Anda di halaman 1dari 5

A New Way to Design and Implementation of Hybrid Crypto System for Security of t

he Information in Public Network


Ravindra Kumar Gupta1, Parvinder Singh2
1Assistant Professor, 2M.Tech Scholar, CSE, SSSIST Sehore (M.P) India
Abstract In this paper, a new hybrid concept is proposed by analyzing the princip
le of the hybrid cryptography based on the combination of symmetric and message
digesting. Moreover, the security and performance of the proposed concept will a
lso estimate. In proposed concept we designed a new symmetric encryption algorit
hm and combine with SHA-1 message digesting function to provide hybrid nature. N
ow the proposed system will try to improve exiting problem. In proposed system s
ymmetric key will use series of logical functions like XOR, Circular Shift (Righ
t, Left), Feastel function [6] and these operations are time efficient operation
as compared to mathematical operation for providing confidentiality and authent
ication. For integrity, proposed system use SHA-1[15] algorithm. Due to this rea
son proposed system is efficient then existing system. The experimental results
based on combination of symmetric and message digesting will approve the effecti
veness of the proposed concept, and the combination of symmetric and message dig
esting will show large variation in key space and provide high-level security. T
he cipher text generated by this method will be approximately double in size as
the plaintext, and will be suitable for practical use in the secure transmission
of confidential information over the Internet. The purpose of hybrid cryptosyst
ems is not to provide perfect or risk-free security. Rather, the purpose of cryp
tography-based security is to protect information resources by making unauthoriz
ed collection of the information or tampering with the information costly than t
he existing potential value that might be gained. Good hybrid cryptography, when
properly implemented and used, makes attempts to violate security cost-prohibit
ive.
Keywords-- Encryption, Decryption, Security, Image, Cryptography.
I. INTRODUCTION
Hybrid cryptography [1, 2, 3, 4] is a technique using multiple ciphers of differ
ent types together, each to its best advantage. A hybrid cryptosystem can be con
structed using any two separate cryptosystems:
? A key has encapsulation scheme which is a public-key or any other type of cryp
tosystem.
? A data has encapsulation scheme which is a symmetric-key cryptosystem.
The hybrid cryptosystem is itself a public-key system, who s public and private ke
ys are the same as in the key encapsulation scheme. In place of public key syste
m we can use digital signature like message digesting function with symmetric ke
y system to make hybrid crypto system. Note that for very long messages the bulk
of the work in encryption/decryption is done by the more efficient symmetric-ke
y scheme, while the inefficient public-key scheme is used only to encrypt/decryp
t a short key value. For example, to encrypt a message addressed to user-1 in a
hybrid technique user-2 does the following [1, 8]:
1. Obtains user-1 public key.
2. Generates a fresh symmetric key
3. Encrypts the message using the symmetric key.
4. Encrypt the symmetric key using user-1 public key. Send both of these encrypt
ions to user-1.
To decrypt this hybrid cipher text, user-1 does the following:
1. User-1 uses her private key to decrypt the symmetric key.
2. User-1 uses this symmetric key to decrypt the message.
But in this paper we have used hash function in place of public key system. As w
e know that hash functions play an important role in digital signature schemes.
A digital signature is a cryptographic technique that produces the electronic eq
uivalent of a manual signature. This means that a digital signature can prohibit
the forging of a message by anybody else but the sender. Moreover the receiver
is given guarantee of the message's authenticity, in the sense that he can subse
quently prove to a third party that the message is authentic even if its origina
tor revokes it. The concept of a digital signature was suggested in 1976 by W. D
iffie and M. Hellman: [15] the sender transforms the information with a secret k
ey, and the receiver can verify the signature by applying the corresponding publ
ic key [7, 9]. Reason behind choosing this model is the security and efficiency.
Most interesting thing in this technique is the combination of two different te
chniques.
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume
3, Issue 8, August 2013)
109
Basically this technique is a method of encryption that combines two or more cry
ptography technique and usually includes a combination of symmetric and message
digesting function to take benefit of the strengths of each type of technique. S
ymmetric encryption has the performance advantage and therefore is the common so
lution for encrypting and decrypting performance-sensitive data, such as an onli
ne data stream. However, symmetric encryption has a downside, i.e. cryptographic
key needs to be known to both the sender and receiver of encrypted data, and th
e exchanging of the key over an insecure channel may cause security risks. On th
e other hand, message digesting provides better security in that the message dig
esting provides digital signature and support to integrity principal. Proposed r
esearch is the designing and implementation of a new Hybrid concept. Proposed te
chnique is a method of encryption that combines two or more cryptography techniq
ue and usually includes a combination of symmetric and message digesting techniq
ue to take benefit of the strengths of each type of cryptography. Basically ther
e are four security principles Confidentiality , Integrity , Authentication , and Non-Rep
diation . In which Symmetric Technique fulfill the concept of Confidentiality, it
also provide the performance advantage and therefore is the common solution for
encrypting and decrypting performance-sensitive data [12, 13, 14]. On the other
hand, message digests technique is fulfilling the authentication as well as inte
grity security principle concept to provide better security in the cryptography.
II. PROPOSED WORK
The block diagram of proposed hybrid crypto system is shown in figure 1, plain t
ext encrypted by proposed symmetric encryption algorithm to produce cipher text,
then message digesting function is also apply on plain text by using SHA-160 to
produce message digest of plain text. Now again applying proposed encryption te
chnique on produced message digest text so it will also convert in cipher text.
Now combine both Cipher Values (C1 and C2) into one and send to the receiver. At
receiver end, separate both cipher (C1 and C2) values and apply proposed decryp
tion algorithm one by one on each cipher value. From first cipher value plain te
xt will get and from second cipher value C2 message digest will get. Then apply
message digesting function SHA-1 on plain text which is produced during decrypti
on to produced message digest. Now finally comparing both message digests values
with each other for changes in message digest.
If both message digests are same then plain text securely received otherwise ori
ginal plain text is tempered by the hacker so drop the whole information.
Figure 1:- Block diagram of Proposed Hybrid crypto system
Proposed Architecture: Figure 2 is showing general architecture of the proposed
concept. In this figure user send a request to explorer to send text information
. Server executes this request and response to user in the form of display mail
page of the site. For example, user wants to send personal information in a file
through this mail in public network. First of all user will select confidential
information from file at user end and then send to other end but these confiden
tial information will not go directly to other end it will pass through the desi
gned system. This system uses security features like cryptography, with the help
of cryptography it will encrypt confidential information into cipher text and t
his cipher text will transmit to other end via public network. Basically the pro
posed concept using hybrid technique of cryptography where it s using proposed sym
metric algorithm as a symmetric technique and SHA-1 as message digesting techniq
ue where all the confidential information encrypt via proposed symmetric algorit
hm and authenticity of the information will be checked via SHA-1. After that it
will send cipher data and encrypted key to the other end.
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume
3, Issue 8, August 2013)
110
Figure 2: General Architecture of Proposed Encryption Concept
Figure 3 is showing the receiving end procedure. At receiving end receiver recei
ves cipher message C1 and C2, then receiver decrypt to C1 from proposed decrypti
on algorithm then plain message will again convert into message digest from prop
osed symmetric key. Here proposed model is trying to improve existing problem. I
n this research, proposed symmetric key are using series of logical function lik
e XOR, Circular Shift (Right, Left), feastial function, and these operations are
time efficient operations as compared to mathematical operation.
Figure 3: GenerA New Way to Design and Implementation of Hybrid Crypto System fo
r Security of the Information in Public Network
Ravindra Kumar Gupta1, Parvinder Singh2
1Assistant Professor, 2M.Tech Scholar, CSE, SSSIST Sehore (M.P) India
Abstract In this paper, a new hybrid concept is proposed by analyzing the princip
le of the hybrid cryptography based on the combination of symmetric and message
digesting. Moreover, the security and performance of the proposed concept will a
lso estimate. In proposed concept we designed a new symmetric encryption algorit
hm and combine with SHA-1 message digesting function to provide hybrid nature. N
ow the proposed system will try to improve exiting problem. In proposed system s
ymmetric key will use series of logical functions like XOR, Circular Shift (Righ
t, Left), Feastel function [6] and these operations are time efficient operation
as compared to mathematical operation for providing confidentiality and authent
ication. For integrity, proposed system use SHA-1[15] algorithm. Due to this rea
son proposed system is efficient then existing system. The experimental results
based on combination of symmetric and message digesting will approve the effecti
veness of the proposed concept, and the combination of symmetric and message dig
esting will show large variation in key space and provide high-level security. T
he cipher text generated by this method will be approximately double in size as
the plaintext, and will be suitable for practical use in the secure transmission
of confidential information over the Internet. The purpose of hybrid cryptosyst
ems is not to provide perfect or risk-free security. Rather, the purpose of cryp
tography-based security is to protect information resources by making unauthoriz
ed collection of the information or tampering with the information costly than t
he existing potential value that might be gained. Good hybrid cryptography, when
properly implemented and used, makes attempts to violate security cost-prohibit
ive.
Keywords-- Encryption, Decryption, Security, Image, Cryptography.
I. INTRODUCTION
Hybrid cryptography [1, 2, 3, 4] is a technique using multiple ciphers of differ
ent types together, each to its best advantage. A hybrid cryptosystem can be con
structed using any two separate cryptosystems:
? A key has encapsulation scheme which is a public-key or any other type of cryp
tosystem.
? A data has encapsulation scheme which is a symmetric-key cryptosystem.
The hybrid cryptosystem is itself a public-key system, who s public and private ke
ys are the same as in the key encapsulation scheme. In place of public key syste
m we can use digital signature like message digesting function with symmetric ke
y system to make hybrid crypto system. Note that for very long messages the bulk
of the work in encryption/decryption is done by the more efficient symmetric-ke
y scheme, while the inefficient public-key scheme is used only to encrypt/decryp
t a short key value. For example, to encrypt a message addressed to user-1 in a
hybrid technique user-2 does the following [1, 8]:
1. Obtains user-1 public key.
2. Generates a fresh symmetric key
3. Encrypts the message using the symmetric key.
4. Encrypt the symmetric key using user-1 public key. Send both of these encrypt
ions to user-1.
To decrypt this hybrid cipher text, user-1 does the following:
1. User-1 uses her private key to decrypt the symmetric key.
2. User-1 uses this symmetric key to decrypt the message.
But in this paper we have used hash function in place of public key system. As w
e know that hash functions play an important role in digital signature schemes.
A digital signature is a cryptographic technique that produces the electronic eq
uivalent of a manual signature. This means that a digital signature can prohibit
the forging of a message by anybody else but the sender. Moreover the receiver
is given guarantee of the message's authenticity, in the sense that he can subse
quently prove to a third party that the message is authentic even if its origina
tor revokes it. The concept of a digital signature was suggested in 1976 by W. D
iffie and M. Hellman: [15] the sender transforms the information with a secret k
ey, and the receiver can verify the signature by applying the corresponding publ
ic key [7, 9]. Reason behind choosing this model is the security and efficiency.
Most interesting thing in this technique is the combination of two different te
chniques.
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume
3, Issue 8, August 2013)
109
Basically this technique is a method of encryption that combines two or more cry
ptography technique and usually includes a combination of symmetric and message
digesting function to take benefit of the strengths of each type of technique. S
ymmetric encryption has the performance advantage and therefore is the common so
lution for encrypting and decrypting performance-sensitive data, such as an onli
ne data stream. However, symmetric encryption has a downside, i.e. cryptographic
key needs to be known to both the sender and receiver of encrypted data, and th
e exchanging of the key over an insecure channel may cause security risks. On th
e other hand, message digesting provides better security in that the message dig
esting provides digital signature and support to integrity principal. Proposed r
esearch is the designing and implementation of a new Hybrid concept. Proposed te
chnique is a method of encryption that combines two or more cryptography techniq
ue and usually includes a combination of symmetric and message digesting techniq
ue to take benefit of the strengths of each type of cryptography. Basically ther
e are four security principles Confidentiality , Integrity , Authentication , and Non-Rep
diation . In which Symmetric Technique fulfill the concept of Confidentiality, it
also provide the performance advantage and therefore is the common solution for
encrypting and decrypting performance-sensitive data [12, 13, 14]. On the other
hand, message digests technique is fulfilling the authentication as well as inte
grity security principle concept to provide better security in the cryptography.
II. PROPOSED WORK
The block diagram of proposed hybrid crypto system is shown in figure 1, plain t
ext encrypted by proposed symmetric encryption algorithm to produce cipher text,
then message digesting function is also apply on plain text by using SHA-160 to
produce message digest of plain text. Now again applying proposed encryption te
chnique on produced message digest text so it will also convert in cipher text.
Now combine both Cipher Values (C1 and C2) into one and send to the receiver. At
receiver end, separate both cipher (C1 and C2) values and apply proposed decryp
tion algorithm one by one on each cipher value. From first cipher value plain te
xt will get and from second cipher value C2 message digest will get. Then apply
message digesting function SHA-1 on plain text which is produced during decrypti
on to produced message digest. Now finally comparing both message digests values
with each other for changes in message digest.
If both message digests are same then plain text securely received otherwise ori
ginal plain text is tempered by the hacker so drop the whole information.
Figure 1:- Block diagram of Proposed Hybrid crypto system
Proposed Architecture: Figure 2 is showing general architecture of the proposed
concept. In this figure user send a request to explorer to send text information
. Server executes this request and response to user in the form of display mail
page of the site. For example, user wants to send personal information in a file
through this mail in public network. First of all user will select confidential
information from file at user end and then send to other end but these confiden
tial information will not go directly to other end it will pass through the desi
gned system. This system uses security features like cryptography, with the help
of cryptography it will encrypt confidential information into cipher text and t
his cipher text will transmit to other end via public network. Basically the pro
posed concept using hybrid technique of cryptography where it s using proposed sym
metric algorithm as a symmetric technique and SHA-1 as message digesting techniq
ue where all the confidential information encrypt via proposed symmetric algorit
hm and authenticity of the information will be checked via SHA-1. After that it
will send cipher data and encrypted key to the other end.
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume
3, Issue 8, August 2013)
110
Figure 2: General Architecture of Proposed Encryption Concept
Figure 3 is showing the receiving end procedure. At receiving end receiver recei
ves cipher message C1 and C2, then receiver decrypt to C1 from proposed decrypti
on algorithm then plain message will again convert into message digest from prop
osed symmetric key. Here proposed model is trying to improve existing problem. I
n this research, proposed symmetric key are using series of logical function lik
e XOR, Circular Shift (Right, Left), feastial function, and these operations are
time efficient operations as compared to mathematical operation.
Figure 3: Gener

Anda mungkin juga menyukai