A New Way to Design and Implementation of Hybrid Crypto System for Security of t
he Information in Public Network
Ravindra Kumar Gupta1, Parvinder Singh2 1Assistant Professor, 2M.Tech Scholar, CSE, SSSIST Sehore (M.P) India Abstract In this paper, a new hybrid concept is proposed by analyzing the princip le of the hybrid cryptography based on the combination of symmetric and message digesting. Moreover, the security and performance of the proposed concept will a lso estimate. In proposed concept we designed a new symmetric encryption algorit hm and combine with SHA-1 message digesting function to provide hybrid nature. N ow the proposed system will try to improve exiting problem. In proposed system s ymmetric key will use series of logical functions like XOR, Circular Shift (Righ t, Left), Feastel function [6] and these operations are time efficient operation as compared to mathematical operation for providing confidentiality and authent ication. For integrity, proposed system use SHA-1[15] algorithm. Due to this rea son proposed system is efficient then existing system. The experimental results based on combination of symmetric and message digesting will approve the effecti veness of the proposed concept, and the combination of symmetric and message dig esting will show large variation in key space and provide high-level security. T he cipher text generated by this method will be approximately double in size as the plaintext, and will be suitable for practical use in the secure transmission of confidential information over the Internet. The purpose of hybrid cryptosyst ems is not to provide perfect or risk-free security. Rather, the purpose of cryp tography-based security is to protect information resources by making unauthoriz ed collection of the information or tampering with the information costly than t he existing potential value that might be gained. Good hybrid cryptography, when properly implemented and used, makes attempts to violate security cost-prohibit ive. Keywords-- Encryption, Decryption, Security, Image, Cryptography. I. INTRODUCTION Hybrid cryptography [1, 2, 3, 4] is a technique using multiple ciphers of differ ent types together, each to its best advantage. A hybrid cryptosystem can be con structed using any two separate cryptosystems: ? A key has encapsulation scheme which is a public-key or any other type of cryp tosystem. ? A data has encapsulation scheme which is a symmetric-key cryptosystem. The hybrid cryptosystem is itself a public-key system, who s public and private ke ys are the same as in the key encapsulation scheme. In place of public key syste m we can use digital signature like message digesting function with symmetric ke y system to make hybrid crypto system. Note that for very long messages the bulk of the work in encryption/decryption is done by the more efficient symmetric-ke y scheme, while the inefficient public-key scheme is used only to encrypt/decryp t a short key value. For example, to encrypt a message addressed to user-1 in a hybrid technique user-2 does the following [1, 8]: 1. Obtains user-1 public key. 2. Generates a fresh symmetric key 3. Encrypts the message using the symmetric key. 4. Encrypt the symmetric key using user-1 public key. Send both of these encrypt ions to user-1. To decrypt this hybrid cipher text, user-1 does the following: 1. User-1 uses her private key to decrypt the symmetric key. 2. User-1 uses this symmetric key to decrypt the message. But in this paper we have used hash function in place of public key system. As w e know that hash functions play an important role in digital signature schemes. A digital signature is a cryptographic technique that produces the electronic eq uivalent of a manual signature. This means that a digital signature can prohibit the forging of a message by anybody else but the sender. Moreover the receiver is given guarantee of the message's authenticity, in the sense that he can subse quently prove to a third party that the message is authentic even if its origina tor revokes it. The concept of a digital signature was suggested in 1976 by W. D iffie and M. Hellman: [15] the sender transforms the information with a secret k ey, and the receiver can verify the signature by applying the corresponding publ ic key [7, 9]. Reason behind choosing this model is the security and efficiency. Most interesting thing in this technique is the combination of two different te chniques. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 8, August 2013) 109 Basically this technique is a method of encryption that combines two or more cry ptography technique and usually includes a combination of symmetric and message digesting function to take benefit of the strengths of each type of technique. S ymmetric encryption has the performance advantage and therefore is the common so lution for encrypting and decrypting performance-sensitive data, such as an onli ne data stream. However, symmetric encryption has a downside, i.e. cryptographic key needs to be known to both the sender and receiver of encrypted data, and th e exchanging of the key over an insecure channel may cause security risks. On th e other hand, message digesting provides better security in that the message dig esting provides digital signature and support to integrity principal. Proposed r esearch is the designing and implementation of a new Hybrid concept. Proposed te chnique is a method of encryption that combines two or more cryptography techniq ue and usually includes a combination of symmetric and message digesting techniq ue to take benefit of the strengths of each type of cryptography. Basically ther e are four security principles Confidentiality , Integrity , Authentication , and Non-Rep diation . In which Symmetric Technique fulfill the concept of Confidentiality, it also provide the performance advantage and therefore is the common solution for encrypting and decrypting performance-sensitive data [12, 13, 14]. On the other hand, message digests technique is fulfilling the authentication as well as inte grity security principle concept to provide better security in the cryptography. II. PROPOSED WORK The block diagram of proposed hybrid crypto system is shown in figure 1, plain t ext encrypted by proposed symmetric encryption algorithm to produce cipher text, then message digesting function is also apply on plain text by using SHA-160 to produce message digest of plain text. Now again applying proposed encryption te chnique on produced message digest text so it will also convert in cipher text. Now combine both Cipher Values (C1 and C2) into one and send to the receiver. At receiver end, separate both cipher (C1 and C2) values and apply proposed decryp tion algorithm one by one on each cipher value. From first cipher value plain te xt will get and from second cipher value C2 message digest will get. Then apply message digesting function SHA-1 on plain text which is produced during decrypti on to produced message digest. Now finally comparing both message digests values with each other for changes in message digest. If both message digests are same then plain text securely received otherwise ori ginal plain text is tempered by the hacker so drop the whole information. Figure 1:- Block diagram of Proposed Hybrid crypto system Proposed Architecture: Figure 2 is showing general architecture of the proposed concept. In this figure user send a request to explorer to send text information . Server executes this request and response to user in the form of display mail page of the site. For example, user wants to send personal information in a file through this mail in public network. First of all user will select confidential information from file at user end and then send to other end but these confiden tial information will not go directly to other end it will pass through the desi gned system. This system uses security features like cryptography, with the help of cryptography it will encrypt confidential information into cipher text and t his cipher text will transmit to other end via public network. Basically the pro posed concept using hybrid technique of cryptography where it s using proposed sym metric algorithm as a symmetric technique and SHA-1 as message digesting techniq ue where all the confidential information encrypt via proposed symmetric algorit hm and authenticity of the information will be checked via SHA-1. After that it will send cipher data and encrypted key to the other end. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 8, August 2013) 110 Figure 2: General Architecture of Proposed Encryption Concept Figure 3 is showing the receiving end procedure. At receiving end receiver recei ves cipher message C1 and C2, then receiver decrypt to C1 from proposed decrypti on algorithm then plain message will again convert into message digest from prop osed symmetric key. Here proposed model is trying to improve existing problem. I n this research, proposed symmetric key are using series of logical function lik e XOR, Circular Shift (Right, Left), feastial function, and these operations are time efficient operations as compared to mathematical operation. Figure 3: GenerA New Way to Design and Implementation of Hybrid Crypto System fo r Security of the Information in Public Network Ravindra Kumar Gupta1, Parvinder Singh2 1Assistant Professor, 2M.Tech Scholar, CSE, SSSIST Sehore (M.P) India Abstract In this paper, a new hybrid concept is proposed by analyzing the princip le of the hybrid cryptography based on the combination of symmetric and message digesting. Moreover, the security and performance of the proposed concept will a lso estimate. In proposed concept we designed a new symmetric encryption algorit hm and combine with SHA-1 message digesting function to provide hybrid nature. N ow the proposed system will try to improve exiting problem. In proposed system s ymmetric key will use series of logical functions like XOR, Circular Shift (Righ t, Left), Feastel function [6] and these operations are time efficient operation as compared to mathematical operation for providing confidentiality and authent ication. For integrity, proposed system use SHA-1[15] algorithm. Due to this rea son proposed system is efficient then existing system. The experimental results based on combination of symmetric and message digesting will approve the effecti veness of the proposed concept, and the combination of symmetric and message dig esting will show large variation in key space and provide high-level security. T he cipher text generated by this method will be approximately double in size as the plaintext, and will be suitable for practical use in the secure transmission of confidential information over the Internet. The purpose of hybrid cryptosyst ems is not to provide perfect or risk-free security. Rather, the purpose of cryp tography-based security is to protect information resources by making unauthoriz ed collection of the information or tampering with the information costly than t he existing potential value that might be gained. Good hybrid cryptography, when properly implemented and used, makes attempts to violate security cost-prohibit ive. Keywords-- Encryption, Decryption, Security, Image, Cryptography. I. INTRODUCTION Hybrid cryptography [1, 2, 3, 4] is a technique using multiple ciphers of differ ent types together, each to its best advantage. A hybrid cryptosystem can be con structed using any two separate cryptosystems: ? A key has encapsulation scheme which is a public-key or any other type of cryp tosystem. ? A data has encapsulation scheme which is a symmetric-key cryptosystem. The hybrid cryptosystem is itself a public-key system, who s public and private ke ys are the same as in the key encapsulation scheme. In place of public key syste m we can use digital signature like message digesting function with symmetric ke y system to make hybrid crypto system. Note that for very long messages the bulk of the work in encryption/decryption is done by the more efficient symmetric-ke y scheme, while the inefficient public-key scheme is used only to encrypt/decryp t a short key value. For example, to encrypt a message addressed to user-1 in a hybrid technique user-2 does the following [1, 8]: 1. Obtains user-1 public key. 2. Generates a fresh symmetric key 3. Encrypts the message using the symmetric key. 4. Encrypt the symmetric key using user-1 public key. Send both of these encrypt ions to user-1. To decrypt this hybrid cipher text, user-1 does the following: 1. User-1 uses her private key to decrypt the symmetric key. 2. User-1 uses this symmetric key to decrypt the message. But in this paper we have used hash function in place of public key system. As w e know that hash functions play an important role in digital signature schemes. A digital signature is a cryptographic technique that produces the electronic eq uivalent of a manual signature. This means that a digital signature can prohibit the forging of a message by anybody else but the sender. Moreover the receiver is given guarantee of the message's authenticity, in the sense that he can subse quently prove to a third party that the message is authentic even if its origina tor revokes it. The concept of a digital signature was suggested in 1976 by W. D iffie and M. Hellman: [15] the sender transforms the information with a secret k ey, and the receiver can verify the signature by applying the corresponding publ ic key [7, 9]. Reason behind choosing this model is the security and efficiency. Most interesting thing in this technique is the combination of two different te chniques. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 8, August 2013) 109 Basically this technique is a method of encryption that combines two or more cry ptography technique and usually includes a combination of symmetric and message digesting function to take benefit of the strengths of each type of technique. S ymmetric encryption has the performance advantage and therefore is the common so lution for encrypting and decrypting performance-sensitive data, such as an onli ne data stream. However, symmetric encryption has a downside, i.e. cryptographic key needs to be known to both the sender and receiver of encrypted data, and th e exchanging of the key over an insecure channel may cause security risks. On th e other hand, message digesting provides better security in that the message dig esting provides digital signature and support to integrity principal. Proposed r esearch is the designing and implementation of a new Hybrid concept. Proposed te chnique is a method of encryption that combines two or more cryptography techniq ue and usually includes a combination of symmetric and message digesting techniq ue to take benefit of the strengths of each type of cryptography. Basically ther e are four security principles Confidentiality , Integrity , Authentication , and Non-Rep diation . In which Symmetric Technique fulfill the concept of Confidentiality, it also provide the performance advantage and therefore is the common solution for encrypting and decrypting performance-sensitive data [12, 13, 14]. On the other hand, message digests technique is fulfilling the authentication as well as inte grity security principle concept to provide better security in the cryptography. II. PROPOSED WORK The block diagram of proposed hybrid crypto system is shown in figure 1, plain t ext encrypted by proposed symmetric encryption algorithm to produce cipher text, then message digesting function is also apply on plain text by using SHA-160 to produce message digest of plain text. Now again applying proposed encryption te chnique on produced message digest text so it will also convert in cipher text. Now combine both Cipher Values (C1 and C2) into one and send to the receiver. At receiver end, separate both cipher (C1 and C2) values and apply proposed decryp tion algorithm one by one on each cipher value. From first cipher value plain te xt will get and from second cipher value C2 message digest will get. Then apply message digesting function SHA-1 on plain text which is produced during decrypti on to produced message digest. Now finally comparing both message digests values with each other for changes in message digest. If both message digests are same then plain text securely received otherwise ori ginal plain text is tempered by the hacker so drop the whole information. Figure 1:- Block diagram of Proposed Hybrid crypto system Proposed Architecture: Figure 2 is showing general architecture of the proposed concept. In this figure user send a request to explorer to send text information . Server executes this request and response to user in the form of display mail page of the site. For example, user wants to send personal information in a file through this mail in public network. First of all user will select confidential information from file at user end and then send to other end but these confiden tial information will not go directly to other end it will pass through the desi gned system. This system uses security features like cryptography, with the help of cryptography it will encrypt confidential information into cipher text and t his cipher text will transmit to other end via public network. Basically the pro posed concept using hybrid technique of cryptography where it s using proposed sym metric algorithm as a symmetric technique and SHA-1 as message digesting techniq ue where all the confidential information encrypt via proposed symmetric algorit hm and authenticity of the information will be checked via SHA-1. After that it will send cipher data and encrypted key to the other end. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 8, August 2013) 110 Figure 2: General Architecture of Proposed Encryption Concept Figure 3 is showing the receiving end procedure. At receiving end receiver recei ves cipher message C1 and C2, then receiver decrypt to C1 from proposed decrypti on algorithm then plain message will again convert into message digest from prop osed symmetric key. Here proposed model is trying to improve existing problem. I n this research, proposed symmetric key are using series of logical function lik e XOR, Circular Shift (Right, Left), feastial function, and these operations are time efficient operations as compared to mathematical operation. Figure 3: Gener