement a new security system using the strong secured algorithm-DYNAMIC HILL CIPHER WITH MESSAGE DIGEST CONCATENATION that enables and guarantees the security of the information. The proposed system provides the facility to the receiver that message is same as sent by the sender otherwise if a change is done then the message will not be received by receiver. The system is based on encryption and decryption, so it also facilitates data confidentiality. Only the authorized users of the system can send and receive the messages. The system provides message authentication, confidentiality and integrity of the data which are the necessary requirements for secure electronic communication between sender and receiver. C ____________________________________ *M.Tech Scholar, RPIIT, Karnal, Haryana, India, [email protected] **Assistant Professor, RKGIT, Ghaziabad, UP, India, [email protected] *** Assistant Professor, RPIIT, Karnal, Haryana, India, [email protected]
  • 2. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 69 | P a g e 2 THEORETICAL BACKGROUND ENCRYPTION Encryption is a procedure that involves a mathematical transformation of information into scrambled information, called “cipher text”. The computational process (an algorithm) uses a key to compute or convert plain text into cipher text with numbers or strings of characters. The resulting encrypted text is decipherable only by the holder of the corresponding key. This deciphering process is also called decryption. There are many different and incompatible encryption techniques available, and not all the software we need to use implements a common approach. One very important feature of a good encryption scheme is the ability to specify a key or password of some kind, and have the encryption method alter itself such that each key or password produces a different encrypted output, which requires a unique ‘key’ or ‘password’ to decrypt. We are using symmetric block cipher which works as follows: ` Figure 1: Symmetric Encryption The Hill Cipher was developed by Lester Hill in 1929. The encryption algorithm takes m successive plaintext letters and substitutes for them m cipher text letters. The substitution is determined by m-linear equations in which each character is assigned a numerical value (a = 0, b = 1 ... z = 25). For m= 3, the system can be described as follows: c1 = (k11P1 + k12P2 +k13P3) mod 26 c2 = (k21P1 +k22P2 + k23P3) mod 26 c3 = (k31P1 + k32P2 +k33P3) mod 26 This can be expressed as : C = KP mod 26where C and P are column vectors of length 3, representing the plaintext and cipher text, and K is a 3 x 3 matrix, representing the encryption key. Operations are performed mod 26. Decryption requires using the inverse of the matrix K. The inverse K-1of a matrix K is defined by the equation KK-1= K-1 K = I, where I is the matrix that is all zeros except for ones along the main diagonal from upper left to lower right. The inverse of a matrix does not always exist, but when it does, it satisfies the preceding equation. MD5 (Message Digest 5) Ron Rivest, who has been designed this algorithm in 1991 to replace an earlier hash function, MD4 (Message-digest protocol 4). It is a widely used algorithm in cryptography and often used to check the integrity of a file. An MD5 hash is typically expressed as a 32 digit hexadecimal number. MD5 processes a variable-length message into a fixed-length output of 128 bits. The input message is broken up into chunks of 512-bit blocks (sixteen 32- bit little endian integers); the message is padded so that its length is divisible by 512. The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits less than a multiple of 512. The remaining bits are filled up with a 64-bit integer representing the length of the original message, in bits. The main MD5 algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C and D. These are initialized to certain fixed constants. The main algorithm then operates on each 512-bit message block in turn, each block modifying the state. The 128- bit (16-byte) MD5 hashes (also termed message digests) are typically represented as a sequence of 32 hexadecimal digits. 3 PROPOSED METHODOLOGY Our proposed secured electronic transaction methodology is dynamic hill cipher and message digest concatenation. Now here we try to use the concept of dynamic key size that will be selected by the user one who encrypts the message. Any security system performs the fundamental security services: confidentiality, authentication, integrity checking and non repudiation. The proposed methodology performs all the security operations and is given in table. Systems Confidentiality Authentication Integrity Message authentica tion with encryption Yes Yes No Message authentica tion with message digest no Yes Yes Proposed system yes yes Yes Table 1: Comparative analysis for different message transaction
  • 3. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 70 | P a g e 3.1 ALGORITHMIC APPROACHES The algorithm has been divided into two phases. In the 1st phase, Sender Generates the message to send through some steps of encryption and in the 2nd phase the receiver receives the message and decrypt with some methods. The authentication process is done in the receiver end, if the authentication is done properly then the message is displayed or else it is damaged or dropped. Figure 2: Flow Diagram The complete algorithm is given below: Phase - 1: (Sender Site) 1. The sender selects a key length that is used as the length of the key matrix. 2. Generate a square matrix (M) of length K which has an inverse matrix (M-1) with the property that the product of the key matrix and the inverse matrix with modulo operation produces identity matrix (I). That is, M x M-1 = I. The matrix M is used as the K in the encryption process and the inverse matrix M-1 is sent to the destination to use for decryption. 3. Enter the transmitting message (P) and perform Hill cipher encryption technique to produce cipher text (C).That is, C = EK (P). 4. To generate message digest (D), performs the bit-wise XOR operation in the equal two halves of the message P. Then again perform the bit-wise XOR operation in the equal halves of the produced previous output and again perform the same operation in the last output and final output is the digest D. 5. The generated message digest D is concatenated to the cipher text (C) and is sent to the destination B Phase - 2: (Receiver Site) 6. In the destination, receiver B first decrypts the cipher text C using the received inverse matrix M-1 and the decryption algorithm Hill Cipher method to produce the plaintext P. 7. Receiver B then performs the same operations bit-wise XOR on the plaintext and calculates new message digest MD’ and compare it with the received message digest MD and determine the integrity of the message 4 IMPLEMENTATION The proposed electronic message transaction system has been implemented using java programming.  The login interface is in form of textboxes and buttons where the user has to fill up the user id and password. If the user is authorized, then only he or she can access the software.  After the login window, a new window is designed that tells how the software works by giving directions. This window also has three options. These are encryption, decryption and exit.  There is an encryption button.  On click of encryptions button, several other buttons and two editors will be shown. One of the editors is for writing or getting of plain text and other is for getting of encrypted data.  The various buttons are generate_key, reset_data, encrypt, save_encrypted_text, back, exit, check_key_validity and open_file.  There is a decryption button. On click of this button, several other buttons and two editors will be shown. One of the editors is for getting of encrypted text and other is for gettingof plain text.  The various buttons are get_data, reset_data, decrypt, save_encrypted_text, back and exit.  On clicking of back button, three options again will reappear. These options are encryption, decryption and exit.
  • 4. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 71 | P a g e Figure 3: ENCRYPTION WINDOW Figure 4: ENTERING THE KEY SIZE Figure 5: PLAIN TEXT AND ENCRYPTED TEXT Figure 6: PLAIN TEXT FROM ENCRYPTED TEXT 5 FUTURE SCOPE The main achievement is the correctly functional tool itself. Unfortunately time constraints have meant that not all the originally mentioned objectives were accomplished. The various compression techniques may be applied for efficient utilization of bandwidth and storage. This system can be extended to work on the files containing Unicode characters as well. This application can be extended to work with other file formats. By addition of transferring of data from one system to another, system can be enhanced. 6 CONCLUSION We can conclude that representation of dynamic hill cipher and message digest concatenation is more secure than hill cipher using dynamic key .This algorithm provides high security in terms of authentication, confidentiality and integrity of data. The chances of breaking the encrypted data in cloud computing will decrease too many folds due to the use of dynamic key length and concatenated message digest. The reason being, the intruder does not have the dynamic value of key size. The algorithm is efficient, requires low maintenance, secure and highly reliable security provider that protects the valuable data of the users and curbs the intruder’s attempts to attack that data in cloud computing. ACKNOWLEDGEMENT I wish to thank to Mr. Zatin Gupta, Assistant Professor, Raj Kumar Goel Institute of Engineering & Technology, Ghaziabad, U.P., India for his valuable guidance and motivation, throughout the thesis period. Without his guidance it is not possible for me to complete this work on time. REFERENCES [1] Andrew S. Tanenbaum, Computer Networks, 4th edition, Prentice-Hall, Inc 2003, ISBN- 81-203-2175-8, pp. 731- 732, 749-755,433-437 [2] Cryptographic Algorithms: http://www.eskimo.com/ ~weidai/algorithms.html [3] Zatin Gupta, Ashish Gupta, Saurabh Agrawal “ Cloud Computing: A Promising Expertise” International Journal of Research Review in Engineering Science and Technology (ISSN 2278- 6643) | Volume-1 Issue-3, December 2012 [4] RSA Key Generator for default keys used: http://crypto.cs.mcgill.ca/~crepeau /RSA/generator_frame.html [5] The Hill Cipher, http://www.math.sunysb.edu/~scott/ papers/MSTP/crypto/8Hill_Cipher.html [6] Shahrokh Saeednia, How to Make the Hill Cipher Secure, Cryptologia, 24(4), October 2000, pp353–360. [7] "Hill Cipher Deciphered" provides an excellent explanation of computing matrix inverses with regard to the Hill cipher.
  • 5. IJRREST INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN ENGINEERING SCIENCE & TECHNOLOGY (ISSN 2278–6643) VOLUME-2, ISSUE-2, JUNE-2013 IJRREST, ijrrest.org 72 | P a g e [8] An Introduction to Cryptology Prentice-Hall, ISBN 0-13- 030369-0web services [9] William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition [10] Java Cryptography Architecture: Available at http://www.tucows.apollo.lv/javacorner/jdk1.1.6/docs/g uide/security/C ryptoSpec.html [11] M. Ismail Jabiullah1, Md. Zakaria Sarker 2, Anisur Rahman 3 and M. Lutfar Rahman 4 1Department of Software Engineering, Daffodil International University,2Institute of Science and Technology, National University, Dhanmondi, Dhaka.3Department of Computer Science and Engineering, Daffodil International University 4Department of Computer Science and Engineering, Dhaka University, Bangladesh. E-mail: [email protected] “A SECURED MESSAGE TRANSACTION APPROACH BY DYNAMIC HILL CIPHER GENERATION AND MESSAGE DIGEST CONCATENATION” DAFFODIL INTERNATIONAL UNIVERSITY JOURNAL OF SCIENCE AND TECHNOLOGY, VOLUME 5, ISSUE 1, JANUARY 2010 [12] James Martin, Telecommunication And The Computer,3 ed, Prentice- Hall, Englewood Cliffs, N.J., 2001, pp.29- 135,137-142 [13] RSA Laboratories, http://www.rsasecurity.com [14] On the Key of the Hill Cipher, http://jeff.over.bz/papers/ undergrad/on- the-keyspace-of-the-hill-cipher.pdf [15] Dobbertin, Hans (1996). "The Status of MD5 after a recent attack". CryptoBytes 2. [16] “Hill Cipher Deciphered" provides an excellent explanation of computing matrix inverses with regard to the Hill cipher. [17] Farzad Sabahi ,Faculty of Computer Engineering Azad University Iran [email protected] “cloud Computing Security Threats and Responses”2011 IEEE [18] Security Threats in Cloud Computing(Engr: Farhan Bashir Shaikh Department of Computing & Technlogy SZABIST Islamabad, Pakistan [email protected] ,Sajjad Haider IT Department NUML Islamabad, Pakistan [email protected] ”Security Threats in Cloud Computing” presented at 6th international confrence on internet technology,11-14 December 2011 IEEE [19] Jianfeng Yang College of Computer Science and Technology Sichuan University Chengdu, China E-mail: [email protected] Zhibin Chen College of Computer Science and Technology Sichuan University Chengdu, China E-mail: [email protected] “Cloud Computing Research and Security Issues”2010 IEEE [20] Qunying Sun, Zhiyuan Hu Department of Strategy Alcatel- Lucent Shanghai Bell, Co., Ltd, Shanghai, 201206, Chinae- mail: [email protected] ”Security for Networks Virtual Access of Cloud Computing” presented at “2012 Fourth International Conference on Multimedia Information Networking and Security” [21] Gurudatt Kulkarni & Jayant Gambhir Tejswini Patil Amruta Dongare “A Security Aspects in Cloud Computing”2012 IEEE