Unique Cipher Mechanism for EnsuringSecure Data Flow over Network

Pankaj Rakheja, R. Saini, Nankita Asija, Diwakar Kamboj
{"title":"Unique Cipher Mechanism for EnsuringSecure Data Flow over Network","authors":"Pankaj Rakheja, R. Saini, Nankita Asija, Diwakar Kamboj","doi":"10.15662/ijareeie.2015.0405033","DOIUrl":null,"url":null,"abstract":"Cryptography is the art of making text non readable from human readable to ensure secure communication over the network. It is classified basically into two types one is symmetric cryptography and the other is asymmetric cryptography. In the symmetric cryptography we use single key for encryption and decryption process which creates trouble of key sharing whereas in asymmetric cryptography two different keys are used for one for encryption and other for decryption which solves dependence on key sharing to large extent. But now traditional cryptographic ciphers are more prone to attacks and problem of authentication also exists as users have increased and few of them try to have unauthorized access. In order to solve this issue we have integrated biometric and visual cryptographic modules in the basic RSA module to make it more secure. The RSA encrypted text or message is hidden through LSB insertion in an image which also has shares of the fingerprint of the desired recipient. Along with that we have used the Caesar and mix columnar operation which protects RSA from man in middle attack as to decode the encoded text, attacker needs to know key used in mix columnar operation too. And as the size of text increases mix columnar becomes more effective. Moreover the receiver would be able to get the message only if his fingerprint matches to that of the desired one else he would just be able to see image only that is we have hidden the existence of secret message so as to make it even more secure. Matlab simulation has been carried out to validate the proposed technique","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"28 1","pages":"4023-4031"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15662/ijareeie.2015.0405033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cryptography is the art of making text non readable from human readable to ensure secure communication over the network. It is classified basically into two types one is symmetric cryptography and the other is asymmetric cryptography. In the symmetric cryptography we use single key for encryption and decryption process which creates trouble of key sharing whereas in asymmetric cryptography two different keys are used for one for encryption and other for decryption which solves dependence on key sharing to large extent. But now traditional cryptographic ciphers are more prone to attacks and problem of authentication also exists as users have increased and few of them try to have unauthorized access. In order to solve this issue we have integrated biometric and visual cryptographic modules in the basic RSA module to make it more secure. The RSA encrypted text or message is hidden through LSB insertion in an image which also has shares of the fingerprint of the desired recipient. Along with that we have used the Caesar and mix columnar operation which protects RSA from man in middle attack as to decode the encoded text, attacker needs to know key used in mix columnar operation too. And as the size of text increases mix columnar becomes more effective. Moreover the receiver would be able to get the message only if his fingerprint matches to that of the desired one else he would just be able to see image only that is we have hidden the existence of secret message so as to make it even more secure. Matlab simulation has been carried out to validate the proposed technique
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
确保网络数据流安全的独特密码机制
密码学是一门使文本从人类可读变为不可读的艺术,以确保网络上的安全通信。它基本上分为两种类型,一种是对称密码术,另一种是非对称密码术。在对称密码学中,我们使用单个密钥进行加密和解密过程,这造成了密钥共享的麻烦,而在非对称密码学中,我们使用两个不同的密钥进行加密和解密,这在很大程度上解决了对密钥共享的依赖。但是随着用户数量的增加,越来越少的用户尝试进行未经授权的访问,传统的加密方式更容易受到攻击,并且存在认证问题。为了解决这个问题,我们在基本的RSA模块中集成了生物识别和视觉加密模块,使其更加安全。RSA加密的文本或消息通过LSB插入隐藏在图像中,该图像也具有所需接收者的指纹共享。除此之外,我们还使用了凯撒和混合列操作来保护RSA免受中间人攻击,因为要解码编码的文本,攻击者还需要知道混合列操作中使用的密钥。随着文本大小的增加,混合柱状结构变得更加有效。此外,接收者只有在他的指纹与想要的指纹匹配的情况下才能获得信息,否则他只能看到图像,也就是说我们隐藏了秘密信息的存在,从而使其更加安全。通过Matlab仿真验证了该方法的有效性
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Auto Testing of FCPV and ADC Joint AirLeak Detection Using PLC Image Steganography using Variable KeyTechnique for Double Tier Security Freeware Power Generation StructuralImplementation Strategy using Solar Panels inParallel Approach A Review on Parkinson Disease ClassifierUsing Patient Voice Features A New Cascaded 2-Level Inverter basedSTATCOM for High Power Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1