MODIFIED DES WITH PAIRING FUNCTIONS Dr. S. Kiran

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015
MODIFIED DES WITH PAIRING FUNCTIONS
Dr. S. Kiran#1, N. Subramanyan*2, Dr. T. Bhaskar Reddy#3, G. Madhavi*4
#1
Assistant Professor, Department of CSE
Y.S.R. Engineering College of YV University, Proddatur, Andhra Pradesh, India.
*2
Teaching Assistant, Department of CSE
Y.S.R. Engineering College of YV University, Proddatur, Andhra Pradesh, India.
#3
Professor & Head, Department of CST
Sri Krishna Devaraya University, Ananthapuram, Andhra Pradesh, India.
*3Assistant Professor, Department of CSE
MeRITS, Udayagiri, Andhra Pradesh, India.
1
2
3
rkirans125@gmail.com
subramanyam.neelam@gmail.com
bhaskarreddy_sku@yahoo.co.in
4
godi.madhavi@gmail.com
Abstract— The process of exchanging information in secured
way is called cryptography. Security is achieved for message
with Encryption process at the sender end and Decryption
process at the receiver end. Many Ciphers are developed to
provide data protection. The effectiveness of the Ciphers that
are being used depends mainly on their throughput and
memory constraint. Using of large key with huge number of
rounds with multiple complex operations may provide high
security. Because of this reason the proposed method consists
of 16 rounds, 512-bit key with 8-different rounding functions.
The key is generated by taking 512-bit random number.
Shifting operation is performed on random number based on
number of 1’s and 0’s in random number. Permutation will be
applied on shifted bits. Encryption will be done by taking
1024-bit plain text. Initially plain text will be permutated then
rounding function is performed.. In rounding function key and
permuted result will be encrypted to generate intermediate
cipher text. Intermediate cipher text will be given to pairing
function to generate final cipher text.
Keywords— Round Function, Pairing Function, Shifting,
Permutation.
I. INTRODUCTION
Cryptography[1,3] is the study of clandestine writing. It is
the art of transferring a decipherable message into one which
is indecipherable, and then retransforming that message back
into its original form. The message which is in intelligible
format is plaintext. The plaintext is converted into cipher text
which is in illegible form, by applying encryption algorithm.
The process of converting cipher text into plaintext is known
as decryption. The process of cryptography results in
concealing the context of message from all, except the sender
and the receiver.
Cryptography has many viable applications. Cryptography
shows alternate solutions to many problems like
ISSN: 2231-5381
confidentiality, data integrity, authentication, non repudiation.
The main traditional cipher types are transposition ciphers and
substitution ciphers [2,4,8]. A transposition cipher is one,
which rearranges the order of letters in a message. Where as in
substitution method, each alphabet in text is replaced by other
letter methodically.
II. EXISTING METHOD
A. Encryption
Step1: Start.
Step2: Consider 64-bit key and retrieve 56-bits from it.
Step3: Perform left circular shift and take 48-bits this is the
key-N for round-N.
Step4: Continue Step3 for all rounds.
Step5: Take the plain text and perform initial permutation.
Step6: Step5 result and key-1 will be given to rounding
function-1.
Step7: Above step result and next key (key-N) is given to
next rounding function-N.
Step8: Continue the process for 16-rounds.
Step9: Perform 32-bit swap on round-16 result.
Step10: Perform inverse initial permutation on step9 which
generates final cipher text.
Step11: Stop.
B. Decryption
Reverse process of encryption.
III. LIMITATIONS OF EXISTING METHOD
It uses same round function for all the rounds.
Key length is very small.
IV. PROPOSED METHOD
A. Encryption
Step1: Start.
http://www.ijettjournal.org
Page 1
International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015
Step2: Consider 512-bit random number [5] and divide it
into two half‟s.
Step3: In first half number of 1‟s is even then perform left
shift otherwise perform right shift.
Step4: In second half number of 0‟s is even then perform
left shift otherwise perform right shift.
Step5: Take the result of step3 and step4 perform
permutation-2.
Step6: Result of step5 is the key for rounding function-N,
Where N=1, 2….16.
Step7: By taking key as 512-bit random number repeat the
procedure from step2 to generate keys for all the
rounds.
Step8: Input the plain text message to be transmitted.
Step9: Read 1024-bit plain text at a time and perform
permutation-1.
Step10: Result of Step9 and key1 (K1) is given to the
rounding function-1.
Step11: Result of round function-1 and key2 (K2) is given
to the rounding function-2.
Step12: Continue for all rounds, output of rounding
function-16 is given to the pairing function which
generates final cipher text.
Step13: Stop.
B. Decryption
Step1: Start.
Step2: Take 512-bit random number (Considered in
Encryption) and divide it into two half‟s.
Step3: In first half number of 1‟s is even then perform left
shift otherwise perform right shift.
Step4: In second half number of 0‟s is even then perform
left shift otherwise perform right shift.
Step5: Take the result of step3 and step4 perform
permutation-2.
Step6: Result of step5 is the key for rounding function-N
Where N=1, 2….16
Step7: By taking key as 512-bit random number repeat the
procedure from step2 to generate keys for all the
rounds.
Step8: Input the cipher text message.
Step9: Read 512-bit cipher text at a time, and given it to the
reverse pairing function.
Step10: Result of above step (1024-bit) and key16 (K16) is
given to the rounding function-16.
Step11: Result of Step10 and key15 (K15) is given to the
rounding function-15.
Step12: Continue for all rounds, Perform inverse
permutation-1 for the output of rounding function-1.
Step13: Output of inverse permutation-1 is the plain text.
Step14: Stop.
C. Pairing Function
A pairing function[6,7] on a set A associates each pair of
members from A with a single member of A, so that any two
distinct pairs are associated with two distinct members.
ISSN: 2231-5381
D. Cantor pairing function
When x and y are non−negative integers, CantorPair[x, y]
outputs a single non−negative integer that is uniquely
associated with that pair.
Fig 1. Cantor pairing
E. Elegant pairing function
When x and y are non−negative integers, ElegantPair[x, y]
outputs a single non−negative integer that is uniquely
associated with that pair.
Fig 2. Elegant pairing
F. Rounding Function
The proposed structure recommends 16 rounds and
different round functions which are selected using Multiplexer
Circuit. Let the rounding function for round 1 to round 16 be
RF1, RF2, etc. up to RF8 and again from RF1 to RF8. The
user can incorporate their own round functions for designing
the cipher[4]. The round function which have been selected in
the present Design includes: EX-OR,EX-NOR, NOT (Key
bits „0‟), NOT (Key bits „1‟), CIRCULAR LEFT SHIFT(Key
bits „0‟), CIRCULAR LEFT SHIFT(Key bits „1‟),
http://www.ijettjournal.org
Page 2
International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015
CIRCULAR RIGHT SHIFT(Key bits „0‟), CIRCULAR
RIGHT SHIFT(Key bits „1‟)
Selection
S3 S2 S1 S0
0
0
0
0
0
0
0
1
0
0
1
0
0
0
1
1
0
1
0
0
0
1
0
1
0
1
1
0
0
1
1
1
1
0
0
0
1
0
0
1
1
0
1
0
1
0
1
1
1
1
0
0
1
1
0
1
1
1
1
0
1
1
1
1
H. Flow Chart for Encryption and Decryption:
Round Function
RF1
RF2
RF3
RF4
RF5
RF6
RF7
RF8
RF1
RF2
RF3
RF4
RF5
RF6
RF7
RF8
G. Flow Chart for Key Generation:
Fig 4. Flow chart for encryption and decryption
I. Flow Chart for Single Round Encryption:
Fig 5. Flow chart for single encryption
J. Result:
For encryption and decryption process following key 512
bit random number is considered as key:
Fig 3. Flow chart for key generation
ISSN: 2231-5381
93846850055346952473693261358674973005706669900250
87889452229210992649003087234541419063293183209107
http://www.ijettjournal.org
Page 3
International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015
31896143537510130467171983464486246753893459865583
5953
Consider plaintext as: “To understand steganography, one
must first understand its predecessor: cryptography.
Cryptography is the art of protecting info”
Intermediate Cipher text
Character
Character
1,3,…127
2,4,….128
Cipher
text
Intermediate Cipher text
Character
Character
1,3,…127
2,4,….128
Cipher
text
187
152
115634
115
9
15730
236
213
202522
51
103
23972
0
209
43890
138
69
43332
54
100
23978
129
167
88170
4
12
280
122
164
82326
191
209
160782
117
90
43290
240
146
149862
74
60
18238
184
125
96158
88
9
9682
63
130
37568
35
246
79312
146
151
88798
196
5
40994
85
172
66476
108
98
42858
152
77
52974
181
76
66668
138
174
97932
170
202
139096
49
206
65378
88
184
74432
77
144
49216
138
167
93606
69
134
41550
140
185
106230
74
30
11068
48
215
69528
143
138
79528
241
91
111038
41
192
54604
76
88
27212
9
134
20610
104
117
49270
237
55
86030
90
248
114762
240
122
131886
132
165
88770
14
108
15034
135
41
31422
54
164
47850
176
193
136882
72
235
94700
26
133
25492
176
101
77358
59
196
65398
96
97
37634
241
211
205238
172
81
64606
73
197
73316
193
171
133246
245
126
138502
32
77
12054
30
197
51816
76
19
9272
13
143
24518
144
145
84098
148
249
158302
ISSN: 2231-5381
V. FEATURES OF PROPOSED ALGORITHM
Vigorous key- uses maximum of 2512 possibilities to
guess the key.
Different round functions and Pairing functions.
Fast transmission.
http://www.ijettjournal.org
Page 4
International Journal of Engineering Trends and Technology (IJETT) – Volume X Issue Y- Month 2015
VI. CONCLUSION
The role of cryptography is to provide a very high degree of
security for the information. In the proposed method 16
rounds of encryption is done with different rounding functions
to increase the security. The final cipher text is reduced to half
of the plain text with pairing functions. Further the length of
the key can be increased to more than 512. The number of
rounding functions may also be increased to enhance the
security. New pairing functions may be derived from the
existing which makes more complex in cipher generation.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
William Stallings. Cryptography and Network Security, Principles and
Practices, Forth Edition, Prarson Education, 2008.
Introduction to Modern Cryptography, Jonathan Katz, Yehuda Lindell
Chapman & Hall /CRC Taylor RFrancisGroup.
Information Security: Text Encryption and Decryption with Poly
Substitution method and combining features of cryptography.R.Venkateswaram, Dr.V.Sundaram ,June 2010.
Applied Cryptography Protocols, Algorithms and Source Coding
BRUE SCHNEIER, Second Edition, John Wiley & Sons, Inc.
S G Srikantaswamy, Dr. H D Phaneendra, “Improved Caesar Cipher
with Random Number Generation Technique and Multistage
Encryption”, International Journal on Cryptography and Information
Security (IJCIS). Vol. 2, No.4. pp. 39-49, December 2012.
PairingFunction, http://en.wikipedia.org/ wiki/Pairing_function.
pairinglattices,books.google.co.in/books.
Encipher, A Text Encryption and Decryption Technique using
Substitution-Transposition and Basic Arithmetic and Logical Operation.
Devendra Prasad, Govind Prasad Arya, Chirag Chaudhary, Vipin
Kumar, IJCSIT.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 5
Download