Design and Construction of Computer Control Switches System

advertisement
Secure Information Exchange System for
Criminal Cases
Aye Mya Thwe
Abstract –Nowadays, networks like internet applications supply
essential communication between millions of people as well as the
security of information transmitted over the unsecured networks
becomes a tremendously important fact. Therefore, different kinds
of security features are used to meet the security demand. This
paper presents a proposed model to provide the information secrecy
for criminal cases. With the help of proposed technique of
encryption and decryption, ciphertext or encrypted text will be
generated and plaintext (.txt and .jpg) or decrypted text will be
gotten by applying the reverse process. To support confidentiality of
plaintext, two different kinds of symmetric algorithms such as
Blowfish and Twofish are used. To transfer over the communication
channel, the encrypted files are compacted with Ionic compression
method. C# programming language is used to implement the
system.
Keywords
-
compression, cryptography, encryption,
security, symmetric encryption algorithms
I. INTRODUCTION
The computer and communication technology’s today
are very important parts for a strong economy, thus it is
important to have suitable security standards systems and
technologies to meet that security needs [1]. To provide
the security requirement, cryptography stands a major
role.
Cryptography underlines many of the security
mechanisms and builds the science of data encryption and
decryption. Cryptography enables us to securely store
sensitive data or transmit across insecure networks such
that it cannot be read by anyone except the intended
recipient. By using a powerful tool such as encryption we
gain privacy, authenticity, integrity, and limited access to
data [1].
Many encryption algorithms are widely attainable and
utilized for information security. There are two basic
types of encryption algorithm: Secret Key Cryptography
which is also known as Symmetric Key Cryptography
and Public Key Cryptography which is also known as
Asymmetric Key Cryptography. Symmetric Key
Algorithms are the quickest and most commonly used
type of encryption. Encryption can be used to protect
information, but some other techniques are still needed to
make security, particularly to verify the message
authenticity and integrity. This paper aims to build an
efficient and strengthen information exchange system
between communities. In this work, two distinctive types
of symmetric encryption algorithms are used to succeed
good security and a compression technique is applied to
be more convenient in data transfer.
II. RELATED WORKS
In the present, several security features have applied to
make the data secure from various attacks and for the
integrity of data.
First Author Name, Department of Information Technology, Aye
Mya
Thwe,
Mandalay
Technological
University,
(email:
ayelaymtu@gmail.com),
Mandalay,
Republic
of
Myanmar,
+959423660204.
In [2], the authors carried out a research to optimize
the existing standards of cryptography (AES) for the
images and text data encryption. The basic aim of their
work is to modify AES to provide less computation and
better security for data.
Then, encryption and decryption of images using
secret-key block cipher called 64-bits Blowfish was also
described in [3]. The main aim of this work is to get the
best security/performance tradeoff over existing ciphers.
This paper is intended to develop a security system for
multimedia data about criminal cases by applying
symmetric key algorithms and compression method.
III. OVERVIEW OF CRYPTOGRAPHY
“Cryptography” derives from the Greek word kruptos,
meaning “hidden”. Cryptography enables to store
sensitive information or transmit it across insecure
networks (like the Internet) so that it cannot be read by
anyone except the intended recipient.
A cryptographic algorithm, or cipher, is a
mathematical function used in the encryption and
decryption process. A cryptographic algorithm works in
combination with a key-a word, number, or phrase-to
encrypt the plaintext. The security of encrypted data is
entirely dependent on two things: the strength of the
cryptographic algorithm and the secrecy of the key. A
cryptographic algorithm, plus all possible keys and all the
protocols that make it work comprise a cryptosystem.
There are two basic types of cryptography: Symmetric
Key (Secret Key Cryptography) and Asymmetric Key
(Public Key Cryptography).
In secret key cryptography, a single key is used for
both encryption and decryption. As shown in figure 1, the
sender uses the key (or some set of rules) to encrypt the
plaintext and sends the ciphertext to the receiver [4].
Hello
Plaintext
Encryption
Hello
Plaintext
A1@
cipher
Decryption
Figure 1. Secret Key Cryptography
In public key cryptography, two keys are used: one for
encryption (public key) and other is decryption (private
key). Although public key is published for anyone to use
and encrypt messages, only the recipient has access to the
private key that capable of reading the encrypted
messages.
Plaintext (64 bits)
Hello
Plaintext
32
Hello
Plaintext
P1
P2
Encryption
(Receiver Public Key)
A1@
cipher
32
+
F
+
F
+
+
Encryption
(Receiver Private Key)
13
iteration
Figure 2. Public Key Cryptography
IV. SYMMETRIC ENCRYPTION ALGORITHMS
Symmetric keys encryption or secret key encryption
use only one key is used to encrypt and decrypt data. The
key should be distributed before transmission between
entities. Keys play an important role in encryption and
decryption. If weak key is used in algorithm then
everyone may decrypt the data. Strength of the symmetric
key encryption depends on the size of the key used. For
the same algorithm, encryption using longer key is harder
to break than the one done using smaller key [5].
Symmetric key cryptographies are generally categorized
as stream ciphers and block ciphers.
Stream ciphers operate on a single bit (byte or
computer word) at a time [4].
A block cipher is so-called because the scheme
encrypts one block of data at a time using the same key
on each block [4].
There are a number of block cipher algorithms such as
RC2, AES, DES, Triple DES, Twofish, RC6 and
Blowfish. Symmetric key block ciphers are used at the
proposed system. For text encryption, Blowfish is applied
and Twofish is used for image encryption.
P16
+
+
F
P18
P17
+
+
32
32
Ciphertext (64 bits)
Figure 3. Feistel Structure of Blowfish Cipher
B. Twofish Encryption Algorithm
In cryptography, Twofish is a symmetric key block
cipher with a block size of 128 bits and key sizes up to
256 bits. Twofish’s distinctive features are the use of precomputed key-dependent S-boxes, and a relatively
complex key schedule. Twofish borrows some elements
from other designs; for example, the Pseudo-Hadamard
Transform (PHT) from the SAFER family of ciphers.
Twofish has a Feistel structure like DES [7].
Plaintext(128 bits)
K0
K1
F
K2
g
K2r+8
S-box 0
S-box 1
S-box 2
K3
Input
whitening
<<<1
PHT
MD
S
S-box 3
A. Blowfish Encryption Algorithm
Blowfish, a symmetric block cipher, uses a Feistel
network, 16 rounds of iterative encryption and decryption
functional design. The block size of blowfish algorithm is
64 bits, and the key size may be of any length but having
a limit up to 448 bits. The power of the blowfish
algorithm relies on its sub-key generation and its
encryption.
Blowfish cipher uses 18 each of 32-bit sun arrays
commonly known as P-boxes and four Substitution boxes
each of 32 bit size and having 256 entries each. It uses a
Feistel cipher which is a general method of transforming
a function into another function by using the concept of
permutation. The working of blowfish cipher can be
illustrated as follows,
It splits the 64 bit block into two equal blocks having
32 bit size each. Left block is XORed with first sub array
P1 and then obtained result is fed into a function called Ffunction. Inside the F-function substitution operations are
carried out which in turn converts 32 bit blocks into
another 32 bit blocks. Then resulted 32 bit entries are
XORed with the right half and the result obtained is
swapped with the left half for the next round. So, after the
successful completion of each round right half becomes
the new left half or vice versa and Feistel structure is
followed up to 16 rounds. The resultant left and right
halves are not swapped but XORed with the seventeenth
and eighteenth P-arrays. The Feistel structure of blowfish
algorithm is shown in the figure 3[6].
One round
g
S-box 0
S-box 1
<<<8
S-box 2
MD
S
S-box 3
K2r+9
>>>1
15 more
rounds
Undo last
swap
K4
K5
K6
K7
Output
whitening
Ciphertext(128 bits)
Figure 4. Structure of Twofish algorithm
Figure 4 shows an overview of the Twofish encryption
algorithm. The two words on the left are used as input to
the g functions after the rotations by 8 bits of one of
them. The g function consists of four byte-wide keydependent S-boxes, followed by a linear mixing step
based on an MDS matrix. The results of the two g
functions are combined using a Pseudo-Hadamard
Transform (PHT), and two keywords are added. One of
the words on the right is rotated by 1 bit and then both of
them are XORed into the results on the left. The left and
right halves are then swapped for the next round. After 16
rounds, the swap of the last round is reversed, and the
four words are XORed with four more key words to
produce the ciphertext [8].
V. PROPOSED SYSTEM DESIGN
The proposed system utilizes two symmetric
algorithms for encryption which supply high security to
the culprit’s record. And, to be more convenient the data
transfer, ionic compression is used too. The same key
length (128 bits) is used for two algorithms. There are
two portions in the proposed system design. The
following figure 5 and figure 6 illustrate the process of
sender site and receiver site.
Secret key
Encrypt with Blowfish
Algorithm
Plaintext
Q!r@#12ter#8@%
^{+)io*;’ab5(!~9?/”\e0>,:ng$
Ciphertext
Ionic Zip Compression
Database
Aung thiha
Aung Lay
U Hla Khin
Compressed
File
Send
Encrypt with Twofish
Algorithm
Figure 7. Welcome Form
Secret key
After clicking the start button, the log in form will
appear as shown in figure 8.
Figure 5. Process of Sender Site
As illustrated in figure 5, initially, the user has to load
the culprit record (text and image) from the database. The
text file (.txt) is encrypted with a secret key using
Blowfish algorithm. Then, the image file (.jpg) is
encrypted with another key but same length using
Twofish algorithm. And then, the ciphertexts, encrypted
text and image, are compressed with ionic zip
compression technique. After that, the compressed file is
transmitted to the intended receiver through the mail
server.
At this form, user name and password has to fill by the
user to log in the system. If this user is authorized person,
the main window form (figure 9) can be seen.
Secret key
Compressed
File
Decrypt with Blowfish
Algorithm
Ciphertext
Aung thiha
Aung Lay
U Hla Khin
Plaintext
Database
Received
data
Ionic Zip Compression
Q!r@#12ter#8@%
^{+)io*;’ab5(!~9?/”\e0>,:ng$
Figure 8. Login Form
Decrypt with Twofish
Algorithm
Secret key
Figure 6. Process of Receiver Site
The decryption process of receiver site is shown in
figure 6. The procedure of receiver site is the reverse of
the sender’s. The original data is recovered by
decompressing and decrypting with the keys those are
employed in the encryption.
VI. IMPLEMENTATION AND RESULT
The following results are generated by implementing
the proposed system. In this paper, the results are
displayed with a series of interfaces. Firstly, the user can
see the welcome window form as main interface and can
continue by pressing start button as shown in figure 7.
Figure 9. Main Form
In this form, the user can do the work such as editing,
updating, deleting or transferring about the culprit’s
information from the database. Figure 10 shows the
information of culprit.
Figure 10. Culprit Information
As illustrated in figure 11, the user can update the
culprit record.
Figure 13. Send Form
For the security purpose, the culprit’s record that
would like to transfer must be encrypted with
corresponding encryption algorithms before sending.
Figure 14 shows the text encryption result using
Blowfish.
Figure 11. Update Form
The user can easily search the culprit’s image and
information by filling the culprit’s name and his other
information by using search form (figure 12).
Figure 14. Text Encryption with Blowfish Algorithm
The encryption result of image file applying Twofish
algorithm is illustrated in figure 15.
Figure 12. Search Form
Figure 15. Image Encryption with Twofish Algorithm
The culprit’s record from the database can be
transferred from one police station to another via email
by utilizing send form (figure 13).
And then, these encrypted files are compressed with
ionic compression technique to obtain all in one.
the facilities throughout the research. Moreover, the
author would also like to express her appreciation and
thanks to her all the respected teachers from Department
of Information Technology, Mandalay Technological
University, beloved parents and her close friends for their
invaluable suggestions and their kind help through this
work.
[1]
[2]
Figure 16. File Compression with Ionic Compression
[3]
After all, the compressed file is send to the recipient
via the mail sever.
[4]
[5]
[6]
[7]
[8]
Figure 17. File Transmission to the Intended Receiver
At the recipient, the original information of culprit can
be obtained by processing the reverse operation as the
sender site.
The proposed system is designed to provide good
protection for transferring culprit’s information between
police stations. Because of computer-based system, it also
promises saving time, money and human resources.
VII. CONCLUSIONS
Today’s crypto world, various encryption techniques
are used to prevent the multimedia content from
unauthorized users. This paper proposes a security system
which provides good security to the culprit’s record (.txt
and .jpg). In this work, two symmetric encryption
algorithms are used to encrypt the text data and image. As
further extensions, hybrid cryptosystems can be designed
using the combination of both symmetric and asymmetric
(public-key) encryption algorithms. Furthermore,
culprit’s record about criminal cases such as audio and
video files can be attempted for encryption processes.
ACKNOWLEDGMENT
I wish to express my profound gratitude to Ministry of
Science and Technology for encouraging to performed
researches. The author would also like to express her
appreciation and thanks to Dr. Su Wai Phyo, Associate
Professor, Department of Information Technology,
Mandalay Technological University for her supporting
REFERENCES
Malek Jakob Kakish, “Enhancing The Security Of The RSA
Cryptosystem”, IJRRAS 8(2).August 2011.
www.arpapress.com/Volumes/Vol8Issue2/IJRRAS_8_2_14.pdf
Sumira Hameed, F.Riaz, Riaz Moghal, G.Akhtar, Anil Ahmed and
A.G.Dar, “Modified Advanced Encryption Standard For Text And
Images”, Computer Science Journal. Volume 1, Issue 3, December
2011.
Irfan.Landge, B.Contractor, Aamna Patel and R.Choudhary,
“Image encryption and decryption using blowfish algorithm”,
World Journal of Science and Technology 2012, 2(3):151-156.
Ayushi, “A Symmetric Key Cryptographic Algorithm”, 2010
International Journal of computer Applications (0975-8887)
Volume 1-No.15.
M A Matin, Md.Hossain, Md Foizul Islam, M.Islam and M
Mofazzal Hossain, “Performance Evaluation of Symmetric
Encryption
Algorithm
in
MANET
and
WLAN”,
http://ieeexplore.ieee.org/iel5/5403229/5412038/05412055.pdf%3
Farnumber%3D5412055.
MANILANDAN.G, R.P, CHAKARAPANI.K, K.G and
SUNDARGANESH.G, “A MODIFIED CRYPTO SCHEME FOR
ENHANCING DATA SECURITY”, Journal of Theoretical and
Applied Information Technology 31st January 2012 Vol.35 No.2.
“Twofish”, http://en.wikipedia.org/wiki/Twofish.
Horatiu Paul Stancu, “Twofish Encryption Algorithm”, CS_627:
Cryptology,
Fall
2004.
https://users.cs.jmu.edu/abzugcx/public/Student-Produced-TermProjects/Cryptology-2002-SPRING/Tw...
Download