Uploaded by 044e0a9480

CE Text File Encryption And Decryption-format

advertisement
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
Text File Encryption and Decryption by FFT and IFFT
Algorithm Using Lab view
D Narmatha, W Jenifa, M Merlin Moses, J Prem Kumar
Assistant Professor, Department of Electronics and Communication Engineering, Einstein College of
Engineering, Tamil Nadu, India
Email: niranjnarmi@gmail.com
DOI: http://doi.org/10.5281/zenodo.3525834
Abstract
An approach to encrypt and decrypt the text files using FFT and IFFT algorithm respectively.
Cryptography involves encryption and decryption process. The use of data encryption is to
provide security to the confidential data from unauthorized access. Decryption is the
conversion of encrypted data into original information. The design is implemented in Lab
VIEW software. The basic operations include conversion of characters from text file into
encrypted data in encryption module. The retrieval of original information is done at the
decryption module.
Keywords: Decryption, encryption, FFT, IFFT
INTRODUCTION
Security is the most important aspect in the
field of internet and network application.
To facilitate secret communication by the
government and Militaries encryption is
used. Teodorescu et al explains presents a
software application for studying of the
most
used
methods
for
text
encryption/decryption these techniques are
applied to encryption of a text files. The
main aspects of encryption techniques can
be analyzed, like the text encryption
strength as well as the complexity of
algorithm implementation and processing
resources involved. Because of the
advantages of visual programming
languages like Lab VIEW, users can easily
understand programming techniques for
different encryption/decryption methods
and data manipulation, and they can
modify the application to add new
functionalities or to implement other
algorithms [1]. Sarma et al., deals with text
8
file encryption and decryption. Encryption
has always been very important part of
military communication. To achieve a very
high degree of security digital encryption
techniques
being
used.
Digital
transmission adopts scrambling technique
which provide high level security for
communication.
There
are
many
traditional scrambling methods used in
single dimension such as time or
frequency domain scrambling [2]. Arpneek
Kaur et al., approaches briefly about the
symmetric key cryptography algorithms
such as AES, DES, 3DES, Blowfish etc. It
explains
the
individual
algorithm
characteristics and methods. It also
highlights the character of symmetric
cryptography as it is almost impossible to
break the encryption algorithm without
knowing the exact key value because of
internal key generation with the reference
of entered key. The memory requirement
of symmetric algorithms is lesser than
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
asymmetric encryption algorithms and a
symmetric key algorithm runs faster than
asymmetric key algorithms. Nithya
Chidambaram et al., deals with the data
partitioning, shuffling and encryption
techniques that are used to preserve
confidentiality [3]. In the proposed
method, the data is encrypted through the
deterministic algorithm. Four different
keys are used for encryption and
decryption Two of the keys are used for
achieving confusion for numeric data and
the remaining three keys are used for
encrypting alpha-numeric data when the
data is not highly sensitive and for lowlevel security is sufficient. The plain text
which is to be converted to cipher text is
loaded to the encryption system and the
encrypted file is stored. The cipher text
from the storage system is loaded to the
decryption system and it is decrypted back
to plain text. Secret key is always to the
data owner or the Administrator. This
approach provides a hybrid scheme for
information security using Laboratory
Virtual Information Engineers workbench
(Lab-View) tool [4].
PROPOSED METHODOLOGY
Cryptography involves two processes
namely, encryption and decryption. Data
encryption translates data into another
form called a decryption key or cipher text
can read it. Data or plaintext is encrypted
with an encryption algorithm and an
encryption key. The main purpose of data
encryption
is
to
maintain
the
confidentiality of the digital data.
In our proposed system, the characters
from the original text file are extracted.
The next step involves the application of
ASCII codes for the respective characters
of the plain text. The codes are subjected
to FFT algorithm for further process of
encryption. A series of complex numbers
are obtained as the result of frequency
domain conversion.
The obtained complex numbers are
multiplied with a desired key number.
Thus the obtained complex numbers are
the required encrypted data. These
numbers are converted into a binary data.
This binary data is overwritten in new text
file which acts as the transmitting file. Fig.
1 represents the flow diagram of
encryption process.
The discrete Fourier transform can be
computed in more efficient way by means
of fast Fourier transform. Generally, N
complex valued numbers X (k) is
computed by the data sequence x(n) of
length N is given by the formula:
( )
Where,
∑ ( )
⁄
.
is the twiddle factor. The fast Fourier
transform can be computed in two ways,
either by using the formula represented
above or known as direct computation
method or by using the butterfly diagram
or known as radix algorithm method.
Encryption Process
9
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
ORIGINAL TEXT FILE
EXTRACTING THE
CHARACTERS
CONVERT THE
CHARACTERS TO
ASCII CODE
CONVERT THE ASCII
CODE TO FREQUENCY
DOMAIN
ENCRYPTION
PROCESS
KEY
WRITE THE
ENCRYPTED DATA
INTO A FILE
ENCRYPTED TEXT
FILE
Figure 1: Flow diagram for encryption.
In radix algorithm method there are two
ways:
 Decimation in time-FFT
 Decimation in frequency-FFT
In DIT-FFT the input sequence, the input
sequence is shuffled and output sequence
is in order. In DIF-FFT the input sequence,
the input sequence is in order and output
sequence is in shuffled in manner.
Decryption Process
The conversion cipher text data into its
original form of plaintext is called
Decryption. During the process of
decryption, all the binary coded characters
are extracted from the transmitted binary
10
file. These binary characters are converted
into frequency domain values as complex
numbers. The following step involves
keying process in the decryption end.
Thus, the complex numbers are obtained
and they are converted into ASCII code
using IFFT process, i.e., the frequency
domain complex values are converted into
time domain values. The next step
involves representing the encrypted
characters for the respective ASCII codes.
The final step of decryption involves
writing the decrypted text data in new text
file.
Fig. 2 represents the flow diagram for
decryption process.
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
RECEIVED
ENCRYPTED FILE
DECRYPT THE
CHARACTERS
USING KEY
KEY
CONVERT THE
FREQUENCY
DOMAIN TO ASCII
CODE
EXTRACT THE
CHARACTERS
FROM ASCII
CODE
DISPLAY THE
DECRYPTED DATA
DECRYPTED TEXT FILE
OUTPUT
Figure 2: Flow diagram for decryption.
The process of converting the frequency
domain signal to the time domain signal is
called as inverse Fourier Transform. It is
the reverse process of Fourier Transform.
( )→
( )
The equation of inverse continuous time
Fourier transforms is given as:
( )
∫
(
( )
∑ ( )
)
The equation of inverse discrete time
Fourier transforms is given as:
( )
∑
( )
Inverse Fast
Fourier Transform is the reverse process of
fast Fourier transform is the inverse fast
11
Fourier transform. FFT algorithms can be
used to compute Inverse DFT (IDFT)
without any change in
the algorithm. The direct computation
method is performed by the formula given
below:
⁄
Where,
is the twiddle
factor. It can also computed by radix
algorithm.
RESULTS AND DISCUSSION
The result contains the output of text files
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
created during the process of encryption
and decryption. The first step involves the
creation of VI in the LabVIEW software
tool. This VI consists of two panel-front
panel and block diagram. The front panel
is the user interface which interacts with
the user. The block diagram consists of
internal parts which builds the whole
process.
The block diagram for the encryption
process is created. The file path of to be
encrypted was provided. Another path of
the empty text file was provided. In this
file, the encrypted binary output is
rewritten. The Fig. 3 shows block diagram
of the proposed encryption module. The
front panel is the user interface and the
front panel window is shown in the Fig. 4.
Figure 3: Block diagram of encryption module.
Figure 4: Front panel of the encryption module.
12
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
Figure 5: Original information text file.
As the result of encryption process, the
original text file information (Fig. 5), is
converted
into
the
cipher text
information and it is overwritten in the
empty text file path provided (Fig. 6).
Figure 6: Encrypted binary text file.
The created binary text file (Fig. 5), is
used for transmission. The path of this file
was provided at the decryptor module
front panel. The decryption process is done
and the resultant text is displayed. The
decryptor module performs the following
function:
 Extracting the characters from



encrypted file.
Conversion of Cipher text into numeric
data.
Performing the IFFT function.
Conversion of inverted answers into
characters and obtaining original
information.
Figure 7: Block diagram of decryption module.
13
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
Figure 8: Front panel of decryption module.
Figure 9: Decrypted information file.
The Fig. 7 and 8 represents block diagram
and front panel of decryption module
respectively. The information is decrypted
and displayed in the front panel. The
decrypted data is also written in a new text
file. The Fig. 9 represents the decrypted
text file.
CONCLUSION
The original data that is transmitted
through encryption is same as the retrieved
data after the decryption process. The
application designed provides a very high
security in transmission of a text file. As
information security is one of the growing
concern in various fields like nation
security, defense, banking and protection
of various confidential data this
application can be used in those sectors.
This application can be used as an
effective technique in programming
scenarios to secure vital codes and secure
transmission in research departments. The
high level of security is provided by the
scrambling patterns, user logins, domain
conversion, etc., the future scope of this
14
application relies the development of
higher order FFT algorithm. For higher
security, the number of scrambling
patterns are increased by means of FFT
algorithm. The application possesses
immense scope for further development.
The development relies on the factors
providing transmission security. The
application can be further designed for
word documents and other types of text
files (pdf, word document, etc.).
REFERENCES
1. RM Teodorescu, I Lita, IB Cioc, DA
Visan
(Jun 2015), “Virtual Instrumentation
Application for Symmetrical and
Asymmetrical
Text
Encryption/Decryption Studying”, in
Institute of Electrical and Electronics
Engineers (IEEE), Volume 2, Issue 15,
ISSN:4673-6647.
2. Sudha Rani K, TC Sarma, K Satya
Prasad, “Text file encryption using
FFT technique in Lab VIEW 8.6”,
International Journal of Research in
Page 8-15 © MAT Journals 2019. All Rights Reserved
Journal of Communication Engineering and Its Innovations
Volume 5 Issue 3
3.
4.
5.
6.
7.
8.
Engineering and Technology (IRJET),
Volume 1, Issue 1, ISSN: 2319-1163.
Sangeeta, Arpneek Kaur (May 2017),
“A Review on Symmetric Key
Cryptography
Algorithms”,
International Journal of Advanced
Research in Computer Science,
Volume 8, Issue 4, ISSN: 0976-5697.
Nithya Chidambaram, Pethuru Raj
(2018), “Secure File Transfer using
LabVIEW
A
Deterministic
Approach”, International Journal of
Pure and Applied Mathematics,
Volume 119, Issue 16, ISSN: 13143395.
Charru, Paramjeet Singh, Shaveta
Rani (July 2014), “Efficient Text Data
Encryption System to Optimize
Execution Time and Data Security”,
International Journal of Advanced
Research in Computer Science and
Software Engineering, Volume 4, Issue
7, ISSN: 2277 128X.
Earl E Swartzlander, Hani HM Saleh
(February 2012), “FFT Implementation
with Fused Floating-Point Operations”,
IEEE Transaction On Computers,
Volume 61, Issue 2.
Jampa Shravani, K Siva Nagi Reddy
(October 2014), “Area Efficient
Pipelined Radix-2k Feedforward FFT
Using Booth Multiplier”, International
Journal of VLSI System, Volume 2,
Issue 41, ISSN 2322-0929.
M Lavanya, R Vijay Sai, A Festina
(December 2015), “An Encryption
Algorithm Functioning on ASCII
15
Values
and
Random
Number
Generation”, Indian Journal of Science
and Technology, Volume 8, Issue 35,
ISSN: 0974-6846.
9. Mohammad
Ubaidullah
Bokhari,
Qahtan Makki Shallal (August 2016),
“A Review on Symmetric Key
Encryption
Techniques
in
Cryptography”, International Journal
of Computer Applications, Volume
147, Issue 10, ISSN: 0975–8887.
10. Preeti
Singh,
Praveen
Shende
(December 2014), “Symmetric Key
Cryptography:
Current
Trends”,
International Journal of Computer
Science and Mobile Computing,
Volume 3, Issue 12,
11. Satyajeet R Shinge, Rahul Patil (2014),
“An Encryption Algorithm Based on
ASCII Value of Data”, International
Journal of Computer Science and
Information Technologies, Volume 5,
Issue 6, ISSN: 0975-9646.
12. Shivlal Mewada, Pradeep Sharma, SS
Gautam
(December
2016),
“Investigation of Efficient Cryptic
Algorithm for Text using SM Crypter”,
International Journal of Information
Science and Computing, Volume 3,
Issue 2,
13. U Akshata, I Hameem Shanavas, D
Gopika (Jan 2013), “Hardware
Implementation
of
DIT
FFT”,
International Journal of Electronics
and Communication Engineering
(IJECE), Volume 3, Issue 1,
Page 8-15 © MAT Journals 2019. All Rights Reserved
Download